This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/2111] document syscalls tapset
- From: "mcermak at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Wed, 05 Aug 2015 11:38:44 +0000
- Subject: [Bug tapsets/2111] document syscalls tapset
- Auto-submitted: auto-generated
- References: <bug-2111-6586 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=2111
--- Comment #11 from Martin Cermak <mcermak at redhat dot com> ---
When 'kernel.function' gets replaced by 'kprobe.function' in whole the tapset,
I seem to be able to get syscalls list per architecture using cross-compilation
(without having respective kernel-debuginfo):
=======
fc20 x86_64 # cat syscalls_per_arch
MYARCH=$1
ORIG=/usr/share/systemtap/tapset
TEMP=`mktemp -d`
cp -r ${ORIG}/* ${TEMP}/
find $TEMP -type f -exec sed -i 's/kernel\.function/kprobe\.function/g' {} \;
export SYSTEMTAP_TAPSET=$TEMP
stap -a $MYARCH -L 'syscall.*' 2> /dev/null | perl -anle 'print shift @F, "
@{[sort @F]}"' | sort
rm -rf $TEMP
fc20 x86_64 # ./syscalls_per_arch s390 | tail
syscall.utimensat argstr:unknown dfd:unknown dfd_str:unknown filename:unknown
filename_uaddr:unknown flags:unknown flags_str:unknown name:unknown
tsp_uaddr:unknown
syscall.utimes argstr:unknown filename:unknown filename_uaddr:unknown
name:unknown tvp_uaddr:unknown
syscall.vfork argstr:unknown name:unknown
syscall.vhangup argstr:unknown name:unknown
syscall.vmsplice argstr:unknown name:unknown
syscall.wait4 argstr:unknown name:unknown options:unknown options_str:unknown
pid:unknown rusage_uaddr:unknown status_uaddr:unknown
syscall.waitid argstr:unknown infop_uaddr:unknown name:unknown options:unknown
options_str:unknown pid:unknown rusage_uaddr:unknown which:unknown
which_str:unknown
syscall.waitpid argstr:unknown name:unknown options:unknown options_str:unknown
pid:unknown status_uaddr:unknown
syscall.write argstr:unknown buf_uaddr:unknown count:unknown fd:unknown
name:unknown
syscall.writev argstr:unknown count:unknown fd:unknown name:unknown
vector_uaddr:unknown
fc20 x86_64 #
=======
With nd_syscalls this is even more straightforward. I wonder if this is worth
of some elaboration.
--
You are receiving this mail because:
You are the assignee for the bug.