This file is indexed.

/usr/share/systemtap/tapset/stap_staticmarkers.stp is in systemtap-common 2.3-1ubuntu1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
// stap/staprun/stapio static probes tapset
// 
// Copyright (C) 2009 Red Hat Inc.
//
// This file is part of systemtap, and is free software.  You can
// redistribute it and/or modify it under the terms of the GNU General
// Public License (GPL); either version 2, or (at your option) any
// later version.

/**
 * probe stap.pass0 - Starting stap pass0 (parsing command line arguments)
 *
 * @session: the systemtap_session variable s
 * 
 * pass0 fires after command line arguments have been parsed.
 */
probe stap.pass0 = process("stap").mark("pass0__start") { 
	session = $arg1
}

/**
 * probe stap.pass0.end - Finished stap pass0 (parsing command line arguments)
 * @session: the systemtap_session variable s
 * 
 * pass0.end fires just before the gettimeofday() call for pass1.
 */
probe stap.pass0.end = process("stap").mark("pass0__end") { 
	session = $arg1
}

/**
 * probe stap.pass1a - Starting stap pass1 (parsing user script)
 * @session: the systemtap_session variable s
 *
 * pass1a fires just after the call to gettimeofday(), before the
 *   user script is parsed.
 */
probe stap.pass1a = process("stap").mark("pass1a__start") { 
	session = $arg1
}

/**
 * probe stap.pass1b - Starting stap pass1 (parsing library scripts)
 * @session: the systemtap_session variable s
 *
 * pass1b fires just before the library scripts are parsed.
 */
probe stap.pass1b = process("stap").mark("pass1b__start") { 
	session = $arg1
}

/**
 * probe stap.pass1.end - Finished stap pass1 (parsing scripts)
 * @session: the systemtap_session variable s
 *
 * pass1.end fires just before the jump to cleanup if s.last_pass = 1.
 */
probe stap.pass1.end = process("stap").mark("pass1__end") { 
	session = $arg1
}

/**
 * probe stap.pass2 - Starting stap pass2 (elaboration)
 * @session: the systemtap_session variable s
 *
 * pass2 fires just after the call to gettimeofday(), just before the 
 *   call to semantic_pass.
 */
probe stap.pass2 = process("stap").mark("pass2__start") { 
	session = $arg1
}

/**
 * probe stap.pass2.end - Finished stap pass2 (elaboration)
 * @session: the systemtap_session variable s
 *
 * pass2.end fires just before the jump to cleanup if s.last_pass = 2
 */
probe stap.pass2.end = process("stap").mark("pass2__end") { 
	session = $arg1
}

/**
 * probe stap.pass3 - Starting stap pass3 (translation to C)
 * @session: the systemtap_session variable s
 *
 * pass3 fires just after the call to gettimeofday(), just before the
 *   call to translate_pass.
 */
probe stap.pass3 = process("stap").mark("pass3__start") { 
	session = $arg1
}

/**
 * probe stap.pass3.end - Finished stap pass3 (translation to C)
 * @session: the systemtap_session variable s
 *
 * pass3.end fires just before the jump to cleanup if s.last_pass = 3
 */
probe stap.pass3.end = process("stap").mark("pass3__end") { 
	session = $arg1
}

/**
 * probe stap.pass4 - Starting stap pass4 (compile C code into kernel module)
 * @session: the systemtap_session variable s
 *
 * pass4 fires just after the call to gettimeofday(), just before the
 *   call to compile_pass.
 */
probe stap.pass4 = process("stap").mark("pass4__start") { 
	session = $arg1
}

/**
 * probe stap.pass4.end - Finished stap pass4 (compile C code into kernel module)
 * @session: the systemtap_session variable s
 *
 * pass4.end fires just before the jump to cleanup if s.last_pass = 4
 */
probe stap.pass4.end = process("stap").mark("pass4__end") { 
	session = $arg1
}

/**
 * probe stap.pass5 - Starting stap pass5 (running the instrumentation)
 * @session: the systemtap_session variable s
 *
 * pass5 fires just after the call to gettimeofday(), just before the
 *   call to run_pass.
 */
probe stap.pass5 = process("stap").mark("pass5__start") { 
	session = $arg1
}

/**
 * probe stap.pass5.end - Finished stap pass5 (running the instrumentation)
 * @session: the systemtap_session variable s
 *
 * pass5.end fires just before the cleanup label
 */
probe stap.pass5.end = process("stap").mark("pass5__end") { 
	session = $arg1
}

/**
 * probe stap.pass6 - Starting stap pass6 (cleanup)
 * @session: the systemtap_session variable s
 *
 * pass6 fires just after the cleanup label, essentially the same spot
 *   as pass5.end
 */
probe stap.pass6 = process("stap").mark("pass6__start") { 
	session = $arg1
}

/**
 * probe stap.pass6.end - Finished stap pass6 (cleanup)
 * @session: the systemtap_session variable s
 *
 * pass6.end fires just before main's return.
 */
probe stap.pass6.end = process("stap").mark("pass6__end") { 
	session = $arg1
}

