From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19469 invoked by alias); 21 Feb 2009 14:48:00 -0000 Received: (qmail 19441 invoked by uid 48); 21 Feb 2009 14:47:49 -0000 Date: Sat, 21 Feb 2009 15:27:00 -0000 Message-ID: <20090221144749.19440.qmail@sourceware.org> From: "mahesh at linux dot vnet dot ibm dot com" To: systemtap@sources.redhat.com In-Reply-To: <20090220112441.9876.ananth@in.ibm.com> References: <20090220112441.9876.ananth@in.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug tapsets/9876] Syscall tapset broken on architectures that use SYSCALL_WRAPPERS X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2009-q1/txt/msg00488.txt.bz2 ------- Additional Comments From mahesh at linux dot vnet dot ibm dot com 2009-02-21 14:47 ------- Created an attachment (id=3756) --> (http://sourceware.org/bugzilla/attachment.cgi?id=3756&action=view) Patch to handle SYSCALL WRAPPERS. Here is the patch to cover SYSCALL wrappers SyS_* calls. Please pour in your comments. -- http://sourceware.org/bugzilla/show_bug.cgi?id=9876 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.