public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug tapsets/15525] New: The syscall.open probe alias has an odd flag string
@ 2013-05-23 20:24 dsmith at redhat dot com
  2013-05-24 20:38 ` [Bug tapsets/15525] " jlebon at redhat dot com
  0 siblings, 1 reply; 2+ messages in thread
From: dsmith at redhat dot com @ 2013-05-23 20:24 UTC (permalink / raw)
  To: systemtap

http://sourceware.org/bugzilla/show_bug.cgi?id=15525

             Bug #: 15525
           Summary: The syscall.open probe alias has an odd flag string
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tapsets
        AssignedTo: systemtap@sourceware.org
        ReportedBy: dsmith@redhat.com
    Classification: Unclassified


With a test executable that just opens and closes /proc/cpuinfo, you'll see
this with the following stap script:

====
# stap -ve 'probe syscall.open { printf("%s(%s)\n", name, argstr) }' -c
./open_test
Pass 1: parsed user script and 97 library script(s) using
211456virt/27268res/3052shr/24680data kb, in 210usr/20sys/428real ms.
Pass 2: analyzed script: 2 probe(s), 6 function(s), 24 embed(s), 0 global(s)
using 385828virt/154168res/95996shr/58500data kb, in 960usr/170sys/1509real ms.
Pass 3: translated to C into
"/tmp/stapPRGARX/stap_bdc4aefbaace70a23594358135d228b6_19151_src.c" using
385828virt/154292res/96120shr/58500data kb, in 10usr/0sys/23real ms.
Pass 4: compiled C into "stap_bdc4aefbaace70a23594358135d228b6_19151.ko" in
2260usr/360sys/2886real ms.
Pass 5: starting run.
open("/etc/ld.so.cache", O_RDONLY|O_CLOEXEC|O_LARGEFILE|O_CLOEXEC)
open("/lib64/libc.so.6", O_RDONLY|O_CLOEXEC|O_LARGEFILE|O_CLOEXEC)
open("/proc/cpuinfo", O_RDONLY|O_LARGEFILE)
Pass 5: run completed in 10usr/50sys/329real ms.
====

On the first two open calls, "O_CLOEXEC" is repeated twice.

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Bug tapsets/15525] The syscall.open probe alias has an odd flag string
  2013-05-23 20:24 [Bug tapsets/15525] New: The syscall.open probe alias has an odd flag string dsmith at redhat dot com
@ 2013-05-24 20:38 ` jlebon at redhat dot com
  0 siblings, 0 replies; 2+ messages in thread
From: jlebon at redhat dot com @ 2013-05-24 20:38 UTC (permalink / raw)
  To: systemtap

http://sourceware.org/bugzilla/show_bug.cgi?id=15525

Jonathan Lebon <jlebon at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
           Assignee|systemtap at sourceware dot org    |jlebon at redhat dot com
                 CC|                            |jlebon at redhat dot com

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2013-05-24 20:38 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-05-23 20:24 [Bug tapsets/15525] New: The syscall.open probe alias has an odd flag string dsmith at redhat dot com
2013-05-24 20:38 ` [Bug tapsets/15525] " jlebon at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).