HEX
Server: Apache/2.4.34 (Red Hat) OpenSSL/1.0.2k-fips
System: Linux WORDPRESS 3.10.0-1160.118.1.el7.x86_64 #1 SMP Thu Apr 4 03:33:23 EDT 2024 x86_64
User: digital (1020)
PHP: 7.2.24
Disabled: NONE
Upload Files
File: //usr/share/systemtap/examples/memory/hw_watch_sym.meta
title: Watch a Kernel Symbol Using Breakpoint Hardware
name: hw_watch_sym.stp
version: 1.0
author: William Cohen
keywords: memory watchpoint
subsystem: memory
status: production
exit: user-controlled
output: trace
scope: system-wide
description: The script will watch accesses to the starting address of a single kernel symbol and prints a traceback each time the symbol is accessed. This script needs to be run as root to allow access to the breakpoint hardware.
test_support: perf stat -a --event=mem:0x`grep "vm_dirty_ratio" /proc/kallsyms | awk '{print $1}'` /bin/true
test_check: stap --all-modules -p4 hw_watch_sym.stp vm_dirty_ratio
test_installcheck: stap --all-modules hw_watch_sym.stp vm_dirty_ratio -T 5