Bug 6971 - nd_syscalls.stp tapset broken on ia64
Summary: nd_syscalls.stp tapset broken on ia64
Status: RESOLVED FIXED
Alias: None
Product: systemtap
Classification: Unclassified
Component: tapsets (show other bugs)
Version: unspecified
: P2 normal
Target Milestone: ---
Assignee: Unassigned
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2008-10-20 20:29 UTC by David Smith
Modified: 2014-05-05 15:21 UTC (History)
0 users

See Also:
Host: ia64
Target:
Build:
Last reconfirmed:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description David Smith 2008-10-20 20:29:10 UTC
On the ia64 platform, the nd_syscalls.stp tapset is broken.  If you attempt to
use it, you will get the following:

# stap -p4 -v -e 'probe nd_syscall.accept { print(sockfd) }'
Pass 1: parsed user script and 44 library script(s) in 310usr/7sys/317real ms.
semantic error: unresolved arity-0 function: identifier 'asmlinkage' at  
/usr/share/systemtap/tapset/nd_syscalls.stp:46:2
semantic error: unresolved arity-1 function: identifier 'int_arg' at :47:11
semantic error: unresolved arity-1 function: identifier 'pointer_arg' at :48:15
semantic error: unresolved arity-1 function: identifier 'pointer_arg' at :49:18
Pass 2: analyzed script: 1 probe(s), 0 function(s), 0 embed(s), 0 global(s) in
334usr/243sys/580real ms.
Pass 2: analysis failed.  Try again with more '-v' (verbose) options.

This bug is related to bug #6969.  The problem is there is no
tapset/ia64/registers.stp file that would define the 'int_arg', 'pointer_arg',
etc. functions.
Comment 1 David Smith 2014-05-05 15:21:53 UTC
Fixed in commit 60b8998. This commit adds support for kernel context argument access.