stapprobes man page on RedHat

Man page or keyword search:  
man Server   29550 pages
apropos Keyword Search (all sections)
Output format
RedHat logo
[printable version]

STAPPROBES(3stap)					     STAPPROBES(3stap)

NAME
       stapprobes - systemtap probe points

DESCRIPTION
       The  following sections enumerate the variety of probe points supported
       by the systemtap translator, and some of the additional aliases defined
       by  standard  tapset  scripts.  Many are individually documented in the
       3stap manual section, with the probe:: prefix.

SYNTAX
	      probe PROBEPOINT [, PROBEPOINT] { [STMT ...] }

       A probe declaration may list multiple comma-separated probe  points  in
       order  to  attach  a handler to all of the named events.	 Normally, the
       handler statements are run whenever any of events occur.

       The syntax of a single probe point is a general dotted-symbol sequence.
       This  allows  a	breakdown  of the event namespace into parts, somewhat
       like the Domain Name System does on the Internet.  Each component iden‐
       tifier may be parametrized by a string or number literal, with a syntax
       like a function call.  A component may include a "*" character, to  ex‐
       pand  to	 a  set of matching probe points.  It may also include "**" to
       match multiple sequential components at once.  Probe  aliases  likewise
       expand to other probe points.

       Probe  aliases  can be given on their own, or with a suffix. The suffix
       attaches to the underlying probe point that the alias is	 expanded  to.
       For example,

	      syscall.read.return.maxactive(10)

       expands to

	      kernel.function("sys_read").return.maxactive(10)

       with the component maxactive(10) being recognized as a suffix.

       Normally,  each	and  every  probe  point  resulting from wildcard- and
       alias-expansion must be resolved to some low-level system  instrumenta‐
       tion  facility  (e.g.,  a kprobe address, marker, or a timer configura‐
       tion), otherwise the elaboration phase will fail.

       However, a probe point may be followed by a "?" character, to  indicate
       that it is optional, and that no error should result if it fails to re‐
       solve.  Optionalness passes down through all levels  of	alias/wildcard
       expansion.  Alternately, a probe point may be followed by a "!" charac‐
       ter, to indicate that it	 is  both  optional  and  sufficient.	(Think
       vaguely	of  the Prolog cut operator.) If it does resolve, then no fur‐
       ther probe points in the same comma-separated list  will	 be  resolved.
       Therefore,  the	"!"   sufficiency  mark	 only makes sense in a list of
       probe point alternatives.

       Additionally, a probe point may be followed by a "if (expr)" statement,
       in  order  to  enable/disable the probe point on-the-fly. With the "if"
       statement, if the "expr" is false when the  probe  point	 is  hit,  the
       whole  probe  body  including alias's body is skipped. The condition is
       stacked up through all levels of alias/wildcard expansion. So the final
       condition  becomes  the	logical-and  of	 conditions  of	 all  expanded
       alias/wildcard.	The expressions are necessarily restricted  to	global
       variables.

       These  are  all	syntactically valid probe points.  (They are generally
       semantically invalid, depending on the contents of the tapsets, and the
       versions of kernel/user software installed.)

	      kernel.function("foo").return
	      process("/bin/vi").statement(0x2222)
	      end
	      syscall.*
	      syscall.*.return.maxactive(10)
	      sys**open
	      kernel.function("no_such_function") ?
	      module("awol").function("no_such_function") !
	      signal.*? if (switch)
	      kprobe.function("foo")

       Probes may be broadly classified into "synchronous" and "asynchronous".
       A "synchronous" event is deemed to occur when any processor executes an
       instruction  matched  by	 the specification.  This gives these probes a
       reference point (instruction address) from which more  contextual  data
       may  be	available.  Other families of probe points refer to "asynchro‐
       nous" events such as timers/counters rolling over, where	 there	is  no
       fixed  reference point that is related.	Each probe point specification
       may match multiple locations (for example, using wildcards or aliases),
       and  all	 them  are  then probed.  A probe declaration may also contain
       several comma-separated specifications, all of which are probed.

DWARF DEBUGINFO
       Resolving some probe points requires DWARF debuginfo or "debug symbols"
       for  the	 specific  part being instrumented.  For some others, DWARF is
       automatically synthesized on the fly from  source  code	header	files.
       For  others, it is not needed at all.  Since a systemtap script may use
       any mixture of probe points together, the union of their DWARF require‐
       ments  has  to  be met on the computer where script compilation occurs.
       (See the --use-server option and the stap-server(8) man page for infor‐
       mation  about  the  remote compilation facility, which allows these re‐
       quirements to be met on a different machine.)

       The following point lists many of the available probe  point  families,
       to classify them with respect to their need for DWARF debuginfo.

       DWARF			      NON-DWARF

       kernel.function, .statement    kernel.mark
       module.function, .statement    process.mark, process.plt
       process.function, .statement   begin, end, error, never
       process.mark (backup)	      timer
				      perf
				      procfs
       AUTO-DWARF		      kernel.statement.absolute
				      kernel.data
       kernel.trace		      kprobe.function
				      process.statement.absolute
				      process.begin, .end, .error

PROBE POINT FAMILIES
   BEGIN/END/ERROR
       The  probe  points begin and end are defined by the translator to refer
       to the time of session startup and shutdown.  All  "begin"  probe  han‐
       dlers  are  run,	 in  some sequence, during the startup of the session.
       All global variables will have been initialized prior  to  this	point.
       All  "end" probes are run, in some sequence, during the normal shutdown
       of a session, such as in the aftermath of an exit () function call,  or
       an interruption from the user.  In the case of an error-triggered shut‐
       down, "end" probes are not run.	There are no target  variables	avail‐
       able in either context.

       If the order of execution among "begin" or "end" probes is significant,
       then an optional sequence number may be provided:

	      begin(N)
	      end(N)

       The number N may be positive or negative.  The probe handlers  are  run
       in  increasing  order, and the order between handlers with the same se‐
       quence number is unspecified.  When "begin" or "end" are given  without
       a sequence, they are effectively sequence zero.

       The  error  probe  point	 is similar to the end probe, except that each
       such probe handler run when the session	ends  after  errors  have  oc‐
       curred.	 In  such  cases,  "end"  probes are skipped, but each "error"
       probe is still attempted.  This kind of probe can be used to  clean  up
       or emit a "final gasp".	It may also be numerically parametrized to set
       a sequence.

   NEVER
       The probe point never is specially defined by the  translator  to  mean
       "never".	 Its probe handler is never run, though its statements are an‐
       alyzed for symbol / type correctness as usual.  This probe point may be
       useful in conjunction with optional probes.

   SYSCALL
       The  syscall.*	aliases define several hundred probes, too many to de‐
       tail here.  They are of the general form:

	      syscall.NAME
	      syscall.NAME.return

       Generally, two probes are defined for each normal system call as listed
       in  the	syscalls(2)  manual  page,  one	 for entry and one for return.
       Those system calls that never return do not have a  corresponding  .re‐
       turn probe.

       Each probe alias provides a variety of variables. Looking at the tapset
       source code is the most reliable way.  Generally, each variable	listed
       in  the	standard manual page is made available as a script-level vari‐
       able, so syscall.open exposes filename, flags, and mode.	 In  addition,
       a standard suite of variables is available at most aliases:

       argstr A	 pretty-printed	 form  of  the	entire	argument list, without
	      parentheses.

       name   The name of the system call.

       retstr For return probes, a pretty-printed form of the system-call  re‐
	      sult.

       As  usual for probe aliases, these variables are all simply initialized
       once from the underlying $context variables, so that later  changes  to
       $context	 variables  are	 not  automatically  reflected.	 Not all probe
       aliases obey all of these general guidelines.  Please report any	 both‐
       ersome ones you encounter as a bug.

       If debuginfo availability is a problem, you may try using the non-DWARF
       syscall probe aliases instead.  Use the nd_syscall.  prefix instead  of
       syscall.	 The same context variables are available, as far as possible.

   TIMERS
       Intervals defined by the standard kernel "jiffies" timer may be used to
       trigger probe handlers asynchronously.  Two probe  point	 variants  are
       supported by the translator:

	      timer.jiffies(N)
	      timer.jiffies(N).randomize(M)

       The  probe  handler  is	run  every N jiffies (a kernel-defined unit of
       time, typically between 1 and 60 ms).  If the "randomize" component  is
       given,  a  linearly  distributed	 random value in the range [-M..+M] is
       added to N every time the handler is run.  N is restricted to a reason‐
       able  range  (1 to around a million), and M is restricted to be smaller
       than N.	There are no target variables provided in either context.   It
       is possible for such probes to be run concurrently on a multi-processor
       computer.

       Alternatively, intervals may be specified in units of time.  There  are
       two probe point variants similar to the jiffies timer:

	      timer.ms(N)
	      timer.ms(N).randomize(M)

       Here,  N	 and M are specified in milliseconds, but the full options for
       units  are  seconds  (s/sec),  milliseconds   (ms/msec),	  microseconds
       (us/usec), nanoseconds (ns/nsec), and hertz (hz).  Randomization is not
       supported for hertz timers.

       The actual resolution of the timers depends on the target kernel.   For
       kernels	prior  to 2.6.17, timers are limited to jiffies resolution, so
       intervals are rounded  up  to  the  nearest  jiffies  interval.	 After
       2.6.17,	the implementation uses hrtimers for tighter precision, though
       the actual resolution will be arch-dependent.  In either case,  if  the
       "randomize"  component is given, then the random value will be added to
       the interval before any rounding occurs.

       Profiling timers are also available to provide probes that  execute  on
       all  CPUs at the rate of the system tick (CONFIG_HZ).  This probe takes
       no parameters.  On some kernels, this is a one-concurrent-user-only  or
       disabled	 facility,  resulting in error -16 (EBUSY) during probe regis‐
       tration.

	      timer.profile.tick

       Full context information of the interrupted process is available,  mak‐
       ing this probe suitable for a time-based sampling profiler.

       It  is  recommended  to	use the tapset probe timer.profile rather than
       timer.profile.tick. This probe point behaves identically to  timer.pro‐
       file.tick  when	the  underlying	 functionality is available, and falls
       back to using perf.sw.cpu_clock on some recent kernels which  lack  the
       corresponding profile timer facility.

   DWARF
       This family of probe points uses symbolic debugging information for the
       target kernel/module/program, as may be found  in  unstripped  executa‐
       bles,  or  the  separate	 debuginfo  packages.  They allow placement of
       probes logically into the execution path	 of  the  target  program,  by
       specifying a set of points in the source or object code.	 When a match‐
       ing statement executes on any processor, the probe handler  is  run  in
       that context.

       Points  in  a kernel, which are identified by module, source file, line
       number, function name, or some combination of these.

       Here is a list of probe point families currently supported.  The .func‐
       tion  variant  places a probe near the beginning of the named function,
       so that parameters are available as  context  variables.	  The  .return
       variant	places	a  probe at the moment after the return from the named
       function, so the return value is available  as  the  "$return"  context
       variable.   The	.inline	 modifier for .function filters the results to
       include only instances of inlined functions.  The  .call	 modifier  se‐
       lects  the opposite subset.  The .exported modifier filters the results
       to include only exported functions.  Inline functions do	 not  have  an
       identifiable  return  point,  so	 .return  is  not supported on .inline
       probes. The .statement variant places a probe at the exact spot, expos‐
       ing those local variables that are visible there.

	      kernel.function(PATTERN)
	      kernel.function(PATTERN).call
	      kernel.function(PATTERN).return
	      kernel.function(PATTERN).inline
	      kernel.function(PATTERN).label(LPATTERN)
	      module(MPATTERN).function(PATTERN)
	      module(MPATTERN).function(PATTERN).call
	      module(MPATTERN).function(PATTERN).return
	      module(MPATTERN).function(PATTERN).inline
	      module(MPATTERN).function(PATTERN).label(LPATTERN)
	      kernel.statement(PATTERN)
	      kernel.statement(ADDRESS).absolute
	      module(MPATTERN).statement(PATTERN)
	      process("PATH").function("NAME")
	      process("PATH").statement("*@FILE.c:123")
	      process("PATH").library("PATH").function("NAME")
	      process("PATH").library("PATH").statement("*@FILE.c:123")
	      process("PATH").function("*").return
	      process("PATH").function("myfun").label("foo")
	      process(PID).statement(ADDRESS).absolute

       (See  the  USER-SPACE section below for more information on the process
       probes.)

       In the above list, MPATTERN stands for a string literal	that  aims  to
       identify the loaded kernel module of interest and LPATTERN stands for a
       source program label.  Both MPATTERN and LPATTERN may include  the  "*"
       "[]", and "?" wildcards.	 PATTERN stands for a string literal that aims
       to identify a point in the program.  It is made up of three parts:

       ·   The first part is the name of a function, as would appear in the nm
	   program's  output.	This  part may use the "*" and "?" wildcarding
	   operators to match multiple names.

       ·   The second part is optional and begins with the "@" character.   It
	   is followed by the path to the source file containing the function,
	   which may include a wildcard pattern, such as mm/slab*.  If it does
	   not	match  as  is, an implicit "*/" is optionally added before the
	   pattern, so that a script need only name the last few components of
	   a possibly long source directory path.

       ·   Finally,  the third part is optional if the file name part was giv‐
	   en, and identifies the line number in the source file preceded by a
	   ":"	or  a  "+".  The line number is assumed to be an absolute line
	   number if preceded by a ":", or relative to the entry of the	 func‐
	   tion	 if  preceded  by a "+".  All the lines in the function can be
	   matched with ":*".  A range of lines x through  y  can  be  matched
	   with ":x-y".

       As an alternative, PATTERN may be a numeric constant, indicating an ad‐
       dress.  Such an address may be found from symbol tables of  the	appro‐
       priate  kernel  /  module  object  file.	  It is verified against known
       statement code boundaries, and will be relocated for use at run time.

       In guru mode only, absolute kernel-space	 addresses  may	 be  specified
       with the ".absolute" suffix.  Such an address is considered already re‐
       located, as if it came from /proc/kallsyms, so  it  cannot  be  checked
       against statement/instruction boundaries.

   CONTEXT VARIABLES
       Many  of	 the  source-level context variables, such as function parame‐
       ters, locals, globals visible in the compilation unit, may  be  visible
       to  probe  handlers.   They  may	 refer to these variables by prefixing
       their name with "$" within the scripts.	In addition, a special	syntax
       allows  limited	traversal  of  structures, pointers, and arrays.  More
       syntax allows pretty-printing of individual variables or their  groups.
       See also @cast.

       $var   refers  to  an in-scope variable "var".  If it's an integer-like
	      type, it will be cast to a 64-bit int for systemtap script  use.
	      String-like  pointers (char *) may be copied to systemtap string
	      values using the kernel_string or user_string functions.

       @var("varname")
	      an alternative syntax for $varname

       @var("varname@src/file.c")
	      refers to the global (either file local  or  external)  variable
	      varname defined when the file src/file.c was compiled. The CU in
	      which the variable is resolved is the first CU in the module  of
	      the probe point which matches the given file name at the end and
	      has    the    shortest	file	name	path	(e.g.	 given
	      @var("foo@bar/baz.c")  and CUs with file name paths src/sub/mod‐
	      ule/bar/baz.c and src/bar/baz.c the second CU will be chosen  to
	      resolve the (file) global variable foo

       $var->field traversal via a structure's or a pointer's field.  This
	      generalized  indirection operator may be repeated to follow more
	      levels.  Note that the .	operator is not used for plain	struc‐
	      ture  members,  only -> for both purposes.  (This is because "."
	      is reserved for string concatenation.)

       $return
	      is available in return probes only for functions	that  are  de‐
	      clared with a return value.

       $var[N]
	      indexes into an array.  The index given with a literal number or
	      even an arbitrary numeric expression.

       A number of operators exist for such  basic  context  variable  expres‐
       sions:

       $$vars expands to a character string that is equivalent to

	      sprintf("parm1=%x ... parmN=%x var1=%x ... varN=%x",
		      parm1, ..., parmN, var1, ..., varN)

	      for  each variable in scope at the probe point.  Some values may
	      be printed as =?	if their run-time location cannot be found.

       $$locals
	      expands to a subset of $$vars for only local variables.

       $$parms
	      expands to a subset of $$vars for only function parameters.

       $$return
	      is available in return probes only.  It expands to a string that
	      is  equivalent  to  sprintf("return=%x",	$return) if the probed
	      function has a return value, or else an empty string.

       & $EXPR
	      expands to the address of the given context variable expression,
	      if it is addressable.

       @defined($EXPR)
	      expands  to  1 or 0 iff the given context variable expression is
	      resolvable, for use in conditionals such as

	      @defined($foo->bar) ? $foo->bar : 0

       $EXPR$ expands to a string with all of $EXPR's members, equivalent to

	      sprintf("{.a=%i, .b=%u, .c={...}, .d=[...]}",
		       $EXPR->a, $EXPR->b)

       $EXPR$$
	      expands to a string with all of $var's members  and  submembers,
	      equivalent to

	      sprintf("{.a=%i, .b=%u, .c={.x=%p, .y=%c}, .d=[%i, ...]}",
		      $EXPR->a, $EXPR->b, $EXPR->c->x, $EXPR->c->y, $EXPR->d[0])

   MORE ON RETURN PROBES
       For the kernel ".return" probes, only a certain fixed number of returns
       may be outstanding.  The default is a relatively small number,  on  the
       order  of  a  few times the number of physical CPUs.  If many different
       threads concurrently call the same blocking function, such as  futex(2)
       or  read(2),  this  limit  could	 be exceeded, and skipped "kretprobes"
       would be reported by "stap -t".	To work around this, specify a

	      probe FOO.return.maxactive(NNN)

       suffix, with a large enough NNN	to  cover  all	expected  concurrently
       blocked threads.	 Alternately, use the

	      stap -DKRETACTIVE=NNNN

       stap  command  line macro setting to override the default for all ".re‐
       turn" probes.

       For ".return" probes, context variables other than the "$return" may be
       accessible,  as a convenience for a script programmer wishing to access
       function parameters.  These values are snapshots taken at the  time  of
       function	 entry.	 Local variables within the function are not generally
       accessible, since those variables did not exist	in  allocated/initial‐
       ized form at the snapshot moment.

       In  addition,  arbitrary	 entry-time  expressions can also be saved for
       ".return" probes using the @entry(expr) operator.  For example, one can
       compute the elapsed time of a function:

	      probe kernel.function("do_filp_open").return {
		  println( get_timeofday_us() - @entry(get_timeofday_us()) )
	      }

       The following table summarizes how values related to a function parame‐
       ter context variable, a pointer named addr, may be accessed from a .re‐
       turn probe.

       at-entry value	past-exit value

       $addr		not available
       $addr->x->y	@cast(@entry($addr),"struct zz")->x->y
       $addr[0]		{kernel,user}_{char,int,...}(& $addr[0])

   DWARFLESS
       In  absence  of	debugging information, entry & exit points of kernel &
       module functions can be probed using the	 "kprobe"  family  of  probes.
       However, these do not permit looking up the arguments / local variables
       of the function.	 Following constructs are supported :

	      kprobe.function(FUNCTION)
	      kprobe.function(FUNCTION).call
	      kprobe.function(FUNCTION).return
	      kprobe.module(NAME).function(FUNCTION)
	      kprobe.module(NAME).function(FUNCTION).call
	      kprobe.module(NAME).function(FUNCTION).return
	      kprobe.statement.(ADDRESS).absolute

       Probes of type function are recommended for kernel  functions,  whereas
       probes  of  type	 module	 are  recommended for probing functions of the
       specified module.  In case the absolute address of a kernel  or	module
       function is known, statement probes can be utilized.

       Note  that FUNCTION and MODULE names must not contain wildcards, or the
       probe will not be registered.  Also, statement probes must be run under
       guru-mode only.

   USER-SPACE
       Support	for  user-space probing is available for kernels that are con‐
       figured with the utrace extensions, or have  the	 uprobes  facility  in
       linux  3.5.  (Various kernel build configuration options need to be en‐
       abled; systemtap will advise if these are missing.)

       There are several forms.	 First, a non-symbolic probe point:

	      process(PID).statement(ADDRESS).absolute

       is analogous to kernel.statement(ADDRESS).absolute in that both use raw
       (unverified)  virtual  addresses and provide no $variables.  The target
       PID parameter must identify a running process, and ADDRESS should iden‐
       tify  a valid instruction address.  All threads of that process will be
       probed.

