This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/6613] New: utrace-based syscall.* probes
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 9 Jun 2008 22:13:35 -0000
- Subject: [Bug tapsets/6613] New: utrace-based syscall.* probes
- Reply-to: sourceware-bugzilla at sourceware dot org
It will probably be desirable to use utrace probes as a backend
implementation for system call probes on kernels that support it.
In the tapset, this could be implemented thusly:
probe syscall.read = syscall_ut.read ! , syscall_kps.read !, syscall_kp.read
{ /* construct argstr, name */ }
probe syscall_ut.read = process("*").syscall { if ($syscall != SYS_READ) next;
/* also extract args */ }
probe syscall_kps.read = kernel.function("sys_open") { /* as in syscall_nd */ }
probe syscall_kp.read = kernel.function("sys_open") { /* param=$param ... */ }
It would be nice to merge and/or place these alternatives closer together,
but that's a separate matter.
--
Summary: utrace-based syscall.* probes
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: fche at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=6613
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.