/**
 * probe stap.cache_clean - Removing file from stap cache
 * @path: the path to the .ko/.c file being removed
 *
 * Fires just before the call to unlink the module/source file. 
 */
probe stap.cache_clean = process("stap").mark("cache__clean") { 
	path = user_string_quoted($arg1)
}

/**
 * probe stap.cache_add_mod - Adding kernel instrumentation module to cache
 * @source_path: the path the .ko file is coming from (incl filename)
 * @dest_path: the path the .ko file is going to (incl filename)
 * 
 * Fires just before the file is actually moved. Note: if moving fails,
 *    cache_add_src and cache_add_nss will not fire.
 */
probe stap.cache_add_mod = process("stap").mark("cache__add__module") { 
	source_path = user_string_quoted($arg1)
	dest_path = user_string_quoted($arg2)
}

/**
 * probe stap.cache_add_src - Adding C code translation to cache
 * @source_path: the path the .c file is coming from (incl filename)
 * @dest_path: the path the .c file is going to (incl filename)
 *
 * Fires just before the file is actually moved. Note: if moving the
 *   kernel module fails, this probe will not fire.
 */
probe stap.cache_add_src = process("stap").mark("cache__add__source") { 
	source_path = user_string_quoted($arg1)
	dest_path = user_string_quoted($arg2)
}

/**
 * probe stap.cache_add_nss - Add NSS (Network Security Services) information to cache
 * @source_path: the path the .sgn file is coming from (incl filename)
 * @dest_path: the path the .sgn file is coming from (incl filename)
 *
 * Fires just before the file is actually moved. Note: stap must compiled
 *   with NSS support; if moving the kernel module fails, this probe will
 *   not fire.
 */
probe stap.cache_add_nss = process("stap").mark("cache__add__nss") ? { 
	source_path = user_string_quoted($arg1)
	dest_path = user_string_quoted($arg2)
}

/**
 * probe stap.cache_get - Found item in stap cache
 * @source_path: the path of the .c source file
 * @module_path: the path of the .ko kernel module file
 *
 * Fires just before the return of get_from_cache, when the cache grab
 *   is successful.
 */
probe stap.cache_get = process("stap").mark("cache__get") { 
	source_path = user_string_quoted($arg1)
	module_path = user_string_quoted($arg2)
}

/**
 * probe stap.system - Starting a command from stap
 * @command: the command string to be run by posix_spawn (as sh -c <str>)
 *
 * Fires at the entry of the stap_system command.
 */
probe stap.system = process("stap").mark("stap_system__start") { 
	command = user_string_quoted($arg1)
}

/**
 * probe stap.system.spawn - stap spawned new process
 * @ret: the return value from posix_spawn
 * @pid: the pid of the spawned process
 *
 * Fires just after the call to posix_spawn.
 */
probe stap.system.spawn = process("stap").mark("stap_system__spawn") { 
	/* posix_spawn(3p) for meaning of ret */
	ret = $arg1
	pid = $arg2
}

/**
 * probe stap.system.return - Finished a command from stap
 * @ret: a return code associated with running waitpid on the spawned process; 
 *         a non-zero value indicates error
 *
 * Fires just before the return of the stap_system function, after waitpid.
 */
probe stap.system.return = process("stap").mark("stap_system__complete") { 
	ret = $arg1
}

/**
 * probe staprun.insert_module - Inserting SystemTap instrumentation module
 * @path: the full path to the .ko kernel module about to be inserted
 *
 * Fires just before the call to insert the module.
 */
probe staprun.insert_module = process("staprun").mark("insert__module") { 
	path = user_string_quoted($arg1)
}

/**
 * probe staprun.remove_module - Removing SystemTap instrumentation module
 * @name: the stap module name to be removed (without the .ko extension)
 *
 * Fires just before the call to remove the module.
 */
probe staprun.remove_module = process("staprun").mark("remove__module") {
	name = user_string_quoted($arg1)
}

/**
 * probe staprun.send_control_message - Sending a control message
 * @type: type of message being send; defined in runtime/transport/transport_msgs.h
 * @data: a ptr to a binary blob of data sent as the control message
 * @len: the length (in bytes) of the data blob
 *
 * Fires at the beginning of the send_request function.
 */
probe staprun.send_control_message = process("staprun").mark("send__ctlmsg") {
	type = $arg1
	data = $arg2
	len = $arg3
}

/**
 * probe stapio.receive_control_message - Received a control message
 * @type: type of message being send; defined in runtime/transport/transport_msgs.h
 * @data: a ptr to a binary blob of data sent as the control message
 * @len: the length (in bytes) of the data blob
 *
 * Fires just after a message was receieved and before it's processed.
 */
/*
 *** Due to stapio not being in a user's PATH and the build environment of  ***
 *** stap, there is no immediate 'good' way to insert the correct path here ***
 *** so comment out this probe. Note however, the static marker is still    ***
 *** present in source.                                                     ***
probe stapio.receive_control_message = process("@libexecdir@/systemtap/stapio").mark("recv__ctlmsg") {
	type = $arg1
	data = $arg2
	len = $arg3
} 
*/