       Second, non-symbolic user-kernel interface events handled by utrace may
       be probed:

	      process(PID).begin
	      process("FULLPATH").begin
	      process.begin
	      process(PID).thread.begin
	      process("FULLPATH").thread.begin
	      process.thread.begin
	      process(PID).end
	      process("FULLPATH").end
	      process.end
	      process(PID).thread.end
	      process("FULLPATH").thread.end
	      process.thread.end
	      process(PID).syscall
	      process("FULLPATH").syscall
	      process.syscall
	      process(PID).syscall.return
	      process("FULLPATH").syscall.return
	      process.syscall.return
	      process(PID).insn
	      process("FULLPATH").insn
	      process(PID).insn.block
	      process("FULLPATH").insn.block

       A  .begin  probe gets called when new process described by PID or FULL‐
       PATH gets created.  A .thread.begin probe gets called when a new thread
       described  by  PID  or FULLPATH gets created.  A .end probe gets called
       when process described by PID or FULLPATH dies.	 A  .thread.end	 probe
       gets  called  when  a  thread  described	 by  PID  or FULLPATH dies.  A
       .syscall probe gets called when a thread described by PID  or  FULLPATH
       makes  a	 system	 call.	 The  system  call  number is available in the
       $syscall context variable, and the first 6 arguments of the system call
       are available in the $argN (ex. $arg1, $arg2, ...) context variable.  A
       .syscall.return probe gets called when a thread	described  by  PID  or
       FULLPATH	 returns from a system call.  The system call number is avail‐
       able in the $syscall context variable, and the return value of the sys‐
       tem  call  is available in the $return context variable.	 A .insn probe
       gets called for every single-stepped instruction	 of  the  process  de‐
       scribed	by PID or FULLPATH.  A .insn.block probe gets called for every
       block-stepped instruction of the process described by PID or FULLPATH.

       If a process probe is specified without a PID  or  FULLPATH,  all  user
       threads	will be probed.	 However, if systemtap was invoked with the -c
       or -x options, then process probes are restricted to the process	 hier‐
       archy associated with the target process.  If a process probe is speci‐
       fied without a PID or FULLPATH, but with the -c option, the PATH of the
       -c cmd will be heuristically filled into the process PATH.

       Third,  symbolic	 static	 instrumentation  compiled  into  programs and
       shared libraries may be probed:

	      process("PATH").mark("LABEL")
	      process("PATH").provider("PROVIDER").mark("LABEL")

       A .mark probe gets called via a static probe which is  defined  in  the
       application  by	STAP_PROBE1(PROVIDER,LABEL,arg1), which are macros de‐
       fined in sys/sdt.h.  The PROVIDER is an arbitrary application identifi‐
       er,  LABEL is the marker site identifier, and arg1 is the integer-typed
       argument.  STAP_PROBE1 is used for probes with 1 argument,  STAP_PROBE2
       is  used	 for probes with 2 arguments, and so on.  The arguments of the
       probe are available in the context variables $arg1, $arg2, ...  An  al‐
       ternative to using the STAP_PROBE macros is to use the dtrace script to
       create  custom  macros.	 Additionally,	the   variables	  $$name   and
       $$provider  are	available  as  parts  of  the  probe  point name.  The
       sys/sdt.h macro	names  DTRACE_PROBE*  are  available  as  aliases  for
       STAP_PROBE*.

       Finally,	 full  symbolic source-level probes in user-space programs and
       shared libraries are supported.	These are  exactly  analogous  to  the
       symbolic DWARF-based kernel/module probes described above.  They expose
       the same sorts of context $variables  for  function  parameters,	 local
       variables, and so on.

	      process("PATH").function("NAME")
	      process("PATH").statement("*@FILE.c:123")
	      process("PATH").plt("NAME")
	      process("PATH").library("PATH").plt("NAME")
	      process("PATH").library("PATH").function("NAME")
	      process("PATH").library("PATH").statement("*@FILE.c:123")
	      process("PATH").function("*").return
	      process("PATH").function("myfun").label("foo")

       Note  that for all process probes, PATH names refer to executables that
       are searched the same way shells do: relative to the working  directory
       if they contain a "/" character, otherwise in $PATH.  If PATH names re‐
       fer to scripts, the actual interpreters (specified in the script in the
       first  line  after the #! characters) are probed.  If PATH is a process
       component parameter referring to shared libraries  then	all  processes
       that map it at runtime would be selected for probing.  If PATH is a li‐
       brary component	parameter  referring  to  shared  libraries  then  the
       process specified by the process component would be selected.

       A  .plt	probe will probe functions in the program linkage table corre‐
       sponding to the rest of the probe point.	 .plt can be  specified	 as  a
       shorthand for .plt("*").	 The symbol name is available as a $$name con‐
       text variable; function arguments are not  available,  since  PLTs  are
       processed without debuginfo.

       If  the	PATH  string  contains wildcards as in the MPATTERN case, then
       standard globbing is performed to find all  matching  paths.   In  this
       case, the $PATH environment variable is not used.

       If systemtap was invoked with the -c or -x options, then process probes
       are restricted to the process  hierarchy	 associated  with  the	target
       process.

   JAVA
       Support	for probing Java methods is available using Byteman as a back‐
       end. Byteman is an instrumentation tool from the	 JBoss	project	 which
       systemtap  can use to monitor invocations for a specific method or line
       in a Java program.

       Systemtap does so by generating a Byteman script listing the probes  to
       instrument and then invoking the Byteman bminstall utility.

       This Java instrumentation support is currently a prototype feature with
       major limitations.  Moreover, Java  probing  currently  does  not  work
       across  users;  the stap script must run (with appropriate permissions)
       under the same user that the Java process being probed.	(Thus  a  stap
       script under root currently cannot probe Java methods in a non-root-us‐
       er Java process.)

