From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1631 invoked by alias); 30 Nov 2015 19:26:32 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 1608 invoked by uid 89); 30 Nov 2015 19:26:30 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-3.2 required=5.0 tests=AWL,BAYES_00,SPF_HELO_PASS,T_RP_MATCHES_RCVD autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Mon, 30 Nov 2015 19:26:29 +0000 Received: from int-mx13.intmail.prod.int.phx2.redhat.com (int-mx13.intmail.prod.int.phx2.redhat.com [10.5.11.26]) by mx1.redhat.com (Postfix) with ESMTPS id 462489D1D4; Mon, 30 Nov 2015 19:26:28 +0000 (UTC) Received: from t540p.usersys.redhat.com (dhcp-10-15-1-6.hsv.redhat.com [10.15.1.6]) by int-mx13.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id tAUJQRpk010394 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 30 Nov 2015 14:26:27 -0500 Subject: Re: Prelinking on ARM with Debug Link To: Torsten Polle , Mark Wielaard References: <1448534000.7609.64.camel@redhat.com> <6C764A67-BD51-4CD6-8CE6-8E19E5453462@gmx.de> <1448611496.7609.80.camel@redhat.com> <20151127150614.GD2790@blokker.redhat.com> <3E5ADB9D-77C7-4AFB-BC5C-321B6DC21572@gmx.de> Cc: systemtap@sourceware.org From: David Smith Message-ID: <565CA2E3.7020602@redhat.com> Date: Mon, 30 Nov 2015 19:26:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.3.0 MIME-Version: 1.0 In-Reply-To: <3E5ADB9D-77C7-4AFB-BC5C-321B6DC21572@gmx.de> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-IsSubscribed: yes X-SW-Source: 2015-q4/txt/msg00201.txt.bz2 On 11/27/2015 02:01 PM, Torsten Polle wrote: > Hi Mark, > >> Mark Wielaard writes: >> >> WARNING: tapset "/opt/tooling/adit/systemtap/share/systemtap/tapset/linux/arm/syscalls.stp" has errors, and will be skipped >> >> > You might want to look into why that is. >> >> Yes, I know. I had re-added support of a system call (execve), which >> does not work since some time in SystemTap. But since the support >> depends on the kernel version, I get a warning about an empty file when >> the kernel version is greater than 3.7. In kernel versions less than 3.7, the execve syscall was in arch-specific code. So, each arch has their own implementation of [nd_]syscall.execve in tapsets/linux/ARCH/[nd_]syscalls.stp. In kernel versions >= 3.7, the execve syscall was moved to generic kernel code, and support for it is located in tapset/linux/[nd_]syscalls.stp. I don't believe we've ever supported an arm/arm64 kernel less than 3.7, so there isn't arch-specific execve support for arm/arm64. But, if you have got working execve support for arm/arm64 kernels less than 3.7, I don't see a real problem with checking it in (assuming it looks reasonable). -- David Smith dsmith@redhat.com Red Hat http://www.redhat.com 256.217.0141 (direct) 256.837.0057 (fax)