diff options
author | David Smith <dsmith@redhat.com> | 2008-04-18 12:23:52 -0500 |
---|---|---|
committer | David Smith <dsmith@redhat.com> | 2008-04-18 12:23:52 -0500 |
commit | 29cb9b42bd28a22ab926ed1a577267e4c54d935a (patch) | |
tree | 5bc029868c7f6e3c95044bfafd64958812ed6e9d | |
parent | d53185450a3736e1ef2f685aefd3ce37ccb50aec (diff) | |
download | systemtap-steved-29cb9b42bd28a22ab926ed1a577267e4c54d935a.tar.gz systemtap-steved-29cb9b42bd28a22ab926ed1a577267e4c54d935a.tar.xz systemtap-steved-29cb9b42bd28a22ab926ed1a577267e4c54d935a.zip |
Added utrace probe documentation.
2008-04-18 David Smith <dsmith@redhat.com>
* stapprobes.5.in: Added information about utrace probes.
-rw-r--r-- | ChangeLog | 4 | ||||
-rw-r--r-- | stapprobes.5.in | 34 |
2 files changed, 38 insertions, 0 deletions
@@ -1,3 +1,7 @@ +2008-04-18 David Smith <dsmith@redhat.com> + + * stapprobes.5.in: Added information about utrace probes. + 2008-04-17 Josh Stone <joshua.i.stone@intel.com> * tapsets.cxx (build_blacklist): Fix regexps for atomics. diff --git a/stapprobes.5.in b/stapprobes.5.in index ce8ef52d..fdba10be 100644 --- a/stapprobes.5.in +++ b/stapprobes.5.in @@ -306,6 +306,40 @@ in that both use raw (unverified) virtual addresses and provide no $variables. The target PID parameter must identify a running process, and ADDRESS should identify a valid instruction address. All threads of that process will be probed. +.PP +Additional user-space probing is available in the following forms: +.SAMPLE +process(PID).clone +process("PATH").clone +process(PID).death +process("PATH").death +process(PID).syscall +process("PATH").syscall +process(PID).syscall.return +process("PATH").syscall.return +.ESAMPLE +.PP +A +.B .clone +probe gets called when a thread described by PID or PATH creates a new +thread. +A +.B .death +probe gets called when a thread described by PID or PATH dies. +A +.B .syscall +probe gets called when a thread described by PID or PATH makes a +system call. The system call number is available in the "$syscall" +context variable. +A +.B .syscall.return +probe gets called when a thread described by PID or PATH returns from a +system call. The system call number is available in the "$syscall" +context variable. +.PP +Note that +.I PATH +pathnames must be absolute. .SS PROCFS |