This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug tapsets/6613] New: utrace-based syscall.* probes


It will probably be desirable to use utrace probes as a backend
implementation for system call probes on kernels that support it.

In the tapset, this could be implemented thusly:

probe syscall.read = syscall_ut.read ! , syscall_kps.read !, syscall_kp.read 
   { /* construct argstr, name */ }
probe syscall_ut.read = process("*").syscall { if ($syscall != SYS_READ) next;
                                               /* also extract args */ }
probe syscall_kps.read = kernel.function("sys_open") { /* as in syscall_nd */ }
probe syscall_kp.read = kernel.function("sys_open") { /* param=$param ... */ }

It would be nice to merge and/or place these alternatives closer together,
but that's a separate matter.

-- 
           Summary: utrace-based syscall.* probes
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tapsets
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: fche at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=6613

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]