From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 20448 invoked by alias); 9 Feb 2006 03:22:33 -0000 Received: (qmail 20429 invoked by uid 48); 9 Feb 2006 03:22:30 -0000 Date: Thu, 09 Feb 2006 03:22:00 -0000 Message-ID: <20060209032230.20428.qmail@sourceware.org> From: "bibo dot mao at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20060207212024.2294.joshua.i.stone@intel.com> References: <20060207212024.2294.joshua.i.stone@intel.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2294] current.stp causes NX protection fault on i686 SMP X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00447.txt.bz2 ------- Additional Comments From bibo dot mao at intel dot com 2006-02-09 03:22 ------- In RHEL4-U3 beta 2.6.9-30 version, kernel configuration CONFIG_X86_PAE set as N, and then current.stp will pass. Can you verify this in 2.6.14- 1.1656_FC4smp.i686 kernel version? _PAGE_NX is different by CONFIG_X86_PAE option, if PAE is enable, kprobe probed instruction should be placed in module_alloc() area, but no kprobe stucture. That is to say, arch_specific_insn structure should be defined as struct arch_specific_insn { /* copy of the original instruction */ kprobe_opcode_t *insn; }; And instruction slot allocation/free will be same with x86_64 architecture. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2294 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.