Re: [PATCH 1/1] x86/oprofile: Fix the calltrace upon profiling some specified events with oprofile

2012-09-05 Thread wyang1
On 09/04/2012 06:24 PM, Robert Richter wrote: Wei, see my comments below. On 27.08.12 09:32:13, wei.y...@windriver.com wrote: From: Wei Yang Upon enabling the call-graph functionality of oprofile, A few minutes later the following calltrace will always occur. BUG: unable to handle kernel pag

Re: [PATCH 1/1] x86/oprofile: Fix the calltrace upon profiling some specified events with oprofile

2012-09-04 Thread Robert Richter
Wei, see my comments below. On 27.08.12 09:32:13, wei.y...@windriver.com wrote: > From: Wei Yang > > Upon enabling the call-graph functionality of oprofile, A few minutes > later the following calltrace will always occur. > > BUG: unable to handle kernel paging request at 656d6153 > IP: [] pri

Re: [PATCH 1/1] x86/oprofile: Fix the calltrace upon profiling some specified events with oprofile

2012-09-02 Thread wyang1
On 08/28/2012 05:17 PM, Robert Richter wrote: On 27.08.12 09:32:13, wei.y...@windriver.com wrote: From: Wei Yang Upon enabling the call-graph functionality of oprofile, A few minutes later the following calltrace will always occur. BUG: unable to handle kernel paging request at 656d6153 This

Re: [PATCH 1/1] x86/oprofile: Fix the calltrace upon profiling some specified events with oprofile

2012-08-28 Thread Robert Richter
On 27.08.12 09:32:13, wei.y...@windriver.com wrote: > From: Wei Yang > > Upon enabling the call-graph functionality of oprofile, A few minutes > later the following calltrace will always occur. > > BUG: unable to handle kernel paging request at 656d6153 This is probably the same I found to yest

[PATCH 1/1] x86/oprofile: Fix the calltrace upon profiling some specified events with oprofile

2012-08-26 Thread Wei.Yang
From: Wei Yang Upon enabling the call-graph functionality of oprofile, A few minutes later the following calltrace will always occur. BUG: unable to handle kernel paging request at 656d6153 IP: [] print_context_stack+0x55/0x110 *pde = Oops: [#1] PREEMPT SMP Modules linked in: Pid: