This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug kprobes/2408] [RHEL4 U4] Backport Kprobes fixes from mainline


------- Additional Comments From hien at us dot ibm dot com  2006-03-13 21:31 -------
(In reply to comment #15)
> (In reply to comment #14)
> > (In reply to comment #13)
> > > Josh, thanks for testing. For kprobe fault handler testing you can run the 
> > > below script. Basically this tries to access userspace 
> > > address from kprobe prehandler.
> > > 
> > > ----------------------------- 
> > > probe syscall.*, syscall.*.return {
> > >         if (pid() == target()) {
> > >                 if (returnp)
> > >                         printf("%d\n", returnval())
> > >                 else
> > >                         printf("%s (%s) = ", name, argstr)
> > >         }
> > > }
> > > -------------------------------
> > 
> > After commenting out some unresolved functions from i686/syscalls.stp, this test
> > script ran fine.  I don't know if there's a particular target application that's
> > good for testing this - I used 'du' on my home directory.
> 
> You can try to run this script as 
> 
> stap -x <pid> sys.stp
> 
> where pid is the pid of a bash shell, then go to that shell and try out commands
> like
> chdir, rmdir, cat etc... 

Oops, I meant 
mkdir, rmdir, cat, cd etc...

-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=2408

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]