From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19205 invoked by alias); 4 Sep 2010 05:11:50 -0000 Received: (qmail 19193 invoked by uid 22791); 4 Sep 2010 05:11:49 -0000 X-SWARE-Spam-Status: No, hits=-5.6 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_HI,SPF_HELO_PASS,T_RP_MATCHES_RCVD X-Spam-Check-By: sourceware.org Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Sat, 04 Sep 2010 05:11:44 +0000 Received: from int-mx01.intmail.prod.int.phx2.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) by mx1.redhat.com (8.13.8/8.13.8) with ESMTP id o845BdeZ018543 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Sat, 4 Sep 2010 01:11:40 -0400 Received: from fche.csb (vpn-8-23.rdu.redhat.com [10.11.8.23]) by int-mx01.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id o845Bdv6008863; Sat, 4 Sep 2010 01:11:39 -0400 Received: by fche.csb (Postfix, from userid 2569) id ABB31580FF; Sat, 4 Sep 2010 01:11:38 -0400 (EDT) Date: Sat, 04 Sep 2010 05:11:00 -0000 From: "Frank Ch. Eigler" To: Hui Zhu Cc: Steven , "gdb@sourceware.org" , linux-kernel@vger.kernel.org, Michael Snyder , Marc Khouzam , Thiago Jung Bauermann Subject: Re: Linux Kernel GDB tracepoint module 2010-8-30 release Message-ID: <20100904051138.GC10118@redhat.com> References: <1283504768.2100.43.camel@steven> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.2i Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2010-09/txt/msg00020.txt.bz2 Hi - On Sat, Sep 04, 2010 at 12:29:56PM +0800, Hui Zhu wrote: > [...] Could you talk about how it do call stack dump like following? > (gdb) trace vfs_readdir > Tracepoint 1 at 0xffffffff8113f7fc: file > /home/teawater/kernel/linux-2.6/fs/readdir.c, line 24. > (gdb) actions > >collect *(unsigned char *)$rsp@512 probe kernel.function("vfs_readdir") { // if you want the whole kernel-side backtrace, dwarf-unwound print_backtrace() // or else just hex-dump a region printf("%*M\n", 512, register("rsp")) } > BTW, I was not find out which ARCH of the systemtap support in its > website? It support all the arch that kprobe support? Yes, basically, though it's mostly tested on RHELy platforms (x86, powerpc, s390, ia64). - FChE