This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/16096] on i686, the nd_syscall tapset is broken
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Tue, 29 Oct 2013 21:37:42 +0000
- Subject: [Bug runtime/16096] on i686, the nd_syscall tapset is broken
- Auto-submitted: auto-generated
- References: <bug-16096-6586 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=16096
David Smith <dsmith at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #2 from David Smith <dsmith at redhat dot com> ---
After more investigation, the problem was with the nd_syscall.execve probe
alias. Kernel 3.7 switch to using the generic nd_syscall.execve probe alias,
which didn't use 'asmlinkage()'. This caused us to get the wrong value for the
1st argument.
Fixed in commit 7dd8624.
--
You are receiving this mail because:
You are the assignee for the bug.