File: hw_watch_addr.meta

package info (click to toggle)
systemtap 5.1-5
  • links: PTS, VCS
  • area: main
  • in suites: trixie
  • size: 47,964 kB
  • sloc: cpp: 80,838; ansic: 54,757; xml: 49,725; exp: 43,665; sh: 11,527; python: 5,003; perl: 2,252; tcl: 1,312; makefile: 1,006; javascript: 149; lisp: 105; awk: 101; asm: 91; java: 70; sed: 16
file content (14 lines) | stat: -rw-r--r-- 787 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
title: Watch a Kernel Address Using Breakpoint Hardware
name: hw_watch_addr.stp
version: 1.0
author: William Cohen
keywords: memory watchpoint
subsystem: memory
status: production
exit: user-controlled
output: trace
scope: system-wide
description: The script will watch accesses to a single kernel address and prints a traceback each time the address is accessed. This script needs to be run as root to allow access to the breakpoint hardware.
test_support: perf stat -a --event=mem:0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'` /bin/true
test_check: stap --all-modules -p4 hw_watch_addr.stp 0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'`
test_installcheck: stap --all-modules hw_watch_addr.stp 0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'` -T 5