From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 32232 invoked by alias); 11 Mar 2006 02:09:00 -0000 Received: (qmail 32214 invoked by uid 48); 11 Mar 2006 02:08:57 -0000 Date: Sat, 11 Mar 2006 02:09:00 -0000 Message-ID: <20060311020857.32213.qmail@sourceware.org> From: "anil dot s dot keshavamurthy at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20060301202710.2408.anil.s.keshavamurthy@intel.com> References: <20060301202710.2408.anil.s.keshavamurthy@intel.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2408] [RHEL4 U4] Backport Kprobes fixes from mainline X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00763.txt.bz2 ------- Additional Comments From anil dot s dot keshavamurthy at intel dot com 2006-03-11 02:08 ------- (In reply to comment #12) > (In reply to comment #11) > > Now includes Prasanna's recent kprobes fault handler code. > Do we have a test for this? > I tested the new patch on i686 SMP - it completes all Kprobes tests and pass- 5 > SystemTap tests without trouble. Josh, thanks for testing. For kprobe fault handler testing you can run the below script. Basically this tries to access userspace address from kprobe prehandler. ----------------------------- probe syscall.*, syscall.*.return { if (pid() == target()) { if (returnp) printf("%d\n", returnval()) else printf("%s (%s) = ", name, argstr) } } ------------------------------- -- http://sourceware.org/bugzilla/show_bug.cgi?id=2408 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.