* [Bug tapsets/16207] New: on rawhide, we're getting more syscall.exp failures
@ 2013-11-22 19:04 dsmith at redhat dot com
2013-11-26 20:59 ` [Bug tapsets/16207] " dsmith at redhat dot com
0 siblings, 1 reply; 2+ messages in thread
From: dsmith at redhat dot com @ 2013-11-22 19:04 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=16207
Bug ID: 16207
Summary: on rawhide, we're getting more syscall.exp failures
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: tapsets
Assignee: systemtap at sourceware dot org
Reporter: dsmith at redhat dot com
On rawhide (3.13.0-0.rc0.git10.1.fc21.x86_64), we're getting lots of failures:
=====
Running ../../src/testsuite/systemtap.syscall/syscall.exp ...
FAIL: 64-bit access syscall
FAIL: 64-bit chmod syscall
FAIL: 64-bit dup syscall
FAIL: 64-bit inotify syscall
FAIL: 64-bit link syscall
FAIL: 64-bit net1 syscall
FAIL: 64-bit pipe syscall
FAIL: 32-bit access syscall
FAIL: 32-bit chmod syscall
FAIL: 32-bit dup syscall
FAIL: 32-bit inotify syscall
FAIL: 32-bit link syscall
FAIL: 32-bit mount syscall
FAIL: 32-bit pipe syscall
FAIL: 32-bit readwrite syscall
FAIL: 32-bit signalfd syscall
FAIL: 32-bit trunc syscall
=====
From looking at the log file, it appears that some system calls that use to be
wrappers around other syscalls (like access() used to be a wrapper around
faccessat()) have been changed to no longer do that.
I'm sure similar errors occur in the nd_syscall.exp testcase
The solution that I've started implementing for bug #15219 (the use of
@__syscall_gate() macro), should help here.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
* [Bug tapsets/16207] on rawhide, we're getting more syscall.exp failures
2013-11-22 19:04 [Bug tapsets/16207] New: on rawhide, we're getting more syscall.exp failures dsmith at redhat dot com
@ 2013-11-26 20:59 ` dsmith at redhat dot com
0 siblings, 0 replies; 2+ messages in thread
From: dsmith at redhat dot com @ 2013-11-26 20:59 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=16207
David Smith <dsmith at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|NEW |RESOLVED
Resolution|--- |FIXED
--- Comment #1 from David Smith <dsmith at redhat dot com> ---
I've fixed all the 64-bit failures by making sure the tested syscall probes
don't nest.
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2013-11-26 20:59 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2013-11-22 19:04 [Bug tapsets/16207] New: on rawhide, we're getting more syscall.exp failures dsmith at redhat dot com
2013-11-26 20:59 ` [Bug tapsets/16207] " dsmith at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).