Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 511947 Details for
Bug 717136
markers in DSO do not get called
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh92 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
prelinked libraries, missing +uprobes
borked (text/plain), 2.45 KB, created by
Frank Ch. Eigler
on 2011-07-08 15:24:24 UTC
(
hide
)
Description:
prelinked libraries, missing +uprobes
Filename:
MIME Type:
Creator:
Frank Ch. Eigler
Created:
2011-07-08 15:24:24 UTC
Size:
2.45 KB
patch
obsolete
>very /home/fche/Private/DEVEL/DEVEL-systemtap/git/BUILD >[11:22:25] % sudo prelink /lib64/libpthread-2.14.so > >very /home/fche/Private/DEVEL/DEVEL-systemtap/git/BUILD >[11:22:30] % sudo ./stap -DDEBUG_UPROBES -DDEBUG_TASK_FINDER_VMA -DDEBUG_TASK_FINDER ../systemtap/testsuite/systemtap.examples/general/eventcount.stp 'process("/lib*/libpthread-2.14.so").mark("*")' -c ./testsuite/foo >Starting event counting at Fri Jul 8 11:22:40 2011 EDT, pid 23972 + children >stap_start_task_finder:1670: attach count: 2, inuse count: 0 >stap_uprobe_process_munmap:334: +proc pid 23972 stf ffffffffa07bb8d0 ffffffffa07bb8d0 path /lib64/libpthread-2.14.so >stap_uprobe_process_munmap:334: +proc pid 23972 stf ffffffffa07bb998 ffffffffa07bb998 path /lib/libpthread-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x400000 0xa000 0x0 r-xp /home/fche/Private/DEVEL/DEVEL-systemtap/git/INST/libexec/systemtap/stapio >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x60a000 0x1000 0xa000 rw-p /home/fche/Private/DEVEL/DEVEL-systemtap/git/INST/libexec/systemtap/stapio >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x302f600000 0x18f000 0x0 r-xp /lib64/libc-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x302f78f000 0x1ff000 0x18f000 ---p /lib64/libc-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x302f98e000 0x4000 0x18e000 r--p /lib64/libc-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x302f992000 0x1000 0x192000 rw-p /lib64/libc-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x303e200000 0x16000 0x0 r-xp /lib64/libpthread-2.14.so >stap_uprobe_mmap_found:292: +mmap X pid 23972 path /lib64/libpthread-2.14.so addr 000000303e200000 length 90112 offset (null) stf ffffffffa07bb8d0 ffffffffa07bb8d0 path /lib64/libpthread-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x303e216000 0x1ff000 0x16000 ---p /lib64/libpthread-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x303e415000 0x1000 0x15000 r--p /lib64/libpthread-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x303e416000 0x1000 0x16000 rw-p /lib64/libpthread-2.14.so >stap_uprobe_mmap_found:307: +mmap W pid 23972 path /lib64/libpthread-2.14.so addr 000000303e416000 length 4096 offset 0000000000016000 stf ffffffffa07bb8d0 ffffffffa07bb8d0 path /lib64/libpthread-2.14.so >__stp_call_mmap_callbacks:637: pid 23972, a/l/o/p/path 0x358a000000 0x1f000 0x0 r-xp /lib64/ld-2.14.so
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 717136
: 511947 |
511948
|
513288