Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp4143589rwb; Sat, 21 Jan 2023 06:35:10 -0800 (PST) X-Google-Smtp-Source: AMrXdXuUYHyveMAqo29ZOTlx2cKcpKpxvKJYY1sA4w/A39OSWuqotz4OuSEd3M1WB9txv1z9lbiI X-Received: by 2002:aa7:cd89:0:b0:49d:14cf:5f4a with SMTP id x9-20020aa7cd89000000b0049d14cf5f4amr18988614edv.39.1674311710365; Sat, 21 Jan 2023 06:35:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674311710; cv=none; d=google.com; s=arc-20160816; b=ImjW0rBJmkJ+Aii/kconGM8iYreljCXBR8+juOx2k/Efm/yTZm8PEVYHA8oipqLCcY ReRVDAE4V86FfQXd+SYqMsbzJbFEkrh9uzdSg7fzcmRhYqGwZkC7J1l9v/MrfueF5NRz KSbq1hVRmT57rMvtljD0A7XlP2WtUtLMNNUXtt3YPrf7WJgT9qSm3KgyXKf8MwFXhoUI PB+Uob71FUKsTsFgS8nnRd1YD8Rxth9YNk1n4SFxQ8Y5E0G/CYXEmhHPgdRsnodwbJHS pDPAgUIa4TCSO6GHQCDElCv+DEGQfwt2886b0kXrKBBk8gaqCXhaXbWDWku2wUptgrP2 bP6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=KPeFm3n4Sr3sAHF6AWYd8mgpdZVoIGrZ/cPna3eTTcY=; b=ZVuhWmm7HowjMFGMTm072E0q4dMM2OC8N84nc+S6yqF1I8r4wOItFbKJIGYirrMs5r DsuhijvZiYPJc+E4/LVbMypEl3tYI9DFhx375i4As9Hf8SPQJvgbCTq/FIS+T92e25T4 zLfc9aGJPSiIMrDMTu4SBwMzOqvlHssoTAyUxh4Tl4UW099Zalt91D9R9UvA1UDU8Rtk WWkkq5b8akzA6hWZvS9Y5PJclNHdqZX4RDllpN0MBa828nXNZRK1VuHejyqOt+gXwkCJ L8lloqUKh/pejlT3NlZdhxypdi5AYIPIUm4sMNLaWxoPj8gVeGnOL4+aTN1w1E89/mbJ Ulow== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@smile-fr.20210112.gappssmtp.com header.s=20210112 header.b=bPoGKWT6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j20-20020a05640211d400b0047db5ff4936si24376994edw.490.2023.01.21.06.34.57; Sat, 21 Jan 2023 06:35:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@smile-fr.20210112.gappssmtp.com header.s=20210112 header.b=bPoGKWT6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229810AbjAUObc (ORCPT + 50 others); Sat, 21 Jan 2023 09:31:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60340 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229790AbjAUOba (ORCPT ); Sat, 21 Jan 2023 09:31:30 -0500 Received: from mail-wr1-x42d.google.com (mail-wr1-x42d.google.com [IPv6:2a00:1450:4864:20::42d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0997339B82 for ; Sat, 21 Jan 2023 06:31:27 -0800 (PST) Received: by mail-wr1-x42d.google.com with SMTP id r2so7138560wrv.7 for ; Sat, 21 Jan 2023 06:31:27 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smile-fr.20210112.gappssmtp.com; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=KPeFm3n4Sr3sAHF6AWYd8mgpdZVoIGrZ/cPna3eTTcY=; b=bPoGKWT6xsXVJNIZKOTBgctIUYofB3NfhmiwIlGClXZirxMz8mBZX7oH/4DrgHxK8t gmWDXlgQE6NSsv6IiAU2Z23na3bTZJb7j4m87QNCahfhpJG2TjnFO3FaYVQQxzbDP7Sh jHTZnqYDAQ1POFmVvFjbZ6Jw4YCFE5BdLgeuJQ9bwnS7T8qJLMu7mmcIryECosbDcov2 XfbB8LuRPMVHP5jARjlt+WWUcSxmmJSfJQf28PP9l+o1GHh5HmfDUdAjf1VBR07eRqyI YSnY9uunMNS2Uvhrb3b16h/oc3BZS2Vsj6g8Z/8YCD9Nejy2v8ZGEhlGM5vwoY/6UX6U tQqg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=KPeFm3n4Sr3sAHF6AWYd8mgpdZVoIGrZ/cPna3eTTcY=; b=vmkLRa8w2HxmaOU5pFIJM3sxuXai75Fv6reiiHvqDESQ8mVI8BXKzyBeC0pYFsdfIE EhkDM9bFWpzsmNcFgo+F2rbclJoJVq/1FVvs1BTluVNhIUsCJULQpS3RqCk58FBRRAoF BXckYyAJiy7p6kK4Iz6ijQ5v4DiM9OvHJFRKgKCDymN1Kv2bhMhxKrDGrjDH1NOSrMqs zuTwVvrFjzQgtnUdZck5AffXbeyFlO2QoYsydEaAIch3eYl0FMc2CLBXR/wYOhCQiFE0 V4hf3A/RjqbukfJWM08Bl31Ijos4p1Tb46XjbwYDfaXrfrYcLWIeIKQpGZXs9N4mQu3G dZxw== X-Gm-Message-State: AFqh2kpxW1czORP8+umIRZgQwrp0RsE5hAPX86h7mBeG0QxGiaNjwDLN 7Z8t/05feUEDA79PbKT6KwkZmQ== X-Received: by 2002:a5d:5e85:0:b0:2bb:32bd:1dc0 with SMTP id ck5-20020a5d5e85000000b002bb32bd1dc0mr17120725wrb.58.1674311486439; Sat, 21 Jan 2023 06:31:26 -0800 (PST) Received: from P-ASN-ECS-830T8C3.mpl.intranet (89-159-1-53.rev.numericable.fr. [89.159.1.53]) by smtp.gmail.com with ESMTPSA id p8-20020a5d4588000000b002bdfb97e029sm16314604wrq.19.2023.01.21.06.31.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 21 Jan 2023 06:31:25 -0800 (PST) From: Yoann Congal To: linux-trace-kernel@vger.kernel.org Cc: Yoann Congal , Steven Rostedt , Masami Hiramatsu , Jonathan Corbet , linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org Subject: [PATCH v2 1/3] Documentation: kprobetrace: Fix some typos Date: Sat, 21 Jan 2023 15:31:08 +0100 Message-Id: <20230121143110.1706962-1-yoann.congal@smile.fr> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20230121142242.1706081-1-yoann.congal@smile.fr> References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Uncapitalise tracepoint * Hyphen in *-based * Plurals * fetch-args -> fetchargs * 2bytes -> 2-bytes * .. -> . * arch -> architecture Signed-off-by: Yoann Congal --- Documentation/trace/kprobetrace.rst | 17 +++++++++-------- 1 file changed, 9 insertions(+), 8 deletions(-) diff --git a/Documentation/trace/kprobetrace.rst b/Documentation/trace/kprobetrace.rst index 08a2a6a3782f0..1eb2c68aa0a71 100644 --- a/Documentation/trace/kprobetrace.rst +++ b/Documentation/trace/kprobetrace.rst @@ -6,16 +6,16 @@ Kprobe-based Event Tracing Overview -------- -These events are similar to tracepoint based events. Instead of Tracepoint, +These events are similar to tracepoint-based events. Instead of tracepoints, this is based on kprobes (kprobe and kretprobe). So it can probe wherever kprobes can probe (this means, all functions except those with __kprobes/nokprobe_inline annotation and those marked NOKPROBE_SYMBOL). -Unlike the Tracepoint based event, this can be added and removed +Unlike the tracepoint-based event, this can be added and removed dynamically, on the fly. To enable this feature, build your kernel with CONFIG_KPROBE_EVENTS=y. -Similar to the events tracer, this doesn't need to be activated via +Similar to the event tracer, this doesn't need to be activated via current_tracer. Instead of that, add probe points via /sys/kernel/debug/tracing/kprobe_events, and enable it via /sys/kernel/debug/tracing/events/kprobes//enable. @@ -68,7 +68,7 @@ Synopsis of kprobe_events Types ----- -Several types are supported for fetch-args. Kprobe tracer will access memory +Several types are supported for fetchargs. Kprobe tracer will access memory by given type. Prefix 's' and 'u' means those types are signed and unsigned respectively. 'x' prefix implies it is unsigned. Traced arguments are shown in decimal ('s' and 'u') or hexadecimal ('x'). Without type casting, 'x32' @@ -76,14 +76,15 @@ or 'x64' is used depends on the architecture (e.g. x86-32 uses x32, and x86-64 uses x64). These value types can be an array. To record array data, you can add '[N]' (where N is a fixed number, less than 64) to the base type. -E.g. 'x16[4]' means an array of x16 (2bytes hex) with 4 elements. +E.g. 'x16[4]' means an array of x16 (2-bytes hex) with 4 elements. Note that the array can be applied to memory type fetchargs, you can not apply it to registers/stack-entries etc. (for example, '$stack1:x8[8]' is wrong, but '+8($stack):x8[8]' is OK.) String type is a special type, which fetches a "null-terminated" string from kernel space. This means it will fail and store NULL if the string container has been paged out. "ustring" type is an alternative of string for user-space. -See :ref:`user_mem_access` for more info.. +See :ref:`user_mem_access` for more info. + The string array type is a bit different from other types. For other base types, [1] is equal to (e.g. +0(%di):x32[1] is same as +0(%di):x32.) But string[1] is not equal to string. The string type itself @@ -120,8 +121,8 @@ space. 'ustring' is a shortcut way of performing the same task. That is, Note that kprobe-event provides the user-memory access syntax but it doesn't use it transparently. This means if you use normal dereference or string type -for user memory, it might fail, and may always fail on some archs. The user -has to carefully check if the target data is in kernel or user space. +for user memory, it might fail, and may always fail on some architectures. The +user has to carefully check if the target data is in kernel or user space. Per-Probe Event Filtering ------------------------- -- 2.30.2