This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |
Other format: | [Raw text] |
* signal.send: I did a lot of digging for this to try to capture all of the paths where signals can be sent. The attached "send_signal.pdf" shows the callgraph as I found it. Those 4 marked in blue are the points that I chose to probe for "process.send_signal". The advantage to probing them separately is that I can expose a 'shared' variable that indicates whether the signal is going to a specific thread or the entire thread group. The functions marked in red are those that can generate STOP/KILL signals, which I haven't found a convenient way to probe (perhaps static markers?).
* handle_stop_signal: Your comment says "fires when a stop signal is
sent", but this is incorrect. This function is called to _check_
whether this signal is a stop/cont, and if so take special action.
Thus, this will get called for almost every signal, many of which will
not be stop signals.
* syscall duplication: some of your probes are duplicating points from the syscall tapset (signal.syskill, etc.). Do we really need these? If you really want these, it would be preferable to make use of the syscall tapset, e.g.: probe signal.syskill = syscall.kill
Index Nav: | [Date Index] [Subject Index] [Author Index] [Thread Index] | |
---|---|---|
Message Nav: | [Date Prev] [Date Next] | [Thread Prev] [Thread Next] |