SystemTap
In computing, SystemTap (stap) is a scripting language and tool for dynamically instrumenting running production Linux-based operating systems. System administrators can use SystemTap to extract, filter and summarize data in order to enable diagnosis of complex performance or functional problems. SystemTap consists of free and open-source software and includes contributions from Red Hat, IBM, Intel, Hitachi, Oracle, the University of Wisconsin-Madison and other community members.[1] HistorySystemTap debuted in 2005 in Red Hat Enterprise Linux 4 Update 2 as a technology preview.[2] After four years in development, SystemTap 1.0 was released in 2009.[3] As of 2011[update], SystemTap runs fully supported in all Linux distributions including RHEL / CentOS 5[4] since update 2, SLES 10,[5] Fedora, Debian and Ubuntu. Tracepoints in the CPython VM and JVM were added in SystemTap 1.2 in 2009.[6] In November 2019, SystemTap 4.2 included prometheus exporter. UsageSystemTap files are written in the SystemTap language[7] (saved as The system carries out a number of analysis passes on the script before allowing it to run. Scripts may be executed with one of three backends selected by the Scripts generally focus on events (such as starting or finishing a script), compiled-in probe points such as Linux "tracepoints", or the execution of functions or statements in the kernel or user-space. Some "guru mode" scripts may also have embedded C, which may run with the As of SystemTap version 1.7, the software implements the new stapsys group and privilege level.[10] Simple examplesThe following script shows all applications setting TCP socket options on the system, what options are being set, and whether the option is set successfully or not. # Show sockets setting options
# Return enabled or disabled based on value of optval
function getstatus(optval)
{
if ( optval == 1 )
return "enabling"
else
return "disabling"
}
probe begin
{
print ("\nChecking for apps setting socket options\n")
}
# Set a socket option
probe tcp.setsockopt
{
status = getstatus(user_int($optval))
printf (" App '%s' (PID %d) is %s socket option %s... ", execname(), pid(), status, optstr)
}
# Check setting the socket option worked
probe tcp.setsockopt.return
{
if ( ret == 0 )
printf ("success")
else
printf ("failed")
printf ("\n")
}
probe end
{
print ("\nClosing down\n")
}
Many other examples are shipped with SystemTap.[11] There are also real-world examples of SystemTap use at the War Stories page.[12] Importing scripts from other tracing technologiesSystemTap can attach to DTrace markers when they are compiled into an application using macros from the See alsoReferences
External links
|