From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 30070 invoked by alias); 5 Feb 2009 08:03:28 -0000 Received: (qmail 28085 invoked by uid 48); 5 Feb 2009 08:03:06 -0000 Date: Thu, 05 Feb 2009 14:55:00 -0000 Message-ID: <20090205080306.28084.qmail@sourceware.org> From: "wenji dot huang at oracle dot com" To: systemtap@sources.redhat.com In-Reply-To: <20081024082201.6979.srikar@linux.vnet.ibm.com> References: <20081024082201.6979.srikar@linux.vnet.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug translator/6979] using $$parms under uprobe probes might result in a uninitialized variable access. X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q1/txt/msg00355.txt.bz2 ------- Additional Comments From wenji dot huang at oracle dot com 2009-02-05 08:03 ------- Created an attachment (id=3720) --> (http://sourceware.org/bugzilla/attachment.cgi?id=3720&action=view) debuginfo dump for the probe function, including info and loc. Vmlinux is too big. I extracted the related info and location from debuginfo file for the example function proc_reg_llseek -- http://sourceware.org/bugzilla/show_bug.cgi?id=6979 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.