06.08.2013 Views

pSOSystem System Calls - Read

pSOSystem System Calls - Read

pSOSystem System Calls - Read

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6 pROBE+ and ESp<br />

<strong>System</strong> <strong>Calls</strong><br />

This chapter provides detailed descriptions of the system calls supported by<br />

pROBE+ and ESp. The calls are listed alphabetically, with a multipage section of<br />

information for each call. Each call’s section includes its syntax, a detailed<br />

description, its arguments, and its return value.<br />

The ESp cross-system visual analyzer graphically displays your embedded<br />

application’s activity on a host terminal and allows you to analyze the application’s<br />

performance. ESp accepts one system call, log_event(), through its targetresident<br />

application monitor, pMONT.<br />

pROBE+ is <strong>pSO<strong>System</strong></strong>’s target debugger and analyzer. pROBE+ accepts two system<br />

calls: db_input() and db_output().<br />

If you need to look up a system call by its functionality, refer to Appendix A, “Tables<br />

of <strong>System</strong> <strong>Calls</strong>,” which lists the calls alphabetically by component and provides a<br />

brief description of each call.<br />

For more information on error codes, refer to Appendix B, “Error Codes,” which lists<br />

the codes numerically and gives the <strong>pSO<strong>System</strong></strong> calls that are associated with each<br />

one.<br />

6-1<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!