From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 7837 invoked by alias); 13 Mar 2006 19:19:39 -0000 Received: (qmail 7820 invoked by uid 48); 13 Mar 2006 19:19:37 -0000 Date: Mon, 13 Mar 2006 19:19:00 -0000 Message-ID: <20060313191937.7819.qmail@sourceware.org> From: "joshua dot i dot stone at intel dot com" To: systemtap@sources.redhat.com In-Reply-To: <20060301202710.2408.anil.s.keshavamurthy@intel.com> References: <20060301202710.2408.anil.s.keshavamurthy@intel.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug kprobes/2408] [RHEL4 U4] Backport Kprobes fixes from mainline X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2006-q1/txt/msg00776.txt.bz2 ------- Additional Comments From joshua dot i dot stone at intel dot com 2006-03-13 19:19 ------- (In reply to comment #13) > Josh, thanks for testing. For kprobe fault handler testing you can run the > below script. Basically this tries to access userspace > address from kprobe prehandler. > > ----------------------------- > probe syscall.*, syscall.*.return { > if (pid() == target()) { > if (returnp) > printf("%d\n", returnval()) > else > printf("%s (%s) = ", name, argstr) > } > } > ------------------------------- After commenting out some unresolved functions from i686/syscalls.stp, this test script ran fine. I don't know if there's a particular target application that's good for testing this - I used 'du' on my home directory. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2408 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.