Bug 1154 - procfs interaction tapset
Summary: procfs interaction tapset
Status: RESOLVED FIXED
Alias: None
Product: systemtap
Classification: Unclassified
Component: tapsets (show other bugs)
Version: unspecified
: P3 normal
Target Milestone: week
Assignee: Martin Hunt
URL:
Keywords:
Depends on:
Blocks: 3859
  Show dependency treegraph
 
Reported: 2005-08-02 18:37 UTC by Frank Ch. Eigler
Modified: 2007-09-17 20:43 UTC (History)
0 users

See Also:
Host:
Target:
Build:
Last reconfirmed:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Frank Ch. Eigler 2005-08-02 18:37:44 UTC
extend the translator to support a family of probe points:

probe procfs("PATH").read { $value = do_something () }
probe procfs("PATH").write { do_something_else ($value) }

These probe points would map to straightforward procfs slots with read/write
handlers mapping to the handler bodies.  The $value var would map to the byte
string being read/written by the user program.

These could be a simple generic mechanism through which a systemtap script could
interact with a user-level monitor program.
Comment 1 Frank Ch. Eigler 2006-02-11 18:09:07 UTC
The procfs-related C code in this message can be duplicated by the translator in
order to implement this family of probe points.

http://sourceware.org/ml/systemtap/2005-q4/msg00393.html
Comment 2 David Smith 2007-09-17 20:43:09 UTC
procfs probe support has been added to the translator and runtime