systemtap archive
subject index for October - December, 2013

This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.

Indexes: [Date Index] [Subject Index] [Author Index] [Thread Index]
Site Nav: [Browse other archives for this mailing list]
[Browse other mailing lists at this site]
Search: Limit to:

[Bug dyninst/16250] New: Allow triggering remote gdb through stapdyn

[Bug kprobes/16331] New: stap missing radeon tracepoints

[Bug kprobes/2725] function("*") probes sometimes crash & burn

[Bug runtime/13078] investigate qemu virtio-serial channel for talking to stap-sh

[Bug runtime/16096] New: on i686, the nd_syscall tapset is broken

[Bug runtime/16096] on i686, the nd_syscall tapset is broken

[Bug runtime/16131] New: CONFIG_USER_NS support

[Bug runtime/16132] New: staprun/stapio confused by presence of traceN files

[Bug runtime/16132] staprun/stapio confused by presence of traceN files

[Bug runtime/16278] New: orphaned stapsh goes to 100% CPU after stap closing

[Bug runtime/16278] orphaned stapsh goes to 100% CPU after stap closing

[Bug runtime/16319] New: on sysvinit systems, virtio-serial port hotplugging fails

[Bug runtime/16319] on sysvinit systems, virtio-serial port hotplugging fails

[Bug runtime/16378] New: in-kernel utrace problem with 2.6.32: implicit declaration of function 'do_each_thread' in task_finder.c

[Bug runtime/2035] investigate boot-time probing

[Bug runtime/9822] reduce timer load

[Bug server/16309] New: SELinux prevents stap-serverd from opening the current dir when spawning processes

[Bug server/16309] SELinux prevents stap-serverd from opening the current dir when spawning processes

[Bug server/16342] New: stap --list-servers lists spurious line when having two stap-serverd instances

[Bug server/16342] stap --list-servers lists spurious line when having two stap-serverd instances

[Bug tapsets/14325] for arm, the nd_syscall tapsets need improvement

[Bug tapsets/15219] syscall.exp failures on RHEL5, RHEL6, and rawhide

[Bug tapsets/15913] on s390x, nd_syscall testsuite failures when accessing arguments 1 and 6

[Bug tapsets/15913] on s390x, nd_syscall.execve fails when accessing filename

[Bug tapsets/15961] nd_syscall.exp failure on i686

[Bug tapsets/16057] New: task_dentry_path fails to cross mount points

[Bug tapsets/16057] task_dentry_path fails to cross mount points

[Bug tapsets/16058] New: syscall.mmap/nd_syscall.mmap probe alias problem

[Bug tapsets/16058] syscall.mmap/nd_syscall.mmap probe alias problem

[Bug tapsets/16184] New: The rt_sigprocmask syscall subtest fails

[Bug tapsets/16184] The rt_sigprocmask syscall subtest fails

[Bug tapsets/16187] New: the 'sendfile' syscall.exp/nd_syscall.exp test fails

[Bug tapsets/16187] the 'sendfile' syscall.exp/nd_syscall.exp test fails

[Bug tapsets/16207] New: on rawhide, we're getting more syscall.exp failures

[Bug tapsets/16207] on rawhide, we're getting more syscall.exp failures

[Bug tapsets/16273] irq_handler probe doesn't work on RHEL5 kernel

[Bug tapsets/16273] New: irq_handler probe doesn't work on RHEL5 kernel

[Bug tapsets/16311] need to add pwritev() syscall support to the syscall/nd_syscall tapsets

[Bug tapsets/16311] New: need to add pwritev() syscall support to the syscall/nd_syscall tapsets

[Bug tapsets/16312] need to add preadv() syscall support to the syscall/nd_syscall tapsets

[Bug tapsets/16312] New: need to add preadv() syscall support to the syscall/nd_syscall tapsets

[Bug testsuite/15807] need more serious workload program for examples vice -c sleep 0.2

[Bug testsuite/16175] New: on ppc64, getting mmap syscall and nd_syscall testsuite failures

[Bug testsuite/16175] on ppc64, getting mmap syscall and nd_syscall testsuite failures

[Bug testsuite/16176] New: on ia32, the trunc nd_syscall.exp subtest fails

[Bug testsuite/16176] on ia32, the trunc nd_syscall.exp subtest fails

[Bug testsuite/16247] New: Some examples don't work on RHEL5

[Bug testsuite/16247] Some examples don't work on RHEL5

[Bug testsuite/16248] New: pfiles example fails to build on RHEL7

[Bug testsuite/16248] pfiles example fails to build on RHEL7

[Bug testsuite/16307] New: ubuntu 12.04 /bin/kill no likey new kill -SIG -- -[exp_pid]

