From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 22183 invoked by alias); 13 Oct 2005 10:44:42 -0000 Mailing-List: contact systemtap-help@sources.redhat.com; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sources.redhat.com Received: (qmail 22172 invoked by uid 22791); 13 Oct 2005 10:44:39 -0000 Message-ID: <434E3AA0.9040407@oracle.com> Date: Thu, 13 Oct 2005 10:44:00 -0000 From: Bryce User-Agent: Mozilla Thunderbird 1.0 (X11/20041206) X-Accept-Language: en-us, en MIME-Version: 1.0 To: systemtap@sources.redhat.com Subject: Question on checking the stack Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Brightmail-Tracker: AAAAAQAAAAI= X-Whitelist: TRUE X-SW-Source: 2005-q4/txt/msg00043.txt.bz2 Setting up a probe for a function is great and all but is there a way to test how we entered the routine? eg 0xc024d991 : generic_make_request+0xa/0x24b 0xc0145d20 : find_get_page+0x37/0x42 and 0xc024d991 : generic_make_request+0xa/0x24b 0xc024dc17 : submit_bio+0x45/0xcb I'm not interested in EVERY time we trace into a function, only when we've come from a different routine is there something along the lines of this idea available? probe kernel.function("generic_make_request") { if (stack(1) == "submit_bio" ) { // where stack(1) was the last routine and stack(2) was 2nd last etc do_test/display } }