This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/16920] Add aarch64 backtrace support


https://sourceware.org/bugzilla/show_bug.cgi?id=16920

William Cohen <wcohen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #5 from William Cohen <wcohen at redhat dot com> ---
commit 0f2e612e72749b8fc51ed72b3fa6743f953c09a7 provides stack backtraces for
arm64.  This provides the information for probe points that provide struct
pt_regs, but doesn't provide the information for kernel.trace points.

# ../install/bin/stap --all-modules -v -e 'probe vfs.read {print_backtrace();
exit()}' 
Pass 1: parsed user script and 104 library script(s) using
152448virt/36992res/6080shr/28032data kb, in 350usr/30sys/376real ms.
Pass 2: analyzed script: 1 probe(s), 2 function(s), 3 embed(s), 0 global(s)
using 259520virt/146176res/7616shr/135104data kb, in 3050usr/290sys/3341real
ms.
Pass 3: using cached
/root/.systemtap/cache/f0/stap_f0004365d79839ae85f343ee225db584_2071.c
Pass 4: using cached
/root/.systemtap/cache/f0/stap_f0004365d79839ae85f343ee225db584_2071.ko
Pass 5: starting run.
 0xfffffe00001e00b8 : vfs_read+0x0/0x198 [kernel]
 0xfffffe00001e0910 : sys_read+0x50/0xb0 [kernel]
 0xfffffe00000931b0 : __sys_trace_return+0x0/0x10 [kernel]
 0x0 (inexact)
Pass 5: run completed in 0usr/20sys/546real ms.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]