This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
about backtrace!
- From: "Kevin Jia" <jiaminghao at gmail dot com>
- To: systemtap at sourceware dot org
- Date: Mon, 1 May 2006 04:10:09 +0900
- Subject: about backtrace!
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:mime-version:content-type:content-transfer-encoding:content-disposition; b=EDVr3IgwMDL5swLEwZ/rotCb71nNDDxmdBxZORW9NbbnNa46+M2cYhg4UmequY/VBckbxLX5ayJm1uA3Z6JuEjq5g2FWQXLdocviJzVhEJ3T1vihZc5fZkcuaGpt7u+YoPRXoBgfSCst1by542Raofvb11nHRvtox+hZMxeuaP4=
trace file is:
probe kernel.function("*@arch/i386/kernel/process.c") {
printf ("%s (%d), %s\n", execname(), pid(), probefunc())
print_backtrace()
}
probe kernel.function("*@fs/read_write.c") {
printf ("%s (%d), %s\n", execname(), pid(), probefunc())
print_backtrace()
}
.....
the rusult is:
trace for 3730 (bash)
0xc01232d5 : put_files_struct+0x7/0xbf []
0xc0174bc0 : flush_old_exec+0x65/0x368 []
0xc0174642 : kernel_read+0x31/0x3b []
0xc0199457 : load_elf_binary+0x527/0xbe3 []
0xc0174191 : copy_strings+0x22b/0x235 []
0xc0175c6b : search_binary_handler+0x72/0x1b1 []
0xc0175f12 : do_execve+0x168/0x1f6 []
0xc0104971 : sys_execve+0x2e/0x185 []
0xc0311443 : syscall_call+0x7/0xb []
copyfile (3730), flush_thread
trace for 3730 (copyfile)
0xc01042d2 : flush_thread+0x2/0x4d []
0xc0174c73 : flush_old_exec+0x118/0x368 []
0xc0199457 : load_elf_binary+0x527/0xbe3 []
0xc0174191 : copy_strings+0x22b/0x235 []
0xc0175c6b : search_binary_handler+0x72/0x1b1 []
0xc0175f12 : do_execve+0x168/0x1f6 []
0xc0104971 : sys_execve+0x2e/0x185 []
0xc0311443 : syscall_call+0x7/0xb []
So, my question is:
1. what address is the front address?
2. what is mean of the last "+0x7/0xb"...?
3. Named backtrace, so in my option, syscall_call call sys_execve then
sys_execve call do_execve, ...... the last flush_old_ thread call is
flush_thread. right?
thanks!