This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug kprobes/2408] [RHEL4 U4] Backport Kprobes fixes from mainline
- From: "hien at us dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 13 Mar 2006 21:28:04 -0000
- Subject: [Bug kprobes/2408] [RHEL4 U4] Backport Kprobes fixes from mainline
- References: <20060301202710.2408.anil.s.keshavamurthy@intel.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From hien at us dot ibm dot com 2006-03-13 21:28 -------
(In reply to comment #14)
> (In reply to comment #13)
> > Josh, thanks for testing. For kprobe fault handler testing you can run the
> > below script. Basically this tries to access userspace
> > address from kprobe prehandler.
> >
> > -----------------------------
> > probe syscall.*, syscall.*.return {
> > if (pid() == target()) {
> > if (returnp)
> > printf("%d\n", returnval())
> > else
> > printf("%s (%s) = ", name, argstr)
> > }
> > }
> > -------------------------------
>
> After commenting out some unresolved functions from i686/syscalls.stp, this test
> script ran fine. I don't know if there's a particular target application that's
> good for testing this - I used 'du' on my home directory.
You can try to run this script as
stap -x <pid> sys.stp
where pid is the pid of a bash shell, then go to that shell and try out commands
like
chdir, rmdir, cat etc...
--
http://sourceware.org/bugzilla/show_bug.cgi?id=2408
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.