Chapter 2. Context Functions
Table of Contents
- print_regs —
Print a register dump.
- execname —
Returns the execname of a target process (or group of processes).
- pid —
Returns the ID of a target process.
- tid —
Returns the thread ID of a target process.
- ppid —
Returns the process ID of a target process's parent process.
- pgrp —
Returns the process group ID of the current process.
- sid —
Returns the session ID of the current process.
- pexecname —
Returns the execname of a target process's parent process.
- gid —
Returns the group ID of a target process.
- egid —
Returns the effective gid of a target process.
- uid —
Returns the user ID of a target process.
- euid —
Return the effective uid of a target process.
- is_myproc —
Determines if the current probe point has occurred in the user's own process.
- cpu —
Returns the current cpu number.
- pp —
Return the probe point associated with the currently running probe handler,
- registers_valid —
Determines validity of <command>
register
</command> and <command>u_register
</command> in current context.
- user_mode —
Determines if probe point occurs in user-mode.
- is_return —
Determines if probe point is a return probe.
- target —
Return the process ID of the target process.
- stack_size —
Return the size of the kernel stack.
- stack_used —
Returns the amount of kernel stack used.
- stack_unused —
Returns the amount of kernel stack currently available.
- uaddr —
User space address of current running task. EXPERIMENTAL.
- print_stack —
Print out stack from string.
- probefunc —
Return the probe point's function name, if known.
- probemod —
Return the probe point's module name, if known.
- modname —
Return the kernel module name loaded at the address.
- symname —
Return the symbol associated with the given address.
- symdata —
Return the symbol and module offset for the address.
- usymname —
Return the symbol of an address in the current task. EXPERIMENTAL!
- usymdata —
Return the symbol and module offset of an address. EXPERIMENTAL!
- print_ustack —
Print out stack for the current task from string. EXPERIMENTAL!
- print_backtrace —
Print stack back trace
- backtrace —
Hex backtrace of current stack
- task_backtrace —
Hex backtrace of an arbitrary task
- caller —
Return name and address of calling function
- caller_addr —
Return caller address
- print_ubacktrace —
Print stack back trace for current task. EXPERIMENTAL!
- ubacktrace —
Hex backtrace of current task stack. EXPERIMENTAL!
The context functions provide additional information about where
an event occurred.
These functions can provide information such as a backtrace to
where the event occurred
and the current register values for the processor.