File: hw_watch_addr.meta

package info (click to toggle)
systemtap 4.0-1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 36,436 kB
  • sloc: cpp: 72,388; ansic: 58,430; xml: 47,797; exp: 40,417; sh: 10,793; python: 2,759; perl: 2,252; tcl: 1,305; makefile: 1,119; lisp: 105; java: 102; awk: 101; asm: 91; sed: 16
file content (14 lines) | stat: -rw-r--r-- 787 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
title: Watch a Kernel Address Using Breakpoint Hardware
name: hw_watch_addr.stp
version: 1.0
author: William Cohen
keywords: memory watchpoint
subsystem: memory
status: production
exit: user-controlled
output: trace
scope: system-wide
description: The script will watch accesses to a single kernel address and prints a traceback each time the address is accessed. This script needs to be run as root to allow access to the breakpoint hardware.
test_support: perf stat -a --event=mem:0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'` /bin/true
test_check: stap --all-modules -p4 hw_watch_addr.stp 0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'`
test_installcheck: stap --all-modules hw_watch_addr.stp 0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'` -T 5