New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Making Use of Dtrace Probe Points on Linux #11088
Comments
From lberk@redhat.comCreated by lberk@redhat.comIn Perl 5.12 dtrace/systemtap probe points have been enabled. Adding these files to the source will allow distibutions to install the Inline Patchdiff --git a/perl-example.stp b/perl-example.stp
new file mode 100644
index 0000000..6a77b20
--- /dev/null
+++ b/perl-example.stp
@@ -0,0 +1,19 @@
+/*
+ Example of the perl systemtap tapset shows a nested view of perl
Inline Patchdiff --git a/perl.stp b/perl.stp
new file mode 100755
index 0000000..38122d2
--- /dev/null
+++ b/perl.stp
@@ -0,0 +1,26 @@
+ /*
+ This probe will fire when the perl script enters a subroutine.
+ */
+
+probe perl.sub.call = process("LIBRARY_PATH").mark("sub__entry")
+{
+
+ sub = user_string($arg1)
+ filename = user_string($arg2)
+ lineno = $arg3
+
+}
+
+/*
+ This probe will fire when the return from a subroutine has been
+ hit.
+ */
+
+probe perl.sub.return = process("LIBRARY_PATH").mark("sub__return")
+{
+
+ sub = user_string($arg1)
+ filename = user_string($arg2)
+ lineno = $arg3
+
+} Perl Info
|
From @jkeenanOn Thu Jan 27 10:42:06 2011, lberk@redhat.com wrote:
I suspect that the reason why this RT has not garnered a response in Would it be possible to work the above patch into a patch to Thank you very much. |
The RT System itself - Status changed from 'new' to 'open' |
Migrated from rt.perl.org#82922 (status was 'open')
Searchable as RT82922$
The text was updated successfully, but these errors were encountered: