This is the mail archive of the mailing list for the systemtap project.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/25568] New: buildid-based process probes

            Bug ID: 25568
           Summary: buildid-based process probes
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: translator
          Assignee: systemtap at sourceware dot org
          Reporter: fche at redhat dot com
  Target Milestone: ---

It may be desirable to let a stap script identify userspace process probes not
by path name but by buildid:

  probe process("hexcode").function/statement(...) {  }  // as usual

... or some explicit functor for 'buildid' addressing.

The semantics would be:

  probe all processes systemwide whereever given elf binary is mapped

This would allow a single stap script to operate against a multitude of
-versions- of a userspace binary.  It could also let it operate with binaries
loaded from non-default locations, such as container-mapped filesystem mount

Working with elfutils/debuginfod, systemtap should load binaries & debuginfo by
buildid just fine.

You are receiving this mail because:
You are the assignee for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]