This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/15942] New: support abbreviated process.* probes with stap -x PID
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Tue, 10 Sep 2013 20:26:25 +0000
- Subject: [Bug translator/15942] New: support abbreviated process.* probes with stap -x PID
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=15942
Bug ID: 15942
Summary: support abbreviated process.* probes with stap -x PID
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
Assignee: systemtap at sourceware dot org
Reporter: fche at redhat dot com
PR12427 introduced the ability to let a user abbreviate process
probes by inferring the path from the -c CMD argument. We can do
the same with -x PID, perhaps the following way:
- stap --no-use-server -e 'probe process.foo {}' -x PID
.... map to process("PATH") where PATH = readlink("/proc/PID/exe"),
in the same place as PR12427 (dwarf_builder::build)
- stap --use-server -e 'probe process.foo {}' -x PID
.... map to stap server_options "-c PATH" with same PATH
(IOW, pretend to the stap-server that the user typed -c PATH).
--
You are receiving this mail because:
You are the assignee for the bug.