This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
Re: user mode backtrace
- From: fche at redhat dot com (Frank Ch. Eigler)
- To: "Stone, Joshua I" <joshua dot i dot stone at intel dot com>
- Cc: <david_list at boreham dot org>, "SystemTap" <systemtap at sources dot redhat dot com>
- Date: 19 Oct 2006 20:09:50 -0400
- Subject: Re: user mode backtrace
- References: <C56DB814FAA30B418C75310AC4BB279DCC3D8B@scsmsx413.amr.corp.intel.com>
"Stone, Joshua I" <joshua.i.stone@intel.com> writes:
> [...] Deadlock issues aside, there's not really a way for you to
> invoke a process (like pstack) from within a SystemTap script. [...]
It turns out that quite some time ago, Martin implemented a clone of
the dtrace system() function for systemtap, which enqueues a string
for execution by the userspace staprun daemon. (There is no
synchronization or data exchange though.)
- FChE