* [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP
@ 2006-02-07 21:20 joshua dot i dot stone at intel dot com
2006-02-09 3:22 ` [Bug kprobes/2294] " bibo dot mao at intel dot com
0 siblings, 1 reply; 2+ messages in thread
From: joshua dot i dot stone at intel dot com @ 2006-02-07 21:20 UTC (permalink / raw)
To: systemtap
It has been reported in two cases that current.stp causes an NX protection fault.
http://sources.redhat.com/ml/systemtap/2006-q1/msg00157.html
http://sources.redhat.com/ml/systemtap/2006-q1/msg00397.html
The two kernels reported to crash are 2.6.14-1.1656_FC4smp.i686 and
2.6.9-30.ELsmp.i686. Both reports had a similar stack trace as well, starting with:
kretprobe_trampoline
do_timer
timer_interrupt
kretprobe_trampoline
Several other kernels and a different architecture (x86_64) were tested and did
not experience this crash.
--
Summary: current.stp causes NX protection fault on i686 SMP
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: kprobes
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: joshua dot i dot stone at intel dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=2294
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
^ permalink raw reply [flat|nested] 2+ messages in thread
* [Bug kprobes/2294] current.stp causes NX protection fault on i686 SMP
2006-02-07 21:20 [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP joshua dot i dot stone at intel dot com
@ 2006-02-09 3:22 ` bibo dot mao at intel dot com
0 siblings, 0 replies; 2+ messages in thread
From: bibo dot mao at intel dot com @ 2006-02-09 3:22 UTC (permalink / raw)
To: systemtap
------- Additional Comments From bibo dot mao at intel dot com 2006-02-09 03:22 -------
In RHEL4-U3 beta 2.6.9-30 version, kernel configuration CONFIG_X86_PAE set as
N, and then current.stp will pass. Can you verify this in 2.6.14-
1.1656_FC4smp.i686 kernel version?
_PAGE_NX is different by CONFIG_X86_PAE option, if PAE is enable, kprobe probed
instruction should be placed in module_alloc() area, but no kprobe stucture.
That is to say, arch_specific_insn structure should be defined as
struct arch_specific_insn {
/* copy of the original instruction */
kprobe_opcode_t *insn;
};
And instruction slot allocation/free will be same with x86_64 architecture.
--
http://sourceware.org/bugzilla/show_bug.cgi?id=2294
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2006-02-09 3:22 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-02-07 21:20 [Bug kprobes/2294] New: current.stp causes NX protection fault on i686 SMP joshua dot i dot stone at intel dot com
2006-02-09 3:22 ` [Bug kprobes/2294] " bibo dot mao at intel dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).