public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug kprobes/2667] New: Kernel panic occur when kprobing callq instruction on x86_64
@ 2006-05-16 21:27 soshima at redhat dot com
  2006-05-16 21:34 ` [Bug kprobes/2667] " soshima at redhat dot com
  2006-06-15 15:57 ` soshima at redhat dot com
  0 siblings, 2 replies; 3+ messages in thread
From: soshima at redhat dot com @ 2006-05-16 21:27 UTC (permalink / raw)
  To: systemtap

Kernel panic occurs if we put a probe on callq instruction.
This problem always occurs when probes callq instruction.
This problem is only on x86_64.

If resume_execution() found 0xff at first byte of 
p->ainsn.insn, it must check the _second_ byte.
But current resume_execution() check _first_ byte again
in mainline.

This causes the kernel panic of Bad RIP value.

-- 
           Summary: Kernel panic occur when kprobing callq instruction on
                    x86_64
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: critical
          Priority: P2
         Component: kprobes
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: soshima at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=2667

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug kprobes/2667] Kernel panic occur when kprobing callq instruction on x86_64
  2006-05-16 21:27 [Bug kprobes/2667] New: Kernel panic occur when kprobing callq instruction on x86_64 soshima at redhat dot com
@ 2006-05-16 21:34 ` soshima at redhat dot com
  2006-06-15 15:57 ` soshima at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: soshima at redhat dot com @ 2006-05-16 21:34 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From soshima at redhat dot com  2006-05-16 21:33 -------
Created an attachment (id=1029)
 --> (http://sourceware.org/bugzilla/attachment.cgi?id=1029&action=view)
patch to resume_execution bug on x86_64

This patch is against 2.6.17-rc3-mm1.

We have tested this on Pentium D, and confirmed not to occur kernel panic.

-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=2667

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug kprobes/2667] Kernel panic occur when kprobing callq instruction on x86_64
  2006-05-16 21:27 [Bug kprobes/2667] New: Kernel panic occur when kprobing callq instruction on x86_64 soshima at redhat dot com
  2006-05-16 21:34 ` [Bug kprobes/2667] " soshima at redhat dot com
@ 2006-06-15 15:57 ` soshima at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: soshima at redhat dot com @ 2006-06-15 15:57 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From soshima at redhat dot com  2006-06-15 15:57 -------
This problem was fixed in 2.6.17-rc5.

-- 
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |FIXED


http://sourceware.org/bugzilla/show_bug.cgi?id=2667

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2006-06-15 15:57 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-05-16 21:27 [Bug kprobes/2667] New: Kernel panic occur when kprobing callq instruction on x86_64 soshima at redhat dot com
2006-05-16 21:34 ` [Bug kprobes/2667] " soshima at redhat dot com
2006-06-15 15:57 ` soshima at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).