From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19267 invoked by alias); 31 Mar 2006 02:50:22 -0000 Received: (qmail 19248 invoked by uid 48); 31 Mar 2006 02:50:20 -0000 Date: Fri, 31 Mar 2006 02:50:00 -0000 Message-ID: <20060331025020.19247.qmail@sourceware.org> From: "bibo dot mao at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20060330093952.2497.guanglei@cn.ibm.com> References: <20060330093952.2497.guanglei@cn.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug runtime/2497] STP_STRING_SIZE set by stap is too small X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00905.txt.bz2 ------- Additional Comments From bibo dot mao at intel dot com 2006-03-31 02:50 ------- When test NFS performance in i386, even run stap with -DMAXSTRINGLEN=256, sometimes it can not print all the back trace history. I doubt that stack will override if trap reentrance happens and CONFIG_4KSTACKS option is set. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2497 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.