This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/5897] New: derived_probe derivation chain tweak
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 7 Mar 2008 20:07:56 -0000
- Subject: [Bug translator/5897] New: derived_probe derivation chain tweak
- Reply-to: sourceware-bugzilla at sourceware dot org
In an area recently worked on in bug #5609, an additional
improvement would be nice. For
% stap -p2 -v -e 'probe syscall.r* {}'
we get
kernel.function("compat_sys_rt_sigtimedwait@kernel/compat.c:777")? /* pc=0x5b38a
*/ /* <-
kernel.function("sys_rt_sigtimedwait"),kernel.function("compat_sys_rt_sigtimedwait")?
<- syscall.r* */
The derivation chain printed in the /* comment */ misses the individual
syscall.read or whatnot that matched the initial "syscall.r*" pattern.
It should be listed there.
--
Summary: derived_probe derivation chain tweak
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: fche at redhat dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=5897
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.