This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug tapsets/9876] New: Syscall tapset broken on architectures that use SYSCALL_WRAPPERS
- From: "ananth at in dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 20 Feb 2009 11:24:43 -0000
- Subject: [Bug tapsets/9876] New: Syscall tapset broken on architectures that use SYSCALL_WRAPPERS
- Reply-to: sourceware-bugzilla at sourceware dot org
Recently, the upstream kernel acquired the SYSCALL_WRAPPER code that is now
being used by multiple architectures including ARM, SPARC, POWERPC and s390.
With that change the current syscall tapsets are broken.
The change necessarily creates the an asmlinkage SyS_* routines that encapsulate
the sys_* routines that are inlined. With the change, even simple scripts as fail:
[ananth@... ~]$ stap -ve 'probe syscall.access {print("here\n") exit() }'
Pass 1: parsed user script and 47 library script(s) in 450usr/0sys/509real ms.
semantic error: no match while resolving probe point kernel.function("sys_access")
semantic error: no match while resolving probe point syscall.access
semantic error: no probes found
Pass 2: analyzed script: 0 probe(s), 0 function(s), 0 embed(s), 0 global(s) in
520usr/880sys/1633real ms.
Pass 2: analysis failed. Try again with another '--vp 01' option.
[ananth@... ~]$ stap -ve 'probe kernel.function("sys_access") {print("here\n")
exit() }'
Pass 1: parsed user script and 47 library script(s) in 450usr/0sys/509real ms.
semantic error: no match while resolving probe point kernel.function("sys_access")
semantic error: no probes found
Pass 2: analyzed script: 0 probe(s), 0 function(s), 0 embed(s), 0 global(s) in
520usr/880sys/1663real ms.
Pass 2: analysis failed. Try again with another '--vp 01' option.
While probing the wrapper works:
[ananth@... ~]$ 'stap -ve 'probe kernel.function("SyS_access") {print("here\n")
exit() }'
Pass 1: parsed user script and 47 library script(s) in 450usr/10sys/511real ms.
Pass 2: analyzed script: 1 probe(s), 2 function(s), 0 embed(s), 0 global(s) in
510usr/860sys/1616real ms.
Pass 3: translated to C into
"/tmp/stapnRd0lO/stap_2b2ebb56d31314a25fff4a30d7eda8c2_527.c" in
870usr/1310sys/2499real ms.
Pass 4: compiled C into "stap_2b2ebb56d31314a25fff4a30d7eda8c2_527.ko" in
6640usr/610sys/10331real ms.
Pass 5: starting run.
--
Summary: Syscall tapset broken on architectures that use
SYSCALL_WRAPPERS
Product: systemtap
Version: unspecified
Status: NEW
Severity: critical
Priority: P2
Component: tapsets
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: ananth at in dot ibm dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=9876
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.