[Bug testsuite/16307] ubuntu 12.04 /bin/kill no likey new kill -SIG -- -[exp_pid]

[Bug testsuite/16325] client.exp contains duplicate check

[Bug testsuite/16325] New: client.exp contains duplicate check

[Bug testsuite/16326] client.exp and local stap-server interactions

[Bug testsuite/16326] New: client.exp and local stap-server interactions

[Bug translator/13420] prologue detection fails for function parameters in unoptimized (-g only, no -O) code

[Bug translator/14226] semantic error: missing x86_64 kernel/module debuginfo under '...' while resolving probe point kernel.function("vfs_read").return

[Bug translator/15781] improve pass-2 function suggestions

[Bug translator/15785] Failure to resolve symbols defined as IFUNC (indirect functions) for user-space libraries

[Bug translator/15785] Failure to resolve symbols defined as indirect functions for user-space libraries

[Bug translator/15999] New: symbol-table-based fallback for foo.function() should resolve $$vars etc.

[Bug translator/15999] symbol-table-based fallback for foo.function() should resolve $$vars etc.

[Bug translator/16019] limit number of similar semantic errors output

[Bug translator/16019] New: limit number of similar semantic errors output

[Bug translator/16097] improve error message on array type mismatch

[Bug translator/16097] New: improve error message on array type mismatch

[Bug translator/16161] Multiple address problems with symtab functions

[Bug translator/16161] New: Multiple address problems with symtab functions

[Bug translator/16162] New: plt addresses are incorrect for prelinked libraries

[Bug translator/16162] plt addresses are incorrect for prelinked libraries

[Bug translator/16165] @perf operator in error msgs is corrupted

[Bug translator/16165] New: @perf operator in error msgs is corrupted

[Bug translator/16166] New: stap -vvv causes SIGSEGV when using @perf operator

[Bug translator/16166] stap -vvv causes SIGSEGV when using @perf operator

[Bug translator/16249] New: Add support for variadic stap macros

[Bug translator/16276] New: resource limits interfering with buildrun.cxx make -j

[Bug translator/16276] resource limits interfering with buildrun.cxx make -j

[Bug translator/16300] New: suppress statement-counting protections in loop-free non-recursive probe handlers

[Bug translator/16300] suppress statement-counting protections in loop-free non-recursive probe handlers

[Bug translator/16306] New: adapt to new _kprobe_blacklist kernel mechanism if adopted

[Bug translator/16331] stap missing radeon tracepoints

[Bug translator/16358] build-id difficulties with hand-built kernels

[Bug translator/16358] New: build-id difficulties with hand-built kernels

[Bug uprobes/15785] Failure to resolve symbols defined as indirect functions for user-space libraries

Re: [Fwd: Re: Regarding systemtap support for AArch64]

[PATCH -tip 0/3] perf-probe: Dwarf support for uprobes

[PATCH -tip 2/3] perf-probe: Support dwarf on uprobe events

[PATCH -tip 1/3] [CLEANUP] perf-probe: Expand given path to absolute path

[PATCH -tip 3/3] perf-probe: Use the actual address as a hint for uprobes

[PATCH -tip v2 0/2] perf-probe: Dwarf support for uprobes

[PATCH -tip v2 1/2] [CLEANUP] perf-probe: Expand given path to absolute path

[PATCH -tip v2 2/2] perf-probe: Support basic dwarf-based operations on uprobe events

[PATCH -tip v3 00/23] kprobes: introduce NOKPROBE_SYMBOL() and general cleaning of kprobe blacklist

[PATCH -tip v3 01/23] kprobes: Prohibit probing on .entry.text code

[PATCH -tip v3 02/23] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist

[PATCH -tip v3 03/23] kprobes: Show blacklist entries via debugfs

[PATCH -tip v3 04/23] kprobes: Support blacklist functions in module

[PATCH -tip v3 05/23] kprobes: Use NOKPROBE_SYMBOL() in sample modules

[PATCH -tip v3 06/23] kprobes/x86: Allow probe on some kprobe preparation functions

[PATCH -tip v3 07/23] kprobes/x86: Use NOKPROBE_SYMBOL instead of __kprobes

[PATCH -tip v3 08/23] kprobes: Allow probe on some kprobe functions

[PATCH -tip v3 09/23] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes

[PATCH -tip v3 10/23] ftrace/kprobes: Allow probing on some preparation functions

