This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug translator/5897] New: derived_probe derivation chain tweak


In an area recently worked on in bug #5609, an additional
improvement would be nice.  For

% stap -p2 -v -e 'probe syscall.r* {}'

we get

kernel.function("compat_sys_rt_sigtimedwait@kernel/compat.c:777")? /* pc=0x5b38a
*/ /* <-
kernel.function("sys_rt_sigtimedwait"),kernel.function("compat_sys_rt_sigtimedwait")?
<- syscall.r* */

The derivation chain printed in the /* comment */ misses the individual
syscall.read or whatnot that matched the initial "syscall.r*" pattern.
It should be listed there.

-- 
           Summary: derived_probe derivation chain tweak
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: translator
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: fche at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=5897

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]