Chapter 2. Context Functions

Table of Contents

print_regs — Print a register dump.
execname — Returns the execname of a target process (or group of processes).
pid — Returns the ID of a target process.
tid — Returns the thread ID of a target process.
ppid — Returns the process ID of a target process's parent process.
pgrp — Returns the process group ID of the current process.
sid — Returns the session ID of the current process.
pexecname — Returns the execname of a target process's parent process.
gid — Returns the group ID of a target process.
egid — Returns the effective gid of a target process.
uid — Returns the user ID of a target process.
euid — Return the effective uid of a target process.
is_myproc — Determines if the current probe point has occurred in the user's own process.
cpu — Returns the current cpu number.
pp — Return the probe point associated with the currently running probe handler,
registers_valid — Determines validity of register and u_register in current context.
user_mode — Determines if probe point occurs in user-mode.
is_return — Whether the current probe context is a return probe.
target — Return the process ID of the target process.
module_name — The module name of the current script.
stp_pid — The process id of the stapio process.
stack_size — Return the size of the kernel stack.
stack_used — Returns the amount of kernel stack used.
stack_unused — Returns the amount of kernel stack currently available.
uaddr — User space address of current running task. EXPERIMENTAL.
print_stack — Print out stack from string.
probefunc — Return the probe point's function name, if known.
probemod — Return the probe point's module name, if known.
modname — Return the kernel module name loaded at the address.
symname — Return the symbol associated with the given address.
symdata — Return the symbol and module offset for the address.
usymname — Return the symbol of an address in the current task. EXPERIMENTAL!
usymdata — Return the symbol and module offset of an address. EXPERIMENTAL!
print_ustack — Print out stack for the current task from string. EXPERIMENTAL!
print_backtrace — Print stack back trace
backtrace — Hex backtrace of current stack
task_backtrace — Hex backtrace of an arbitrary task
caller — Return name and address of calling function
caller_addr — Return caller address
print_ubacktrace — Print stack back trace for current task. EXPERIMENTAL!
print_ubacktrace_brief — Print stack back trace for current task. EXPERIMENTAL!
ubacktrace — Hex backtrace of current task stack. EXPERIMENTAL!

The context functions provide additional information about where an event occurred. These functions can provide information such as a backtrace to where the event occurred and the current register values for the processor.