From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 32694 invoked by alias); 19 Oct 2006 20:47:14 -0000 Received: (qmail 32687 invoked by uid 22791); 19 Oct 2006 20:47:14 -0000 X-Spam-Status: No, hits=-2.4 required=5.0 tests=AWL,BAYES_00,SPF_PASS X-Spam-Check-By: sourceware.org Received: from skunk.mtbrook.bozemanpass.com (HELO skunk.mtbrook.bozemanpass.com) (69.145.82.195) by sourceware.org (qpsmtpd/0.31) with ESMTP; Thu, 19 Oct 2006 20:47:09 +0000 Received: from [69.145.82.218] (unknown [69.145.82.218]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by skunk.mtbrook.bozemanpass.com (Postfix) with ESMTP id C4CAB5583C0 for ; Thu, 19 Oct 2006 13:47:06 -0700 (PDT) Message-ID: <4537E44C.6040604@boreham.org> Date: Thu, 19 Oct 2006 20:47:00 -0000 From: David Boreham Reply-To: david_list@boreham.org User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206) X-Accept-Language: en-us, en MIME-Version: 1.0 To: SystemTap Subject: user mode backtrace Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-IsSubscribed: yes Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q4/txt/msg00193.txt.bz2 I'd like to get a stack trace for the process that made the system call I'm probing (I'm looking at filesystem access typically, so reads/writes/syncs etc). The systemtap backtrace function appears to only get the kernel mode stack which is not much use to me. I was wondering if anyone had discovered a good solution to this problem already ? I was thinking perhaps I could invoke pstack (gdb) on the current pid/tid. But I'm worried that doing so might deadlock since the process is inside a system call. I'm looking at a very large application that beats up on the filesystem, in case you're wondering why I want to do this. It's so large that nobody is quite sure what code access which files, when and why. Thanks.