Chapter 2. Context Functions

Table of Contents

print_regs - Print a register dump.
execname - Returns the execname of a target process (or group of processes).
pid - Returns the ID of a target process.
tid - Returns the thread ID of a target process.
ppid - Returns the process ID of a target process's parent process.
pgrp - Returns the process group ID of the current process.
sid - Returns the session ID of the current process.
pexecname - Returns the execname of a target process's parent process.
gid - Returns the group ID of a target process.
egid - Returns the effective gid of a target process.
uid - Returns the user ID of a target process.
euid - Return the effective uid of a target process.
is_myproc - Determines if the current probe point has occurred in the user's own process.
cpu - Returns the current cpu number.
pp - Return the probe point associated with the currently running probe handler,
registers_valid - Determines validity of register and u_register in current context.
user_mode - Determines if probe point occurs in user-mode.
is_return - Whether the current probe context is a return probe.
target - Return the process ID of the target process.
module_name - The module name of the current script.
stp_pid - The process id of the stapio process.
stack_size - Return the size of the kernel stack.
stack_used - Returns the amount of kernel stack used.
stack_unused - Returns the amount of kernel stack currently available.
uaddr - User space address of current running task. EXPERIMENTAL.
print_stack - Print out stack from string.
probefunc - Return the probe point's function name, if known.
probemod - Return the probe point's module name, if known.
modname - Return the kernel module name loaded at the address.
symname - Return the symbol associated with the given address.
symdata - Return the symbol and module offset for the address.
usymname - Return the symbol of an address in the current task. EXPERIMENTAL!
usymdata - Return the symbol and module offset of an address. EXPERIMENTAL!
print_ustack - Print out stack for the current task from string. EXPERIMENTAL!
print_backtrace - Print stack back trace
backtrace - Hex backtrace of current stack
task_backtrace - Hex backtrace of an arbitrary task
caller - Return name and address of calling function
caller_addr - Return caller address
print_ubacktrace - Print stack back trace for current task. EXPERIMENTAL!
print_ubacktrace_brief - Print stack back trace for current task. EXPERIMENTAL!
ubacktrace - Hex backtrace of current task stack. EXPERIMENTAL!

The context functions provide additional information about where an event occurred. These functions can provide information such as a backtrace to where the event occurred and the current register values for the processor.