This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/15942] New: support abbreviated process.* probes with stap -x PID


https://sourceware.org/bugzilla/show_bug.cgi?id=15942

            Bug ID: 15942
           Summary: support abbreviated process.* probes with stap -x PID
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: translator
          Assignee: systemtap at sourceware dot org
          Reporter: fche at redhat dot com

PR12427 introduced the ability to let a user abbreviate process
probes by inferring the path from the -c CMD argument.  We can do
the same with -x PID, perhaps the following way:

- stap --no-use-server -e 'probe process.foo {}' -x PID
  .... map to process("PATH") where PATH = readlink("/proc/PID/exe"),
  in the same place as PR12427 (dwarf_builder::build)

- stap --use-server -e 'probe process.foo {}' -x PID
  .... map to stap server_options "-c PATH" with same PATH
  (IOW, pretend to the stap-server that the user typed -c PATH).

-- 
You are receiving this mail because:
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]