Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2214134imm; Mon, 16 Jul 2018 04:24:20 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdj2bnioJZDOkzftyAZ9334nLno9W9WGcZ/TBGlh4oeB2gkCOOSHgd6fJXlTNGW6qwrrJdl X-Received: by 2002:a62:9f16:: with SMTP id g22-v6mr17352947pfe.207.1531740260759; Mon, 16 Jul 2018 04:24:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531740260; cv=none; d=google.com; s=arc-20160816; b=rnS8DyG/bot8dbzyYasSINkBGjB0Rr/mdV+c5cWYVJ0mWWsI7txarlVUqLMbwlBHxp VEbPRwwK1JwY989Z+WU1n5yhwrKMSHZf+7sphokn9PF0PRvasUPJ2fcpdo/0cnoI6gRD 4rGJKzW/ENf6O5prBe8hWkatjchKIdxXorXKpW47qGGghLAYSQXtK7Rh1wY1tZUIR2vO iiSqw7tudBdWZE5+Om0OyaSG7tV0ScMw6ZYhiKpRcwT72eaYoaFGKxkXCoDiszjsFPZe Eg4STmxoYG0vUGmSS2VY3JdorrNKNSU/mz81XSLbRHPGDuT5POQhbnFrp/6VTI2QaGs+ M2xQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=473qP+tKLDnwjPHXaUeLTLMEog02bBDN6mc5jU1iTNg=; b=D+pnxIG+AMN/T8P/Xm/3f+1AAiSt4lyLUOzCMT5DjXopcPMweZB10EeC9Ehc5IWL9w bjh9cTYt892ZO5cfbGd1kFWo7foQWRryapnV8jJPjbajM+rP1WPGUY5xUjX1OCMZRSda ZnETSy1u6EoXbXxZAci6UAFbIRLGFg64B61L2Sv+/+X33LU5sLxKBD7LRXeQhYib0IBI TsGpAHjF4ccC5qIfTsLyn+eJwrYDZdPSiPbbS3bYk8r4DxCu23MLsQJ0feoCHjxd1Ii8 iOGtHFtxSTjA2cpeshC6oBimgX1JYzFSEmxRTY6CyeXEIgnQTQ8NRAw1SVLlNylvYGlp YQ/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o5-v6si4527723pll.449.2018.07.16.04.24.05; Mon, 16 Jul 2018 04:24:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729917AbeGPLu2 (ORCPT + 99 others); Mon, 16 Jul 2018 07:50:28 -0400 Received: from faui40.informatik.uni-erlangen.de ([131.188.34.40]:60146 "EHLO faui40.informatik.uni-erlangen.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726602AbeGPLu1 (ORCPT ); Mon, 16 Jul 2018 07:50:27 -0400 Received: from faui49t (faui49t.informatik.uni-erlangen.de [131.188.42.17]) by faui40.informatik.uni-erlangen.de (Postfix) with SMTP id 9BFA958C4F4; Mon, 16 Jul 2018 13:23:25 +0200 (CEST) Received: by faui49t (sSMTP sendmail emulation); Mon, 16 Jul 2018 13:23:25 +0200 From: Andreas Ziegler To: Jonathan Corbet Cc: Changbin Du , Steven Rostedt , Tom Zanussi , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Andreas Ziegler Subject: [PATCH 1/2] Documentation: {u,k}probes: fix filename for event enabling Date: Mon, 16 Jul 2018 13:05:57 +0200 Message-Id: <1531739158-31133-2-git-send-email-andreas.ziegler@fau.de> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1531739158-31133-1-git-send-email-andreas.ziegler@fau.de> References: <1531739158-31133-1-git-send-email-andreas.ziegler@fau.de> X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED=-1 autolearn=disabled version=3.4.0 X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on faui40.informatik.uni-erlangen.de Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The per-event files to enable or disable kprobes and uprobes are named 'enable', not 'enabled'. Fix the corresponding documentation. Signed-off-by: Andreas Ziegler --- Documentation/trace/kprobetrace.rst | 6 +++--- Documentation/trace/uprobetracer.rst | 2 +- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Documentation/trace/kprobetrace.rst b/Documentation/trace/kprobetrace.rst index 3e0f971..c4aaef7d 100644 --- a/Documentation/trace/kprobetrace.rst +++ b/Documentation/trace/kprobetrace.rst @@ -18,7 +18,7 @@ To enable this feature, build your kernel with CONFIG_KPROBE_EVENTS=y. Similar to the events tracer, this doesn't need to be activated via current_tracer. Instead of that, add probe points via /sys/kernel/debug/tracing/kprobe_events, and enable it via -/sys/kernel/debug/tracing/events/kprobes//enabled. +/sys/kernel/debug/tracing/events/kprobes//enable. Synopsis of kprobe_events @@ -81,9 +81,9 @@ Per-probe event filtering feature allows you to set different filter on each probe and gives you what arguments will be shown in trace buffer. If an event name is specified right after 'p:' or 'r:' in kprobe_events, it adds an event under tracing/events/kprobes/, at the directory you can see 'id', -'enabled', 'format' and 'filter'. +'enable', 'format' and 'filter'. -enabled: +enable: You can enable/disable the probe by writing 1 or 0 on it. format: diff --git a/Documentation/trace/uprobetracer.rst b/Documentation/trace/uprobetracer.rst index 98d3f69..d082281 100644 --- a/Documentation/trace/uprobetracer.rst +++ b/Documentation/trace/uprobetracer.rst @@ -13,7 +13,7 @@ To enable this feature, build your kernel with CONFIG_UPROBE_EVENTS=y. Similar to the kprobe-event tracer, this doesn't need to be activated via current_tracer. Instead of that, add probe points via /sys/kernel/debug/tracing/uprobe_events, and enable it via -/sys/kernel/debug/tracing/events/uprobes//enabled. +/sys/kernel/debug/tracing/events/uprobes//enable. However unlike kprobe-event tracer, the uprobe event interface expects the user to calculate the offset of the probepoint in the object. -- 2.7.4