From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10239 invoked by alias); 20 Oct 2008 18:54:33 -0000 Received: (qmail 9013 invoked by uid 48); 20 Oct 2008 18:53:18 -0000 Date: Mon, 20 Oct 2008 18:54:00 -0000 Message-ID: <20081020185318.9012.qmail@sourceware.org> From: "mjw at redhat dot com" To: systemtap@sources.redhat.com In-Reply-To: <20080723211927.6762.wcohen@redhat.com> References: <20080723211927.6762.wcohen@redhat.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug tapsets/6762] Some syscalls functions just wrappers for other syscalls X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2008-q4/txt/msg00153.txt.bz2 ------- Additional Comments From mjw at redhat dot com 2008-10-20 18:53 ------- (In reply to comment #1) > Alternately, one can kludge the test case to accept and ignore such > nesting. :-( I actually did this a while ago: commit 5311c037f83f66967f9de4cc66815f93940bb005 Author: Mark Wielaard Date: Sun Oct 5 00:29:49 2008 +0200 Expect syscall faccessat, fchmodat, linkat, symlinkat, readlinkat chain-call diff --git a/testsuite/systemtap.syscall/ChangeLog b/testsuite/systemtap.syscall index 772f980..7cb97df 100644 --- a/testsuite/systemtap.syscall/ChangeLog +++ b/testsuite/systemtap.syscall/ChangeLog @@ -1,3 +1,11 @@ +2008-10-04 Mark Wielaard + + * access.c: sys_access() calls through to sys_faccessat(). + * chmod.c: sys_chmod() calls through to sys_fchmodat(). + * link.c: sys_link() calls through to sys_linkat(), + sys_symlink() calls through to sys_symlinkat(), + sys_readlink() calls through to sys_readlinkat(). -- http://sourceware.org/bugzilla/show_bug.cgi?id=6762 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.