This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/11151] Leakage of stap_uprobes slots
- From: "wcohen at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 14 Jan 2010 20:58:51 -0000
- Subject: [Bug translator/11151] Leakage of stap_uprobes slots
- References: <20100108221421.11151.wcohen@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From wcohen at redhat dot com 2010-01-14 20:58 -------
Created an attachment (id=4518)
--> (http://sourceware.org/bugzilla/attachment.cgi?id=4518&action=view)
strace python ~/pyhello.py output
This trace shows the steps that python is taking to load an run the program.
The following is how the shared library is getting mapped in:
open("/usr/lib64/libpython2.6.so.1.0", O_RDONLY) = 3
read(3,
"\177ELF\2\1\1\3\0\0\0\0\0\0\0\0\3\0>\0\1\0\0\0\260\301\3\0\0\0\0\0"..., 832) =
832
fstat(3, {st_mode=S_IFREG|0555, st_size=1736312, ...}) = 0
mmap(NULL, 3889712, PROT_READ|PROT_EXEC, MAP_PRIVATE|MAP_DENYWRITE, 3, 0) =
0x7ffff7c21000
mprotect(0x7ffff7d8f000, 2093056, PROT_NONE) = 0
mmap(0x7ffff7f8e000, 241664, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_DENYWRITE, 3, 0x16d000) = 0x7ffff7f8e000
mmap(0x7ffff7fc9000, 55856, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x7ffff7fc9000
close(3) = 0
--
http://sourceware.org/bugzilla/show_bug.cgi?id=11151
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.