[PATCH -tip v3 11/23] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace

[PATCH -tip v3 12/23] x86/hw_breakpoint: Use NOKPROBE_SYMBOL macro in hw_breakpoint

[PATCH -tip v3 13/23] x86/trap: Use NOKPROBE_SYMBOL macro in trap.c

[PATCH -tip v3 14/23] x86/fault: Use NOKPROBE_SYMBOL macro in fault.c

[PATCH -tip v3 15/23] x86/alternative: Use NOKPROBE_SYMBOL macro in alternative.c

[PATCH -tip v3 16/23] x86/nmi: Use NOKPROBE_SYMBOL macro for nmi handlers

[PATCH -tip v3 17/23] x86/kvm: Use NOKPROBE_SYMBOL macro in kvm.c

[PATCH -tip v3 18/23] x86/dumpstack: Use NOKPROBE_SYMBOL macro in dumpstack.c

[PATCH -tip v3 19/23] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*

[PATCH -tip v3 20/23] [BUGFIX] kprobes: Prohibit probing on func_ptr_is_kernel_text

[PATCH -tip v3 21/23] notifier: Use NOKPROBE_SYMBOL macro in notifier

[PATCH -tip v3 22/23] sched: Use NOKPROBE_SYMBOL macro in sched

[PATCH -tip v3 23/23] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text

[PATCH -tip v4 0/6] kprobes: introduce NOKPROBE_SYMBOL() and fixes crash bugs

[PATCH -tip v4 1/6] kprobes: Prohibit probing on .entry.text code

[PATCH -tip v4 2/6] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist

[PATCH -tip v4 3/6] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*

[PATCH -tip v4 4/6] [BUGFIX] x86: Prohibit probing on native_set_debugreg

[PATCH -tip v4 5/6] [BUGFIX] x86: Prohibit probing on thunk functions and restore

[PATCH -tip v4 6/6] [RFC] kprobes/x86: Call exception handlers directly from do_int3/do_debug

[PATCH -tip v5 00/18] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs

[PATCH -tip v5 01/18] kprobes: Prohibit probing on .entry.text code

[PATCH -tip v5 02/18] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist

[PATCH -tip v5 03/18] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*

[PATCH -tip v5 04/18] [BUGFIX] x86: Prohibit probing on native_set_debugreg

[PATCH -tip v5 05/18] [BUGFIX] x86: Prohibit probing on thunk functions and restore

[PATCH -tip v5 06/18] kprobes/x86: Call exception handlers directly from do_int3/do_debug

[PATCH -tip v5 07/18] kprobes/x86: Allow probe on some kprobe preparation functions

[PATCH -tip v5 08/18] kprobes: Allow probe on some kprobe functions

[PATCH -tip v5 09/18] ftrace/kprobes: Allow probing on some preparation functions

[PATCH -tip v5 10/18] x86: Use NOKPROBE_SYMBOL() instead of __kprobes annotation

[PATCH -tip v5 11/18] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes

[PATCH -tip v5 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace

[PATCH -tip v5 13/18] notifier: Use NOKPROBE_SYMBOL macro in notifier

[PATCH -tip v5 14/18] sched: Use NOKPROBE_SYMBOL macro in sched

[PATCH -tip v5 15/18] kprobes: Show blacklist entries via debugfs

[PATCH -tip v5 16/18] kprobes: Support blacklist functions in module

[PATCH -tip v5 17/18] kprobes: Use NOKPROBE_SYMBOL() in sample modules

[PATCH -tip v5 18/18] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text

[PATCH -tip v5.1 12/18] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace

[PATCH -tip v6 00/22] kprobes: introduce NOKPROBE_SYMBOL(), cleanup and fixes crash bugs

[PATCH -tip v6 01/22] kprobes: Prohibit probing on .entry.text code

[PATCH -tip v6 02/22] kprobes: Introduce NOKPROBE_SYMBOL() macro for blacklist

[PATCH -tip v6 03/22] [BUGFIX] kprobes/x86: Prohibit probing on debug_stack_*

[PATCH -tip v6 04/22] [BUGFIX] x86: Prohibit probing on native_set_debugreg/load_idt

[PATCH -tip v6 05/22] [BUGFIX] x86: Prohibit probing on thunk functions and restore

[PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset

[PATCH -tip v6 07/22] kprobes/x86: Call exception handlers directly from do_int3/do_debug

