This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: Duplicate events for 32-bit compatible syscall probes


On 04/26/2013 08:41 AM, Aryeh Weinreb wrote:
>> OK, here's a solution that I actually tested with syscall.open.
>> Basically if the function name we're probing has 'compat_' in it, skip it.
>>
>> ====
>> probe syscall.open
>> {
>>   if (isinstr(ppfunc(), "compat_")) {
>>     next
>>   }
>>   # ... your real code here
> 
> Thanks.
> 
> Unfortunately I don't have ppfunc since I'm only on 1.8, but I guess
> if we are ignoring EFAULT I could also just:
> probe kernel.function("sys_mq_*)
> 

ppfunc() is just a cut down pp() (with just the function part of the
probe point name). You should be able to use pp() instead of ppfunc().

-- 
David Smith
dsmith@redhat.com
Red Hat
http://www.redhat.com
256.217.0141 (direct)
256.837.0057 (fax)


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]