This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/6762] Some syscalls functions just wrappers for other syscalls
- From: "mjw at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 20 Oct 2008 18:53:18 -0000
- Subject: [Bug tapsets/6762] Some syscalls functions just wrappers for other syscalls
- References: <20080723211927.6762.wcohen@redhat.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From mjw at redhat dot com 2008-10-20 18:53 -------
(In reply to comment #1)
> Alternately, one can kludge the test case to accept and ignore such
> nesting. :-(
I actually did this a while ago:
commit 5311c037f83f66967f9de4cc66815f93940bb005
Author: Mark Wielaard <mjw@redhat.com>
Date: Sun Oct 5 00:29:49 2008 +0200
Expect syscall faccessat, fchmodat, linkat, symlinkat, readlinkat chain-call
diff --git a/testsuite/systemtap.syscall/ChangeLog b/testsuite/systemtap.syscall
index 772f980..7cb97df 100644
--- a/testsuite/systemtap.syscall/ChangeLog
+++ b/testsuite/systemtap.syscall/ChangeLog
@@ -1,3 +1,11 @@
+2008-10-04 Mark Wielaard <mjw@redhat.com>
+
+ * access.c: sys_access() calls through to sys_faccessat().
+ * chmod.c: sys_chmod() calls through to sys_fchmodat().
+ * link.c: sys_link() calls through to sys_linkat(),
+ sys_symlink() calls through to sys_symlinkat(),
+ sys_readlink() calls through to sys_readlinkat().
--
http://sourceware.org/bugzilla/show_bug.cgi?id=6762
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.