diff options
author | hunt <hunt> | 2007-08-16 12:55:19 +0000 |
---|---|---|
committer | hunt <hunt> | 2007-08-16 12:55:19 +0000 |
commit | 48c53a66e4ffe18158d6f34f288160570609627e (patch) | |
tree | a4c3d839da5cdbd826dc914387759a116516459b /tapset/syscalls.stp | |
parent | 79d4965dd7aa252bd8580f9d828a5a1ee8401649 (diff) | |
download | systemtap-steved-48c53a66e4ffe18158d6f34f288160570609627e.tar.gz systemtap-steved-48c53a66e4ffe18158d6f34f288160570609627e.tar.xz systemtap-steved-48c53a66e4ffe18158d6f34f288160570609627e.zip |
2007-08-16 Martin Hunt <hunt@redhat.com>
* aux_syscalls.stp (__get_argv): Add parameter to
optionally skip the first argv (argv[0]).
(__get_compat_argv): Ditto.
* syscalls.stp (execve): Set args to the whole argv.
For argstr use filename plus argv starting at [1].
(compat_execve): Ditto.
* ppc64/syscalls.stp (sys32_exevve): Ditto.
From Cai Fei <caifei@cn.fujitsu.com>
* syscalls.stp (sts_getpgid): Add pid arg.
Diffstat (limited to 'tapset/syscalls.stp')
-rw-r--r-- | tapset/syscalls.stp | 12 |
1 files changed, 7 insertions, 5 deletions
diff --git a/tapset/syscalls.stp b/tapset/syscalls.stp index 502019b4..5c733b9c 100644 --- a/tapset/syscalls.stp +++ b/tapset/syscalls.stp @@ -541,8 +541,8 @@ probe syscall.epoll_wait.return = kernel.function("sys_epoll_wait").return { probe syscall.execve = kernel.function("do_execve") { name = "execve" filename = kernel_string($filename) - args = __get_argv($argv) - argstr = sprintf("%s %s", filename, args) + args = __get_argv($argv, 0) + argstr = sprintf("%s %s", filename, __get_argv($argv, 1)) } # v2.6.15-rc2 or earlier has problems with sys_execve return probes # another reason to probe on do_execve @@ -557,8 +557,8 @@ probe syscall.execve.return = kernel.function("do_execve").return { probe syscall.compat_execve = kernel.function("compat_do_execve") ? { name = "compat_execve" filename = kernel_string($filename) - args = __get_compat_argv($argv) - argstr = sprintf("%s %s", filename, args) + args = __get_compat_argv($argv, 0) + argstr = sprintf("%s %s", filename, __get_compat_argv($argv, 1)) } probe syscall.compat_execve.return = kernel.function("compat_do_execve").return ? { name = "compat_execve" @@ -1267,9 +1267,11 @@ probe syscall.getpeername.return = kernel.function("sys_getpeername").return { } # getpgid ____________________________________________________ -# long sys_getpgid(void) +# long sys_getpgid(pid_t pid) probe syscall.getpgid = kernel.function("sys_getpgid") { name = "getpgid" + pid = $pid + argstr = sprintf("%d", $pid) } probe syscall.getpgid.return = kernel.function("sys_getpgid").return { name = "getpgid" |