This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

about backtrace!


trace file is:

probe kernel.function("*@arch/i386/kernel/process.c") {
       printf ("%s (%d), %s\n", execname(), pid(), probefunc())
       print_backtrace()
}

probe kernel.function("*@fs/read_write.c") {
       printf ("%s (%d), %s\n", execname(), pid(), probefunc())
       print_backtrace()
}
.....

the rusult is:

trace for 3730 (bash)
0xc01232d5 : put_files_struct+0x7/0xbf []
0xc0174bc0 : flush_old_exec+0x65/0x368 []
0xc0174642 : kernel_read+0x31/0x3b []
0xc0199457 : load_elf_binary+0x527/0xbe3 []
0xc0174191 : copy_strings+0x22b/0x235 []
0xc0175c6b : search_binary_handler+0x72/0x1b1 []
0xc0175f12 : do_execve+0x168/0x1f6 []
0xc0104971 : sys_execve+0x2e/0x185 []
0xc0311443 : syscall_call+0x7/0xb []
copyfile (3730), flush_thread
trace for 3730 (copyfile)
0xc01042d2 : flush_thread+0x2/0x4d []
0xc0174c73 : flush_old_exec+0x118/0x368 []
0xc0199457 : load_elf_binary+0x527/0xbe3 []
0xc0174191 : copy_strings+0x22b/0x235 []
0xc0175c6b : search_binary_handler+0x72/0x1b1 []
0xc0175f12 : do_execve+0x168/0x1f6 []
0xc0104971 : sys_execve+0x2e/0x185 []
0xc0311443 : syscall_call+0x7/0xb []

So, my question is:
1. what address is the front address?
2. what is mean of the last "+0x7/0xb"...?
3. Named backtrace, so in my option, syscall_call call sys_execve then
sys_execve call do_execve, ...... the last flush_old_ thread call is
flush_thread. right?

thanks!


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]