This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/12099] New: process("/path/to/shell-script") probes
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: Tue, 5 Oct 2010 20:17:32 +0000
- Subject: [Bug translator/12099] New: process("/path/to/shell-script") probes
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=12099
Summary: process("/path/to/shell-script") probes
Product: systemtap
Version: unspecified
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: translator
AssignedTo: systemtap@sources.redhat.com
ReportedBy: fche@redhat.com
Sometimes a putative process file isn't really ELF, so we should try
to open it, and see if it's a shebang type executable script, and map.
ie.
$ cat foo.sh
#! /bin/sh
echo yo momma
$ stap -L 'probe process("foo.sh").function("*")'
process("/bin/sh").function("main")
[... etc ...]
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.