[PATCH -tip v6 08/22] kprobes/x86: Allow probe on some kprobe preparation functions

[PATCH -tip v6 09/22] kprobes: Allow probe on some kprobe functions

[PATCH -tip v6 10/22] ftrace/kprobes: Allow probing on some preparation functions

[PATCH -tip v6 11/22] x86: Allow kprobes on text_poke/hw_breakpoint

[PATCH -tip v6 12/22] x86: Use NOKPROBE_SYMBOL() instead of __kprobes annotation

[PATCH -tip v6 13/22] kprobes: Use NOKPROBE_SYMBOL macro instead of __kprobes

[PATCH -tip v6 14/22] ftrace/kprobes: Use NOKPROBE_SYMBOL macro in ftrace

[PATCH -tip v6 15/22] notifier: Use NOKPROBE_SYMBOL macro in notifier

[PATCH -tip v6 16/22] sched: Use NOKPROBE_SYMBOL macro in sched

[PATCH -tip v6 17/22] kprobes: Show blacklist entries via debugfs

[PATCH -tip v6 18/22] kprobes: Support blacklist functions in module

[PATCH -tip v6 19/22] kprobes: Use NOKPROBE_SYMBOL() in sample modules

[PATCH -tip v6 20/22] kprobes/x86: Use kprobe_blacklist for .kprobes.text and .entry.text

[PATCH -tip v6 21/22] kprobes/x86: Remove unneeded preempt_disable/enable in interrupt handlers

[PATCH -tip v6 22/22] [RFC] kprobes/x86: Add emergency recovery process for bad kprobes

[PATCH 42/49] perf probe: Expand given path to absolute path

[PATCH 43/49] perf probe: Support basic dwarf-based operations on uprobe events

[PATCH v2 0/3] Perf support to SDT markers

[PATCH v2 1/3] SDT markers listing by perf:

[PATCH v2 2/3] Support for perf to probe into SDT markers:

[PATCH v2 3/3] Documentation regarding perf/sdt

[PATCH v2] Add loadavg tapset

[PATCH v2] Add STAP_ERROR macro

[PATCH v3 0/3] Perf support to SDT markers

[PATCH v3 1/3] SDT markers listing by perf:

[PATCH v3 2/3] Support for perf to probe into SDT markers:

[PATCH v3 3/3] Documentation regarding perf/sdt

[PATCH v4 0/3] perf support to SDT markers

[PATCH v4 1/3] SDT markers listing by perf:

[PATCH v4 2/3] Support for perf to probe into SDT markers:

[PATCH v4 3/3] Documentation regarding perf/sdt

[PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)

Re: [PATCH] - DRAFT - Easy access to IP address in struct sockaddr in syscall.bind probe (for now)]

[PATCH] Add loadavg tapset

[PATCH] Add STAP_ERROR macro

[PATCH] don't require .config and Module.symvers for dyninst runtime

[PATCH] examples: Print header once in interrupts-by-dev.stp

[PATCH] Fix typo in man/error::7stap

[PATCH] Fix typo in man/stap.1

Re: [RFC PATCH tip 0/5] tracing filters with BPF

ARM linux-3.11.1-300.fc19.armv7hl incorrect handling uint16_t in probe_kernel_read() probe_kernel_write() functions

An attempt for systemtap "make installcheck" AArch64

Re: An attempt for systemtap "make installcheck" AArch64

Curly brace outside macro conditional typo

Failed to compile after 86aae990179c7

Re: help!! could I debug a loadable module with systemtap

kprobes-systemtap validation on AArch64

maxactive(NNNN) usage

Monitoring cpu time in us (or even ns?)

Re: New location for aarch64 Fedora 19 packages

new systemtap snapshot available

Recent ARM systemtap test results using a kernel with uprobe support

Re: Regarding systemtap support for AArch64

report a segment fault bug of systemtap

Results for arm uprobes-v3 posted

RFC stap/java backtracing

Role of svc_entry macro with 64 bytes in kprobes/systemtap on ARM

rootkits and hidden processes

Re: Segmenation fault for systemtap tests using the arm uprobes support

SystemTap 2.4 release

Systemtap and UEFI Secure Boot

Unable to access function parameters

uprobes-v4 branch now available


Indexes: [Date Index] [Subject Index] [Author Index] [Thread Index]
Site Nav: [Browse other archives for this mailing list]
[Browse other mailing lists at this site]
Search: Limit to:

Mail converted by MHonArc