This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |
Other format: | [Raw text] |
Hi,Yes, it can help you narrow down the areas to look for.
I'm having several Oopss while running tests of an application which has: - one patch applied to the kernel - one kernel module The analysis of the Oopss clearly show that "someone" writes strings (like "ata" or "ejbo") randomly in memory and destroys links in structures, like vmlilst used by get_vmalloc_info in fs/proc/mmu.c or ulp->proc_list used by loop_undo in ipc/sems.c . Maybe my code is the culprit, or not.
Do you think SystemTap can help me finding the culprit ?
If yes, do you have recommendations and proposals about how to useA general proposal below.
SystemTap for that goal ?
Can you point me to documentations providing the basic for usingFolks have used SystemTap to solve real life problems so it is ready for use. The main documentation you need to look at is the tutorial on the web and man pages that come with the install. If you don't find that sufficient to get going feel free to send a note in the mailing list and we will help you ASAP.
SystemTap in real ?
probe timer.ms(5000) { /* code to print your data structures */ }
Thanks,
Tony
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |