From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 32664 invoked by alias); 10 Feb 2009 10:17:36 -0000 Received: (qmail 32606 invoked by uid 48); 10 Feb 2009 10:17:25 -0000 Date: Tue, 10 Feb 2009 10:19:00 -0000 Message-ID: <20090210101725.32605.qmail@sourceware.org> From: "ananth at in dot ibm dot com" To: systemtap@sources.redhat.com In-Reply-To: <20090204113414.9816.ananth@in.ibm.com> References: <20090204113414.9816.ananth@in.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug translator/9816] functioncallcount.stp causes system crash X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q1/txt/msg00410.txt.bz2 ------- Additional Comments From ananth at in dot ibm dot com 2009-02-10 10:17 ------- Our observations so far: a. Powerpc instruction emulation had a bug. Patch submitted to fix it (http://ozlabs.org/pipermail/linuxppc-dev/2009-February/068062.html) b. functioncallcount.stp as it exists probes calls and inlines. That is a problem -- at least on powerpc with the upstream kernel, set/clear/*_bit (part of arch/powerpc/include/asm/bitops.h) shouldn't be probed. Its not clear how to add a set of inline functions in a header file in the blacklist in one go. c. Maybe its best not to allow routines in bitops.h to be traced? d. The functioncallcount.stp needs to be modified to just probe .call and not inlines. Comments? -- http://sourceware.org/bugzilla/show_bug.cgi?id=9816 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.