diff options
author | Frank Ch. Eigler <fche@elastic.org> | 2008-02-19 14:26:42 -0500 |
---|---|---|
committer | Frank Ch. Eigler <fche@elastic.org> | 2008-02-19 14:26:42 -0500 |
commit | 661f6234c23e077f088859da0fe6f95511de6679 (patch) | |
tree | 69adc1e0c0b2912b0b07b8752cf9e782f9f289c9 /NEWS | |
parent | 0f05501579dc0a4e66ccbbd8e0b29d052d9b5920 (diff) | |
parent | a73014758df9ba7f832c8f13305652a777b574a9 (diff) | |
download | systemtap-steved-661f6234c23e077f088859da0fe6f95511de6679.tar.gz systemtap-steved-661f6234c23e077f088859da0fe6f95511de6679.tar.xz systemtap-steved-661f6234c23e077f088859da0fe6f95511de6679.zip |
Merge branch 'master' of git://sources.redhat.com/git/systemtap
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 11 |
1 files changed, 11 insertions, 0 deletions
@@ -1,5 +1,16 @@ * What's new in version 0.6 / 0.6.1 +- Prototype support for user-space probing is showing some progress. + No symbolic notations are supported yet (so no probing by function names, + file names, process names, and no access to $context variables), but at + least it's something: + + probe process(PID).statement(ADDRESS).absolute { } + + This will set a uprobe on the given process-id and given virtual address. + The proble handler runs in kernel-space as usual, and can generally use + existing tapset functions. + - Crash utility can retrieve systemtap's relay buffer from a kernel dump image by using staplog which is a crash extension module. To use this feature, type commands as below from crash(8)'s command line: |