* [Bug translator/10208] Support probing glibc synthesized syscall wrappers
[not found] <bug-10208-6586@http.sourceware.org/bugzilla/>
@ 2013-08-26 12:29 ` lberk at redhat dot com
0 siblings, 0 replies; 4+ messages in thread
From: lberk at redhat dot com @ 2013-08-26 12:29 UTC (permalink / raw)
To: systemtap
http://sourceware.org/bugzilla/show_bug.cgi?id=10208
Lukas Berk <lberk at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |ASSIGNED
CC| |lberk at redhat dot com
Assignee|systemtap at sourceware dot org |lberk at redhat dot com
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug translator/10208] Support probing glibc synthesized syscall wrappers
[not found] <bug-10208-1110@http.sourceware.org/bugzilla/>
@ 2010-11-26 21:59 ` fche at redhat dot com
0 siblings, 0 replies; 4+ messages in thread
From: fche at redhat dot com @ 2010-11-26 21:59 UTC (permalink / raw)
To: systemtap
http://sourceware.org/bugzilla/show_bug.cgi?id=10208
Frank Ch. Eigler <fche at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |fche at redhat dot com
--- Comment #3 from Frank Ch. Eigler <fche at redhat dot com> 2010-11-26 21:58:56 UTC ---
A related sighting:
http://sourceware.org/ml/systemtap/2010-q4/msg00250.html
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug translator/10208] Support probing glibc synthesized syscall wrappers
2009-05-27 14:26 [Bug translator/10208] New: Support probing weak symbol functions mjw at redhat dot com
2009-05-27 15:06 ` [Bug translator/10208] Support probing glibc synthesized syscall wrappers fche at redhat dot com
@ 2009-05-28 9:32 ` mjw at redhat dot com
1 sibling, 0 replies; 4+ messages in thread
From: mjw at redhat dot com @ 2009-05-28 9:32 UTC (permalink / raw)
To: systemtap
------- Additional Comments From mjw at redhat dot com 2009-05-28 09:32 -------
Isn't this two separate things/bug reports?
- Supporting probing on weak symbols, and
- Having debuginfo for synthesized syscall wrappers?
--
http://sourceware.org/bugzilla/show_bug.cgi?id=10208
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
^ permalink raw reply [flat|nested] 4+ messages in thread
* [Bug translator/10208] Support probing glibc synthesized syscall wrappers
2009-05-27 14:26 [Bug translator/10208] New: Support probing weak symbol functions mjw at redhat dot com
@ 2009-05-27 15:06 ` fche at redhat dot com
2009-05-28 9:32 ` mjw at redhat dot com
1 sibling, 0 replies; 4+ messages in thread
From: fche at redhat dot com @ 2009-05-27 15:06 UTC (permalink / raw)
To: systemtap
------- Additional Comments From fche at redhat dot com 2009-05-27 15:06 -------
It turns out there is no dwarf data for chown in glibc.
That's because many of the syscall wrappers are not written
in ordinary C code, but instead generated (assembly) code:
make[2]: Entering directory `/home/fche/Private/DEVEL/DEVEL-sourceware/glibc/io'
(echo '#include <sysdep.h>'; \
echo 'PSEUDO (__libc_chown, chown, 3)'; \
echo ' ret'; \
echo 'PSEUDO_END(__libc_chown)'; \
echo 'libc_hidden_def (__libc_chown)'; \
echo 'weak_alias (__libc_chown, __chown)'; \
echo 'libc_hidden_weak (__chown)'; \
echo 'weak_alias (__libc_chown, chown)'; \
echo 'libc_hidden_weak (chown)'; \
) | gcc -c -I../include -I[...] -I.. -I../libio -I. -I
/lib/modules/2.6.27.12-78.2.8.fc9.x86_64.debug/build/include -D_LIBC_REENTRANT
-include ../include/libc-symbols.h -DASSEMBLER -Wa,--noexecstack -x
assembler-with-cpp -o
/home/fche/Private/DEVEL/DEVEL-sourceware/glibc/BUILD/io/chown.o -
objdump -dr chown.o
chown.o: file format elf64-x86-64
Disassembly of section .text:
0000000000000000 <__libc_chown>:
0: b8 5c 00 00 00 mov $0x5c,%eax
5: 0f 05 syscall
7: 48 3d 01 f0 ff ff cmp $0xfffffffffffff001,%rax
d: 0f 83 00 00 00 00 jae 13 <__libc_chown+0x13>
f: R_X86_64_PC32 __syscall_error-0x4
13: c3 retq
So we may have to synthesize debuginfo for these functions.
Or go debuginfo-less, and search symbol tables for plain addresses.
--
What |Removed |Added
----------------------------------------------------------------------------
Summary|Support probing weak symbol |Support probing glibc
|functions |synthesized syscall wrappers
http://sourceware.org/bugzilla/show_bug.cgi?id=10208
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2013-08-26 12:29 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
[not found] <bug-10208-6586@http.sourceware.org/bugzilla/>
2013-08-26 12:29 ` [Bug translator/10208] Support probing glibc synthesized syscall wrappers lberk at redhat dot com
[not found] <bug-10208-1110@http.sourceware.org/bugzilla/>
2010-11-26 21:59 ` fche at redhat dot com
2009-05-27 14:26 [Bug translator/10208] New: Support probing weak symbol functions mjw at redhat dot com
2009-05-27 15:06 ` [Bug translator/10208] Support probing glibc synthesized syscall wrappers fche at redhat dot com
2009-05-28 9:32 ` mjw at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).