public inbox for systemtap-cvs@sourceware.org
help / color / mirror / Atom feed
From: jistone@sourceware.org
To: systemtap-cvs@sourceware.org
Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.0-82-g9a59aed
Date: Tue, 13 Oct 2009 00:59:00 -0000	[thread overview]
Message-ID: <20091013005924.21138.qmail@sourceware.org> (raw)

This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "systemtap: system-wide probe/trace tool".

The branch, master has been updated
       via  9a59aed914fbe25e159b2a60a97693f14b24ddf3 (commit)
      from  0670efc6debceea57084547976c229335cc0e2fd (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 9a59aed914fbe25e159b2a60a97693f14b24ddf3
Author: Przemyslaw Pawelczyk <przemyslaw@pawelczyk.it>
Date:   Sat Oct 10 12:14:54 2009 +0200

    Add the .call modifier to syscall entry probes.
    
    Inline functions do not have an indentifiable return point and require
    kernel built using VTA-enabled gcc to get tracking of variables. OTOH
    syscall functions are very rarely inlined (depending on the compiler
    mood), therefore filtering probes to include only non-inlined functions
    ensures consistent behavior between different kernels.
    
    This removes the problem of inaccessible variables in inlined syscalls
    that is described in comments #6-9 to PR5890 and gives us the status quo
    w.r.t. syscall probing, because before the commit solving PR10572
    (b7478964) inline instances were masked anyway by non-inline ones.
    
    You can check whether you have inlined syscalls using following command:
    $ stap -l 'kernel.function("sys_*"),kernel.function("compat_sys_*")' \
                          2>&1 -vvv | awk '/^selected inline/{print $5}'
    
    * tapset/syscalls.stp: Add .call to all entry probes.
    * tapset/syscalls2.stp: Ditto.

-----------------------------------------------------------------------

Summary of changes:
 tapset/syscalls.stp  |  698 +++++++++++++++++++++++++-------------------------
 tapset/syscalls2.stp |  710 +++++++++++++++++++++++++-------------------------
 2 files changed, 704 insertions(+), 704 deletions(-)


hooks/post-receive
--
systemtap: system-wide probe/trace tool


                 reply	other threads:[~2009-10-13  0:59 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20091013005924.21138.qmail@sourceware.org \
    --to=jistone@sourceware.org \
    --cc=systemtap-cvs@sourceware.org \
    --cc=systemtap@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).