From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 5171 invoked by alias); 19 Dec 2005 18:45:58 -0000 Received: (qmail 5158 invoked by uid 48); 19 Dec 2005 18:45:56 -0000 Date: Mon, 19 Dec 2005 19:05:00 -0000 Message-ID: <20051219184556.5157.qmail@sourceware.org> From: "jkenisto at us dot ibm dot com" To: systemtap@sources.redhat.com In-Reply-To: <20051216211044.2064.jkenisto@us.ibm.com> References: <20051216211044.2064.jkenisto@us.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2064] Support pagepoint probes X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2005-q4/txt/msg00487.txt.bz2 ------- Additional Comments From jkenisto at us dot ibm dot com 2005-12-19 18:45 ------- Note from Andi Kleen : > Pagepoint probes would presumably be implemented by fussing the permission bits > on the probed page(s) and hooking the page-fault handler (or exploiting the > existing kprobes hook). Wouldn't that require either an x86 interpreter or SMP races when you then replay the instruction? (when you temporarily unprotect the page) Xen seems to have gone the first path for similar needs, but it always looked quite bad to me (they seem to grow a new variant of x86 interpretation every month and even the original one seems to be quite incomplete) Probably not a good idea to duplicate. -Andi -- http://sourceware.org/bugzilla/show_bug.cgi?id=2064 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.