From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 5960 invoked by alias); 11 May 2006 02:05:07 -0000 Received: (qmail 5541 invoked by uid 22791); 11 May 2006 02:05:05 -0000 X-Spam-Status: No, hits=-1.9 required=5.0 tests=AWL,BAYES_00,SPF_PASS X-Spam-Check-By: sourceware.org Received: from ausmtp04.au.ibm.com (HELO ausmtp04.au.ibm.com) (202.81.18.152) by sourceware.org (qpsmtpd/0.31) with ESMTP; Thu, 11 May 2006 02:04:57 +0000 Received: from sd0208e0.au.ibm.com (d23rh904.au.ibm.com [202.81.18.202]) by ausmtp04.au.ibm.com (8.13.6/8.13.5) with ESMTP id k4B2FPjA183404 for ; Thu, 11 May 2006 12:15:25 +1000 Received: from d23av03.au.ibm.com (d23av03.au.ibm.com [9.190.250.244]) by sd0208e0.au.ibm.com (8.12.10/NCO/VER6.8) with ESMTP id k4B27shX104160 for ; Thu, 11 May 2006 12:07:55 +1000 Received: from d23av03.au.ibm.com (loopback [127.0.0.1]) by d23av03.au.ibm.com (8.12.11/8.13.3) with ESMTP id k4B24TLm012983 for ; Thu, 11 May 2006 12:04:29 +1000 Received: from [127.0.0.1] ([9.181.133.250]) by d23av03.au.ibm.com (8.12.11/8.12.11) with ESMTP id k4B24PuJ012764 for ; Thu, 11 May 2006 12:04:28 +1000 Message-ID: <44629BC3.7030505@cn.ibm.com> Date: Thu, 11 May 2006 02:05:00 -0000 From: Li Guanglei Organization: IBM CSTL User-Agent: Thunderbird 1.5.0.2 (Windows/20060308) MIME-Version: 1.0 To: "systemtap@sourceware.org" Subject: get the mapping of Content-Type: text/plain; charset=GB2312 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q2/txt/msg00376.txt.bz2 Hi, One of my tapsets will log the syscall name got from CONTEXT->probe_point. But string printing is costly so I want to log the key of syscall name, and later the post-processing app in user space will figure out the syscall name represented by corresponding keys. But this requires to generate a mapping of pairs of at probe begin. The CONTEXT->probe_point is stored in dwarf_kprobe_probe_??_location_names, so I can use the address of each syscall name as the key and in the probe handler I can simply log the pointer instead of a string. But since there are many probe points defined beside syscall in my tapsets, I can't figure out which dwarf_kprobe_probe_.._location_names variable the syscall name is stored. Do you have any ideas about this? Thanks.