This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/15525] New: The syscall.open probe alias has an odd flag string
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Thu, 23 May 2013 20:24:39 +0000
- Subject: [Bug tapsets/15525] New: The syscall.open probe alias has an odd flag string
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=15525
Bug #: 15525
Summary: The syscall.open probe alias has an odd flag string
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
AssignedTo: systemtap@sourceware.org
ReportedBy: dsmith@redhat.com
Classification: Unclassified
With a test executable that just opens and closes /proc/cpuinfo, you'll see
this with the following stap script:
====
# stap -ve 'probe syscall.open { printf("%s(%s)\n", name, argstr) }' -c
./open_test
Pass 1: parsed user script and 97 library script(s) using
211456virt/27268res/3052shr/24680data kb, in 210usr/20sys/428real ms.
Pass 2: analyzed script: 2 probe(s), 6 function(s), 24 embed(s), 0 global(s)
using 385828virt/154168res/95996shr/58500data kb, in 960usr/170sys/1509real ms.
Pass 3: translated to C into
"/tmp/stapPRGARX/stap_bdc4aefbaace70a23594358135d228b6_19151_src.c" using
385828virt/154292res/96120shr/58500data kb, in 10usr/0sys/23real ms.
Pass 4: compiled C into "stap_bdc4aefbaace70a23594358135d228b6_19151.ko" in
2260usr/360sys/2886real ms.
Pass 5: starting run.
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC|O_LARGEFILE|O_CLOEXEC)
open("/lib64/libc.so.6", O_RDONLY|O_CLOEXEC|O_LARGEFILE|O_CLOEXEC)
open("/proc/cpuinfo", O_RDONLY|O_LARGEFILE)
Pass 5: run completed in 10usr/50sys/329real ms.
====
On the first two open calls, "O_CLOEXEC" is repeated twice.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.