This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/16096] on i686, the nd_syscall tapset is broken


https://sourceware.org/bugzilla/show_bug.cgi?id=16096

David Smith <dsmith at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #2 from David Smith <dsmith at redhat dot com> ---
After more investigation, the problem was with the nd_syscall.execve probe
alias. Kernel 3.7 switch to using the generic nd_syscall.execve probe alias,
which didn't use 'asmlinkage()'. This caused us to get the wrong value for the
1st argument.

Fixed in commit 7dd8624.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]