>>> Konrad Rzeszutek Wilk 04/06/16 4:39 AM >>>
>On Fri, Apr 01, 2016 at 09:23:15AM -0600, Jan Beulich wrote:
>> >>> On 24.03.16 at 21:00, wrote:
>> > @@ -331,16 +332,17 @@ static char *pointer(char *str, char *end, const
>> > char **fmt_ptr,
>> > {
>> > unsigned long sym_size, sym_
On Fri, Apr 01, 2016 at 09:23:15AM -0600, Jan Beulich wrote:
> >>> On 24.03.16 at 21:00, wrote:
> > @@ -331,16 +332,17 @@ static char *pointer(char *str, char *end, const char
> > **fmt_ptr,
> > {
> > unsigned long sym_size, sym_offset;
> > char namebuf[KSYM_NAME_LEN+1];
>
>>> On 24.03.16 at 21:00, wrote:
> @@ -331,16 +332,17 @@ static char *pointer(char *str, char *end, const char
> **fmt_ptr,
> {
> unsigned long sym_size, sym_offset;
> char namebuf[KSYM_NAME_LEN+1];
> +bool_t payload = 0;
>
> /* Advance parents fmt string
Naturally the backtrace is presented when an instruction
hits an bug_frame or %p is used.
The payloads do not support bug_frames yet - however the functions
the payloads call could hit an BUG() or WARN().
The traps.c has logic to scan for it this - and eventually it will
find the correct bug_fram