summaryrefslogtreecommitdiffstats
path: root/tapset/x86_64
diff options
context:
space:
mode:
authorhunt <hunt>2006-05-26 22:57:25 +0000
committerhunt <hunt>2006-05-26 22:57:25 +0000
commit66487a5bcf976363573ec2c5dd1dda66c353a1ae (patch)
tree9632d67cedc8751119feeb9d249b7bd2e4fa01ae /tapset/x86_64
parent824450ececbcbbe9554bf94054b2851d18d1fdc1 (diff)
downloadsystemtap-steved-66487a5bcf976363573ec2c5dd1dda66c353a1ae.tar.gz
systemtap-steved-66487a5bcf976363573ec2c5dd1dda66c353a1ae.tar.xz
systemtap-steved-66487a5bcf976363573ec2c5dd1dda66c353a1ae.zip
2006-05-26 Martin Hunt <hunt@redhat.com>
* errno.stp: Add octal option for returnstr. * [i686,x86_64]/syscalls.stp (umask): Print args and return in octal. (add_key): Comment out. This syscall is added by a xen patch and may not be present. (tux): Ditto. * syscalls.stp (accept): Fix arg name.
Diffstat (limited to 'tapset/x86_64')
-rw-r--r--tapset/x86_64/syscalls.stp61
1 files changed, 31 insertions, 30 deletions
diff --git a/tapset/x86_64/syscalls.stp b/tapset/x86_64/syscalls.stp
index c177c33c..7bc83645 100644
--- a/tapset/x86_64/syscalls.stp
+++ b/tapset/x86_64/syscalls.stp
@@ -131,19 +131,19 @@ probe syscall.acct.return = kernel.function("sys_acct").return {
# const void __user *_payload,
# size_t plen,
# key_serial_t ringid)
-probe syscall.add_key = kernel.function("sys_add_key") {
- name = "add_key"
- type_uaddr = $_type
- description_auddr = $_description
- payload_uaddr = $_payload
- plen = $plen
- ringid = $ringid
- argstr = "add_key"
-}
-probe syscall.add_key.return = kernel.function("sys_add_key").return {
- name = "add_key"
- retstr = returnstr(1)
-}
+#probe syscall.add_key = kernel.function("sys_add_key") {
+# name = "add_key"
+# type_uaddr = $_type
+# description_auddr = $_description
+# payload_uaddr = $_payload
+# plen = $plen
+# ringid = $ringid
+# argstr = "add_key"
+#}
+#probe syscall.add_key.return = kernel.function("sys_add_key").return {
+# name = "add_key"
+# retstr = returnstr(1)
+#}
# quotactl ___________________________________________________
#
@@ -392,29 +392,30 @@ probe kernel.syscall.time64.return = kernel.function("sys_time64").return {
* sys_tux (unsigned int action,
* user_req_t *u_info)
*/
-probe kernel.syscall.tux = kernel.function("sys_tux") {
- name = "tux"
- action = $action
- u_info_uaddr = $u_info
- argstr = sprintf("%d, [%p]", $action, u_info_uaddr)
-}
-probe kernel.syscall.tux.return = kernel.function("sys_tux").return {
- name = "tux"
- retstr = returnstr(1)
-}
+#probe kernel.syscall.tux = kernel.function("sys_tux") {
+# name = "tux"
+# action = $action
+# u_info_uaddr = $u_info
+# argstr = sprintf("%d, [%p]", $action, u_info_uaddr)
+#}
+#probe kernel.syscall.tux.return = kernel.function("sys_tux").return {
+# name = "tux"
+# retstr = returnstr(1)
+#}
+
# umask ______________________________________________________
/*
* asmlinkage long
* sys_umask(int mask)
*/
-probe kernel.syscall.umask = kernel.function("sys_umask") {
+probe syscall.umask = kernel.function("sys_umask") {
name = "umask"
- /*
- * doesnt like $mask on x86_64 ????
- */
- argstr = sprint($mask)
+ mask = $mask
+ argstr = sprintf("%#o", $mask)
}
-probe kernel.syscall.umask.return = kernel.function("sys_umask").return {
+probe syscall.umask.return =
+ kernel.function("sys_umask").return {
name = "umask"
- retstr = returnstr(1)
+ retstr = returnstr(3)
}
+