This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/16920] Add aarch64 backtrace support
- From: "wcohen at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Thu, 09 Oct 2014 18:11:45 +0000
- Subject: [Bug runtime/16920] Add aarch64 backtrace support
- Auto-submitted: auto-generated
- References: <bug-16920-6586 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=16920
William Cohen <wcohen at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #5 from William Cohen <wcohen at redhat dot com> ---
commit 0f2e612e72749b8fc51ed72b3fa6743f953c09a7 provides stack backtraces for
arm64. This provides the information for probe points that provide struct
pt_regs, but doesn't provide the information for kernel.trace points.
# ../install/bin/stap --all-modules -v -e 'probe vfs.read {print_backtrace();
exit()}'
Pass 1: parsed user script and 104 library script(s) using
152448virt/36992res/6080shr/28032data kb, in 350usr/30sys/376real ms.
Pass 2: analyzed script: 1 probe(s), 2 function(s), 3 embed(s), 0 global(s)
using 259520virt/146176res/7616shr/135104data kb, in 3050usr/290sys/3341real
ms.
Pass 3: using cached
/root/.systemtap/cache/f0/stap_f0004365d79839ae85f343ee225db584_2071.c
Pass 4: using cached
/root/.systemtap/cache/f0/stap_f0004365d79839ae85f343ee225db584_2071.ko
Pass 5: starting run.
0xfffffe00001e00b8 : vfs_read+0x0/0x198 [kernel]
0xfffffe00001e0910 : sys_read+0x50/0xb0 [kernel]
0xfffffe00000931b0 : __sys_trace_return+0x0/0x10 [kernel]
0x0 (inexact)
Pass 5: run completed in 0usr/20sys/546real ms.
--
You are receiving this mail because:
You are the assignee for the bug.