This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/11859] New: print_ubacktrace() from kernel return probe prints kretprobe addresses
- From: "mjw at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 30 Jul 2010 13:17:00 -0000
- Subject: [Bug runtime/11859] New: print_ubacktrace() from kernel return probe prints kretprobe addresses
- Reply-to: sourceware-bugzilla at sourceware dot org
The logic in _stp_stack_print for printing user backtraces from kretprobes is
confused. e.g:
stap -d /usr/bin/zenity --ldd -e 'probe syscall.open.return { if (pid() ==
target() && $return < 0) { log("opened: " . user_string($filename) . ", failed:
" . retstr); print_ubacktrace(); } }' -c '/usr/bin/zenity --info'
opened: /usr/share/locale/en.UTF-8/LC_MESSAGES/gtk20.mo, failed: -2 (ENOENT)
Returning from: 0xc04c6e4a
Returning to : 0xc0771034
0x84a453 : __open_nocancel+0x19/0x76 [libc-2.12.so]
0x7a3788 : _nl_load_domain+0xc8/0x10da [libc-2.12.so]
0x7a36ac : _nl_find_domain+0x2cc/0x2e0 [libc-2.12.so]
0x7a2db1 : __dcigettext+0x331/0x81b [libc-2.12.so]
0x7a1ba3 : dcgettext+0x43/0x50 [libc-2.12.so]
0x437bc4 : g_dgettext+0x54/0x70 [libglib-2.0.so.0.2512.0]
0x372d9b5 : gtk_get_option_group+0x45/0xe0 [libgtk-x11-2.0.so.0.2000.1]
0x372dadb : gtk_parse_args+0x8b/0x110 [libgtk-x11-2.0.so.0.2000.1]
0x372db85 : gtk_init_check+0x25/0x50 [libgtk-x11-2.0.so.0.2000.1]
0x372dbd5 : gtk_init+0x25/0x90 [libgtk-x11-2.0.so.0.2000.1]
0x804d775 : _init+0x23c9/0x8970 [zenity]
The "Returning from" and "Returning to" lines shouldn't be there (they are
kernel addresses).
--
Summary: print_ubacktrace() from kernel return probe prints
kretprobe addresses
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: mjw at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=11859
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.