From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 6520 invoked by alias); 30 Jul 2008 15:22:01 -0000 Received: (qmail 6148 invoked by uid 48); 30 Jul 2008 15:20:46 -0000 Date: Wed, 30 Jul 2008 15:22:00 -0000 Message-ID: <20080730152046.6139.qmail@sourceware.org> From: "fche at redhat dot com" To: systemtap@sources.redhat.com In-Reply-To: <20080422120128.6445.fche@redhat.com> References: <20080422120128.6445.fche@redhat.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug translator/6445] extend utrace probes with "system-wide" and target-process syntax X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2008-q3/txt/msg00338.txt.bz2 ------- Additional Comments From fche at redhat dot com 2008-07-30 15:20 ------- For purposes of this, it would be sufficient to have two extensions: - process("*") syntax that maps to the task_finder's unrestricted pathname/pid - target-process syntax that maps to another task_finder option that restricts its monitoring to the target() (stap -c/-x) hierarchy Maybe these two could be the same -- i.e., if someone runs "stap -c/-x", then process("*").foo (or simpler, process.foo) probes would automagically be restricted to the target process hierarchy. Finally, bug #6456 could be a followup to support finer-grained wildcards as in process("/bin/*"). -- What |Removed |Added ---------------------------------------------------------------------------- Summary|extend utrace probes with |extend utrace probes with |wildcard and target-process |"system-wide" and target- |syntax |process syntax http://sourceware.org/bugzilla/show_bug.cgi?id=6445 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.