blob: cd08e674391d759063f3bc09afba6d57f72a721a (
plain) (
blame)
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 | <html><head><meta http-equiv="Content-Type" content="text/html; charset=UTF-8"><title>probe::syscall_any</title><meta name="generator" content="DocBook XSL Stylesheets Vsnapshot"><link rel="home" href="index.html" title="SystemTap Tapset Reference Manual"><link rel="up" href="syscall_any.stp.html" title="Chapter 36. Syscall Any Tapset"><link rel="prev" href="syscall_any.stp.html" title="Chapter 36. Syscall Any Tapset"><link rel="next" href="API-syscall-any-return.html" title="probe::syscall_any.return"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header"><tr><th colspan="3" align="center"><span class="phrase">probe::syscall_any</span></th></tr><tr><td width="20%" align="left"><a accesskey="p" href="syscall_any.stp.html">Prev</a> </td><th width="60%" align="center">Chapter 36. Syscall Any Tapset</th><td width="20%" align="right"> <a accesskey="n" href="API-syscall-any-return.html">Next</a></td></tr></table><hr></div><div class="refentry"><a name="API-syscall-any"></a><div class="titlepage"></div><div class="refnamediv"><h2>Name</h2><p>probe::syscall_any — Record entry into a syscall </p></div><div class="refsynopsisdiv"><h2>Synopsis</h2><pre class="synopsis">syscall_any </pre></div><div class="refsect1"><a name="id2669"></a><h2>Values</h2><div class="variablelist"><dl class="variablelist"><dt><span class="term"><em class="parameter"><code>syscall_nr</code></em></span></dt><dd><p> number of the syscall </p></dd><dt><span class="term"><em class="parameter"><code>name</code></em></span></dt><dd><p> name of the syscall </p></dd></dl></div></div><div class="refsect1"><a name="id2670"></a><h2>Context</h2><p> The process performing the syscall </p></div><div class="refsect1"><a name="id2671"></a><h2>Description</h2><p> The syscall_any probe point is designed to be a low overhead that monitors all the syscalls entered via a kernel tracepoint. Because of the breadth of syscalls it monitors it provides no information about the syscall arguments or argstr string representation of those arguments. </p><p> This requires kernel 3.5+ and newer which have the kernel.trace(<span class="quote">“<span class="quote">sys_enter</span>”</span>) probe point. </p></div></div><div class="navfooter"><hr><table width="100%" summary="Navigation footer"><tr><td width="40%" align="left"><a accesskey="p" href="syscall_any.stp.html">Prev</a> </td><td width="20%" align="center"><a accesskey="u" href="syscall_any.stp.html">Up</a></td><td width="40%" align="right"> <a accesskey="n" href="API-syscall-any-return.html">Next</a></td></tr><tr><td width="40%" align="left" valign="top">Chapter 36. Syscall Any Tapset </td><td width="20%" align="center"><a accesskey="h" href="index.html">Home</a></td><td width="40%" align="right" valign="top"> <span class="phrase">probe::syscall_any.return</span></td></tr></table></div></body></html>
|