       The first probe type refers to Java processes by the name of  the  Java
       process:

	      java("PNAME").class("CLASSNAME").method("PATTERN")
	      java("PNAME").class("CLASSNAME").method("PATTERN").return

       The  PNAME argument must be a pre-existing jvm pid, and be identifiable
       via a jps listing.

       The PATTERN parameter specifies the signature of	 the  Java  method  to
       probe. The signature must consist of the exact name of the method, fol‐
       lowed by a bracketed list of the types of the arguments,	 for  instance
       "myMethod(int,double,Foo)". Wildcards are not supported.

       The probe can be set to trigger at a specific line within the method by
       appending a line number with colon, just as in other types  of  probes:
       "myMethod(int,double,Foo):245".

       The  CLASSNAME  parameter  identifies the Java class the method belongs
       to, either with or without the package qualification. By	 default,  the
       probe  only  triggers  on descendants of the class that do not override
       the method definition of the original  class.  However,	CLASSNAME  can
       take  an	 optional caret prefix, as in ^org.my.MyClass, which specifies
       that the probe should also trigger on all descendants of	 MyClass  that
       override the original method. For instance, every method with signature
       foo(int) in program org.my.MyApp can be probed at once using

	      java("org.my.MyApp").class("^java.lang.Object").method("foo(int)")

       The second probe type works analogously, but refers to  Java  processes
       by PID:

	      java(PID).class("CLASSNAME").method("PATTERN")
	      java(PID).class("CLASSNAME").method("PATTERN").return

       (PIDs  for  an already running process can be obtained using the jps(1)
       utility.)

       Context variables defined within	 java  probes  include	$arg1  through
       $arg10  (for  up to the first 10 arguments of a method), represented as
       integers or strings.

   PROCFS
       These probe points allow procfs "files" in  /proc/systemtap/MODNAME  to
       be  created,  read  and written using a permission that may be modified
       using the proper umask value. Default permissions  are  0400  for  read
       probes,	and  0200 for write probes. If both a read and write probe are
       being used on the same file, a default permission of 0600 will be used.
       Using procfs.umask(0040).read would result in a 0404 permission set for
       the file.  (MODNAME is the name of  the	systemtap  module).  The  proc
       filesystem is a pseudo-filesystem which is used an an interface to ker‐
       nel data structures. There are several probe point  variants  supported
       by the translator:

	      procfs("PATH").read
	      procfs("PATH").umask(UMASK).read
	      procfs("PATH").read.maxsize(MAXSIZE)
	      procfs("PATH").umask(UMASK).maxsize(MAXSIZE)
	      procfs("PATH").write
	      procfs("PATH").umask(UMASK).write
	      procfs.read
	      procfs.umask(UMASK).read
	      procfs.read.maxsize(MAXSIZE)
	      procfs.umask(UMASK).read.maxsize(MAXSIZE)
	      procfs.write
	      procfs.umask(UMASK).write

       PATH  is the file name (relative to /proc/systemtap/MODNAME) to be cre‐
       ated.  If no PATH is specified (as in the  last	two  variants  above),
       PATH defaults to "command".

       When  a	user  reads  /proc/systemtap/MODNAME/PATH,  the	 corresponding
       procfs read probe is triggered.	The string data to be read  should  be
       assigned to a variable named $value, like this:

	      procfs("PATH").read { $value = "100\n" }

       When a user writes into /proc/systemtap/MODNAME/PATH, the corresponding
       procfs write probe is triggered.	 The data the user wrote is  available
       in the string variable named $value, like this:

	      procfs("PATH").write { printf("user wrote: %s", $value) }

       MAXSIZE	is the size of the procfs read buffer.	Specifying MAXSIZE al‐
       lows larger procfs output.  If no MAXSIZE is specified, the procfs read
       buffer  defaults to STP_PROCFS_BUFSIZE (which defaults to MAXSTRINGLEN,
       the maximum length of a string).	 If setting the	 procfs	 read  buffers
       for  more  than	one  file is needed, it may be easiest to override the
       STP_PROCFS_BUFSIZE definition.  Here's an example of using MAXSIZE:

	      procfs.read.maxsize(1024) {
		  $value = "long string..."
		  $value .= "another long string..."
		  $value .= "another long string..."
		  $value .= "another long string..."
	      }

   NETFILTER HOOKS
       These probe points allow observation of network packets using the  net‐
       filter  mechanism. A netfilter probe in systemtap corresponds to a net‐
       filter hook function in the original netfilter probes API. It is proba‐
       bly  more  convenient  to use tapset::netfilter(3stap), which wraps the
       primitive netfilter hooks and does the work of extracting useful infor‐
       mation from the context variables.

       There are several probe point variants supported by the translator:

	      netfilter.hook("HOOKNAME").pf("PROTOCOL_F")
	      netfilter.pf("PROTOCOL_F").hook("HOOKNAME")
	      netfilter.hook("HOOKNAME").pf("PROTOCOL_F").priority("PRIORITY")
	      netfilter.pf("PROTOCOL_F").hook("HOOKNAME").priority("PRIORITY")

       PROTOCOL_F  is  the protocol family to listen for, currently one of NF‐
       PROTO_IPV4, NFPROTO_IPV6, NFPROTO_ARP, or NFPROTO_BRIDGE.

       HOOKNAME is the point, or 'hook', in the protocol stack at which to in‐
       tercept	the  packet. The available hook names for each protocol family
       are taken from the kernel header files <linux/netfilter_ipv4.h>,	 <lin‐
       ux/netfilter_ipv6.h>,	<linux/netfilter_arp.h>	  and	<linux/netfil‐
       ter_bridge.h>. For instance, allowable hook names for NFPROTO_IPV4  are
       NF_INET_PRE_ROUTING,   NF_INET_LOCAL_IN,	 NF_INET_FORWARD,  NF_INET_LO‐
       CAL_OUT, and NF_INET_POST_ROUTING.

       PRIORITY is an integer priority giving the order	 in  which  the	 probe
       point  should  be  triggered relative to any other netfilter hook func‐
       tions which trigger on the same packet. Hook functions execute on  each
       packet  in order from smallest priority number to largest priority num‐
       ber. If no PRIORITY is specified (as in the first two probe point vari‐
       ants above), PRIORITY defaults to "0".

       There are a number of predefined priority names of the form NF_IP_PRI_*
       and NF_IP6_PRI_* which are defined in the  kernel  header  files	 <lin‐
       ux/netfilter_ipv4.h>  and  <linux/netfilter_ipv6.h>  respectively.  The
       script is permitted to use these instead of specifying an integer  pri‐
       ority.  (The  probe points for NFPROTO_ARP and NFPROTO_BRIDGE currently
       do not expose any named hook priorities to the script  writer.)	 Thus,
       allowable ways to specify the priority include:

	      priority("255")
	      priority("NF_IP_PRI_SELINUX_LAST")

       A script using guru mode is permitted to specify any identifier or num‐
       ber as the parameter for hook, pf, and priority. This feature should be
       used  with  caution,  as	 the parameter is inserted verbatim into the C
       code generated by systemtap.

       The netfilter probe points define the following context variables:

       $skb   The address of the sk_buff struct representing the  packet.  See
	      <linux/skbuff.h>	for  details on how to use this struct, or al‐
	      ternatively use the tapset tapset::netfilter(3stap) for easy ac‐
	      cess to key information.

       $in    The  address  of	the net_device struct representing the network
	      device on which the packet was received (if any). May  be	 0  if
	      the device is unknown or undefined at that stage in the protocol
	      stack.

       $out   The address of the net_device struct  representing  the  network
	      device  on  which	 the packet will be sent (if any). May be 0 if
	      the device is unknown or undefined at that stage in the protocol
	      stack.

       $verdict
	      (Guru mode only.) Assigning one of the verdict values defined in
	      <linux/netfilter.h> to this variable alters the further progress
	      of the packet through the protocol stack. For instance, the fol‐
	      lowing guru mode script forces all ipv6 network  packets	to  be
	      dropped:

	      probe netfilter.pf("NFPROTO_IPV6").hook("NF_IP6_PRE_ROUTING") {
		$verdict = 0 /* nf_drop */
	      }

	      For  convenience,	 unlike	 the  primitive probe points discussed
	      here, the probes defined in tapset::netfilter(3stap) export  the
	      lowercase	 names	of the verdict constants (e.g. NF_DROP becomes
	      nf_drop) as local variables.

   MARKERS
       This family of probe points hooks up to static probing markers inserted
       into  the kernel or modules.  These markers are special macro calls in‐
       serted by kernel developers to make probing faster  and	more  reliable
       than  with DWARF-based probes.  Further, DWARF debugging information is
       not required to probe markers.

       Marker probe points begin with kernel.  The next part names the	marker
       itself:	mark("name").	The  marker name string, which may contain the
       usual wildcard characters, is matched against the names	given  to  the
       marker  macros when the kernel and/or module was compiled.    Optional‐
       ly, you can specify format("format").   Specifying  the	marker	format
       string  allows  differentiation	between two markers with the same name
       but different marker format strings.

       The handler associated with a marker-based probe may read the  optional
       parameters  specified  at  the  macro call site.	 These are named $arg1
       through $argNN, where NN is the number of parameters  supplied  by  the
       macro.  Number and string parameters are passed in a type-safe manner.

       The marker format string associated with a marker is available in $for‐
       mat.  And also the marker name string is available in $name.

   TRACEPOINTS
       This family of probe points hooks up to static probing tracepoints  in‐
       serted  into the kernel or modules.  As with markers, these tracepoints
       are special macro calls inserted by kernel developers to	 make  probing
       faster and more reliable than with DWARF-based probes, and DWARF debug‐
       ging information is not required	 to  probe  tracepoints.   Tracepoints
       have an extra advantage of more strongly-typed parameters than markers.

       Tracepoint  probes  begin  with kernel.	The next part names the trace‐
       point itself: trace("name").  The tracepoint  name  string,  which  may
       contain the usual wildcard characters, is matched against the names de‐
       fined by the kernel developers in the tracepoint header files.

       The handler associated with a tracepoint-based probe may read  the  op‐
       tional  parameters  specified  at the macro call site.  These are named
       according to the declaration by the tracepoint  author.	 For  example,
       the  tracepoint probe kernel.trace("sched_switch") provides the parame‐
       ters $rq, $prev, and $next.  If the parameter is a complex type, as  in
       a  struct pointer, then a script can access fields with the same syntax
       as DWARF $target variables.  Also, tracepoint parameters cannot be mod‐
       ified, but in guru-mode a script may modify fields of parameters.

