From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19415 invoked by alias); 13 Jan 2006 02:08:34 -0000 Received: (qmail 19397 invoked by uid 48); 13 Jan 2006 02:08:32 -0000 Date: Fri, 13 Jan 2006 02:08:00 -0000 Message-ID: <20060113020832.19396.qmail@sourceware.org> From: "anil dot s dot keshavamurthy at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20051220073112.2071.anil.s.keshavamurthy@intel.com> References: <20051220073112.2071.anil.s.keshavamurthy@intel.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2071] Probes on ISR with probes on task thread's prehandler crash the system X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00132.txt.bz2 ------- Additional Comments From anil dot s dot keshavamurthy at intel dot com 2006-01-13 02:08 ------- (In reply to comment #3) > On ppc64, I tried to disable the interrupt in the kprobe handler in the case of > reentry and re-enable interrupt when it came out of the handler and it seems to > *WORK*. I was able to complete my kernel build (make -j8), where it gave an oops > before. Hien, I tried your patch (porting onto IA64) and it did not work for me. Also I see the solution you have mentioned might now work for x86_64 too. Especially on x86_64 even when you disable interrupt, NMI's can still happen and any probes on that path will cause the problem again. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2071 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.