From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 21173 invoked by alias); 13 Oct 2009 00:59:25 -0000 Received: (qmail 21149 invoked by uid 9586); 13 Oct 2009 00:59:24 -0000 Date: Tue, 13 Oct 2009 00:59:00 -0000 Message-ID: <20091013005924.21138.qmail@sourceware.org> From: jistone@sourceware.org To: systemtap-cvs@sourceware.org Subject: [SCM] systemtap: system-wide probe/trace tool branch, master, updated. release-1.0-82-g9a59aed X-Git-Refname: refs/heads/master X-Git-Reftype: branch X-Git-Oldrev: 0670efc6debceea57084547976c229335cc0e2fd X-Git-Newrev: 9a59aed914fbe25e159b2a60a97693f14b24ddf3 Mailing-List: contact systemtap-cvs-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-cvs-owner@sourceware.org List-Archive: Reply-To: systemtap@sourceware.org X-SW-Source: 2009-q4/txt/msg00028.txt.bz2 This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "systemtap: system-wide probe/trace tool". The branch, master has been updated via 9a59aed914fbe25e159b2a60a97693f14b24ddf3 (commit) from 0670efc6debceea57084547976c229335cc0e2fd (commit) Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below. - Log ----------------------------------------------------------------- commit 9a59aed914fbe25e159b2a60a97693f14b24ddf3 Author: Przemyslaw Pawelczyk Date: Sat Oct 10 12:14:54 2009 +0200 Add the .call modifier to syscall entry probes. Inline functions do not have an indentifiable return point and require kernel built using VTA-enabled gcc to get tracking of variables. OTOH syscall functions are very rarely inlined (depending on the compiler mood), therefore filtering probes to include only non-inlined functions ensures consistent behavior between different kernels. This removes the problem of inaccessible variables in inlined syscalls that is described in comments #6-9 to PR5890 and gives us the status quo w.r.t. syscall probing, because before the commit solving PR10572 (b7478964) inline instances were masked anyway by non-inline ones. You can check whether you have inlined syscalls using following command: $ stap -l 'kernel.function("sys_*"),kernel.function("compat_sys_*")' \ 2>&1 -vvv | awk '/^selected inline/{print $5}' * tapset/syscalls.stp: Add .call to all entry probes. * tapset/syscalls2.stp: Ditto. ----------------------------------------------------------------------- Summary of changes: tapset/syscalls.stp | 698 +++++++++++++++++++++++++------------------------- tapset/syscalls2.stp | 710 +++++++++++++++++++++++++------------------------- 2 files changed, 704 insertions(+), 704 deletions(-) hooks/post-receive -- systemtap: system-wide probe/trace tool