public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP
@ 2006-02-07 21:20 joshua dot i dot stone at intel dot com
  2006-02-09  3:22 ` [Bug kprobes/2294] " bibo dot mao at intel dot com
  0 siblings, 1 reply; 2+ messages in thread
From: joshua dot i dot stone at intel dot com @ 2006-02-07 21:20 UTC (permalink / raw)
  To: systemtap

It has been reported in two cases that current.stp causes an NX protection fault.

http://sources.redhat.com/ml/systemtap/2006-q1/msg00157.html
http://sources.redhat.com/ml/systemtap/2006-q1/msg00397.html

The two kernels reported to crash are 2.6.14-1.1656_FC4smp.i686 and
2.6.9-30.ELsmp.i686.  Both reports had a similar stack trace as well, starting with:

  kretprobe_trampoline
  do_timer
  timer_interrupt
  kretprobe_trampoline

Several other kernels and a different architecture (x86_64) were tested and did
not experience this crash.

-- 
           Summary: current.stp causes NX protection fault on i686 SMP
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: kprobes
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: joshua dot i dot stone at intel dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=2294

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Bug kprobes/2294] current.stp causes NX protection fault on i686 SMP
  2006-02-07 21:20 [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP joshua dot i dot stone at intel dot com
@ 2006-02-09  3:22 ` bibo dot mao at intel dot com
  0 siblings, 0 replies; 2+ messages in thread
From: bibo dot mao at intel dot com @ 2006-02-09  3:22 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From bibo dot mao at intel dot com  2006-02-09 03:22 -------
In RHEL4-U3 beta 2.6.9-30 version, kernel configuration CONFIG_X86_PAE set as 
N, and then current.stp will pass. Can you verify this in 2.6.14-
1.1656_FC4smp.i686  kernel version? 

_PAGE_NX is different by CONFIG_X86_PAE option, if PAE is enable, kprobe probed 
instruction should be placed in module_alloc() area, but no kprobe stucture. 
That is to say, arch_specific_insn structure should be defined as
struct arch_specific_insn {
	/* copy of the original instruction */
	kprobe_opcode_t *insn;
};
And instruction slot allocation/free will be same with x86_64 architecture.

-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=2294

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2006-02-09  3:22 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-02-07 21:20 [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP joshua dot i dot stone at intel dot com
2006-02-09  3:22 ` [Bug kprobes/2294] " bibo dot mao at intel dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).