Files
sysprof/process.h
Soren Sandmann b98db05f9b Add commented out code to reject callback.
2008-02-17  Soren Sandmann  <sandmann@redhat.com>

	* collector.c (lookup_symbol): Add commented out code to reject
	callback.

	* elfparser.c (struct ElfParser): Store the filename if any
	(elf_parser_get_sym_address): Subtract the load address, so the
	result will be an offset into the text section.

	* process.[ch] (process_lookup_symbol): Add an offset out-argument
	
	* binfile.[ch] (bin_symbol_get_address): New function

	* TODO: updates



svn path=/trunk/; revision=397
2008-02-17 23:31:19 +00:00

65 lines
2.4 KiB
C

/* MemProf -- memory profiler and leak detector
* Copyright 1999, 2000, 2001, Red Hat, Inc.
* Copyright 2002, Kristian Rietveld
*
* Sysprof -- Sampling, systemwide CPU profiler
* Copyright 2004, Red Hat, Inc
* Copyright 2004, 2005, Soeren Sandmann
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
*/
#ifndef PROCESS_H
#define PROCESS_H
#include <glib.h>
#include "binfile.h"
typedef struct Process Process;
/* We are making the assumption that pid's are not recycled during
* a profiling run. That is wrong, but necessary to avoid reading
* from /proc/<pid>/maps on every sample (which would be a race
* condition anyway).
*
* If the address passed to new_from_pid() is somewhere that hasn't
* been checked before, the mappings are reread for the Process. This
* means that if some previously sampled pages have been unmapped,
* they will be lost and appear as "???" on the profile.
*
* To flush the pid cache, call process_flush_caches().
* This will invalidate all instances of Process.
*
* The real fix for this is probably to have the kernel module report the
* maps along with the stacktrace.
*
*/
Process * process_get_from_pid (int pid);
void process_ensure_map (Process *process,
int pid,
gulong address);
const char * process_lookup_symbol (Process *process,
gulong address,
gulong *offset);
const char * process_get_cmdline (Process *process);
void process_flush_caches (void);
const guint8 *process_get_vdso_bytes (gsize *length);
gboolean process_is_kernel_address (gulong address);
const char * process_lookup_kernel_symbol (gulong address,
gulong *offset);
#endif