       The  name  of  the  tracepoint  is available in $$name, and a string of
       name=value pairs for all parameters of the tracepoint is	 available  in
       $$vars or $$parms.

   HARDWARE BREAKPOINTS
       This family of probes is used to set hardware watchpoints for a given
	(global) kernel symbol. The probes take three components as inputs :

       1.  The	virtualaddress/name  of the kernel symbol to be traced is sup‐
       plied as argument to this class of probes. ( Probes for only data  seg‐
       ment  variables	are  supported.	 Probing local variables of a function
       cannot be done.)

       2. Nature of access to be probed : a.  .write probe gets triggered when
       a  write happens at the specified address/symbol name.  b.  rw probe is
       triggered when either a read or write happens.

       3.  .length (optional) Users have the option of specifying the  address
       interval	 to  be	 probed	 using "length" constructs. The user-specified
       length gets approximated to the closest possible	 address  length  that
       the  architecture can support. If the specified length exceeds the lim‐
       its imposed by architecture, an error message is flagged and probe reg‐
       istration  fails.   Wherever  'length' is not specified, the translator
       requests a hardware breakpoint probe of length 1. It  should  be	 noted
       that the "length" construct is not valid with symbol names.

       Following constructs are supported :

	      probe kernel.data(ADDRESS).write
	      probe kernel.data(ADDRESS).rw
	      probe kernel.data(ADDRESS).length(LEN).write
	      probe kernel.data(ADDRESS).length(LEN).rw
	      probe kernel.data("SYMBOL_NAME").write
	      probe kernel.data("SYMBOL_NAME").rw

       This  set  of  probes make use of the debug registers of the processor,
       which is a scarce resource. (4 on x86 ,	1  on  powerpc	)  The	script
       translation flags a warning if a user requests more hardware breakpoint
       probes than the limits set by architecture. For example,a pass-2	 warn‐
       ing  is	flashed	 when  an  input script requests 5 hardware breakpoint
       probes on an x86 system while x86 architecture supports a maximum of  4
       breakpoints.  Users are cautioned to set probes judiciously.

   PERF
       This  prototype	family	of probe points interfaces to the kernel "perf
       event" infrastructure for controlling  hardware	performance  counters.
       The  events  being  attached  to	 are described by the "type", "config"
       fields of the perf_event_attr structure, and are sampled at an interval
       governed by the "sample_period" field.

       These  fields are made available to systemtap scripts using the follow‐
       ing syntax:

	      probe perf.type(NN).config(MM).sample(XX)
	      probe perf.type(NN).config(MM)
	      probe perf.type(NN).config(MM).process("PROC")
	      probe perf.type(NN).config(MM).counter("COUNTER")
	      probe perf.type(NN).config(MM).process("PROC").counter("COUNTER")

       The systemtap probe handler is called once per XX increments of the un‐
       derlying	 performance  counter.	The default sampling count is 1000000.
       The range of valid type/config is described by  the  perf_event_open(2)
       system  call, and/or the linux/perf_event.h file.  Invalid combinations
       or exhausted hardware counter resources result in errors during system‐
       tap  script  startup.   Systemtap  does not sanity-check the values: it
       merely passes them through to the kernel for error-  and	 safety-check‐
       ing.   By default the perf event probe is systemwide unless .process is
       specified, which will bind the probe to a specific task.	 If  the  name
       is  omitted  then  it  is  inferred from the stap -c argument.	A perf
       event can be read on demand using .counter.  The body of the perf probe
       handler	will not be invoked for a .counter probe; instead, the counter
       is read in a user space probe via:

	  process("PROCESS").statement("func@file") {stat <<< @perf("NAME")}

EXAMPLES
       Here are some example probe points, defining the associated events.

       begin, end, end
	      refers to the startup and normal shutdown of  the	 session.   In
	      this  case,  the handler would run once during startup and twice
	      during shutdown.

       timer.jiffies(1000).randomize(200)
	      refers to a periodic interrupt, every 1000 +/- 200 jiffies.

       kernel.function("*init*"), kernel.function("*exit*")
	      refers to all kernel functions with  "init"  or  "exit"  in  the
	      name.

       kernel.function("*@kernel/time.c:240")
	      refers  to  any  functions  within the "kernel/time.c" file that
	      span line 240.   Note that this is not a probe at the  statement
	      at that line number.  Use the kernel.statement probe instead.

       kernel.mark("getuid")
	      refers to an STAP_MARK(getuid, ...) macro call in the kernel.

       module("usb*").function("*sync*").return
	      refers to the moment of return from all functions with "sync" in
	      the name in any of the USB drivers.

       kernel.statement(0xc0044852)
	      refers to the first byte of the  statement  whose	 compiled  in‐
	      structions include the given address in the kernel.

       kernel.statement("*@kernel/time.c:296")
	      refers to the statement of line 296 within "kernel/time.c".

       kernel.statement("bio_init@fs/bio.c+3")
	      refers to the statement at line bio_init+3 within "fs/bio.c".

       kernel.data("pid_max").write
	      refers to a hardware breakpoint of type "write" set on pid_max

       syscall.*.return
	      refers  to the group of probe aliases with any name in the third
	      position

SEE ALSO
       stap(1),
       probe::*(3stap),
       tapset::*(3stap)

							     STAPPROBES(3stap)
[top]

List of man pages available for RedHat

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net