From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 104776 invoked by alias); 12 Dec 2015 12:33:11 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 104762 invoked by uid 89); 12 Dec 2015 12:33:10 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mail-wm0-f44.google.com Received: from mail-wm0-f44.google.com (HELO mail-wm0-f44.google.com) (74.125.82.44) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES128-GCM-SHA256 encrypted) ESMTPS; Sat, 12 Dec 2015 12:33:09 +0000 Received: by mail-wm0-f44.google.com with SMTP id l68so47970166wml.0 for ; Sat, 12 Dec 2015 04:33:08 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:to:from:subject:message-id:date:user-agent :mime-version:content-type:content-transfer-encoding; bh=5ru9FJGOGYKk3XhzEWpzWPd3HNFGRjEpC+T3zEoujjM=; b=BAg9wl3D+Ts24uWKz9OAZKWDN6Iy7/zl59hEE9lMhZ8H/0zkBjOgcivZaEjHrMAXDg 1MAQ7wytMp6/gWCv45NFk97ntgjTMfnFm7nqcQAr21ls8eAvL0b/vuCYL9OeWGbj0YBQ UF6+iTEAtzsnZvGhQscVray1G+dw8ZnPM2/4LVyfLDVoW/oL09pJaEmH4gXVQOaJ1IRh zRS/yiwKuBO+jmuQOyL2KJ3HBjbLLaf0TekMLshgLvL0TI/FZS/q/jVZBaH0MXyoaSC2 JvoBxu9MaU9MwbnC0BuwoP5D5s87o+ecQ6l8b3F2YiAanPFfR29hFVY4Oqu4p6Sa+00d p+yA== X-Gm-Message-State: ALoCoQkfIUxoiRRpYh8IOfeMZAwZkImFddKRYlATzHEojgBoXhBwETCI2L+ieoInE0Py2MMo7F1G2qNd8yrYy+AxjgD/A7ZHzQ== X-Received: by 10.28.216.201 with SMTP id p192mr12508081wmg.29.1449923585951; Sat, 12 Dec 2015 04:33:05 -0800 (PST) Received: from localhost.localdomain (admins.1h.com. [82.118.240.130]) by smtp.gmail.com with ESMTPSA id t5sm7499649wmt.1.2015.12.12.04.33.04 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sat, 12 Dec 2015 04:33:05 -0800 (PST) To: systemtap@sourceware.org From: Nikolay Borisov Subject: printing kernel backtrace Message-ID: <566C1400.1060108@siteground.com> Date: Sat, 12 Dec 2015 12:33:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.1.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-SW-Source: 2015-q4/txt/msg00276.txt.bz2 Hello, I've started experimenting with systemtamp and I'd like to print the callstack leading to the probed function. To that effect I have created the following very simple tapset: probe module("dm_thin_pool").function("do_waker") { print_syms(callers(-1)) printf("finished backtrace\n"); } However the output I get is something like that: 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffff810a5025 : 0xffffffff810a5025 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c80 : do_waker+0x0/0x40 [dm_thin_pool] 0xffffffffa0152c8 : 0xffffffffa0152c8 finished backtrace It seems that systemtap is unable to unwind the debug information? I believe I have compiled systemtap with the necessary unwidn libraries but how do I check that for sure?