There are a number of kprobes related patches making their way upstream for Systemtap support. They need to be included in RHEL4 U2. The list is: [1] [PATCH] Kprobes: Allow/deny probes on int3/breakpoint instruction? http://www.ussg.iu.edu/hypermail/linux/kernel/0503.3/1965.html This patch is required. It has been integrated upstream. [2] [PATCH] Kprobes: Incorrect handling of probes on ret/lret instruction http://www.ussg.iu.edu/hypermail/linux/kernel/0504.0/0045.html This patch is upstream. Needed in RHEL. [3] [PATCH] Kprobes: Oops! in unregister_kprobe() http://www.ussg.iu.edu/hypermail/linux/kernel/0504.1/0826.html Patch upstream - needs to go into RHEL. [4] [RFC] [PATCH] Multiple kprobes at an address http://www.ussg.iu.edu/hypermail/linux/kernel/0504.2/0492.html Patch upstream. Needed in RHEL [5] [RCF][PATCH] kprobes: function-return probes http://www.ussg.iu.edu/hypermail/linux/kernel/0505.0/1107.html Awaiting community comments. Feature needed in RHEL. Also, this feature is arch specific. There are other changes that are not captured as part of the list since they are still in the works. We are working on getting these done ASAP: - Reentrant probe handling - Kprobe scalability changes - kprobe-jprobe coexistance Also relayfs patches are needed (don't have the details on those yet)
Relayfs patch needing backport is this one: [PATCH 2.6.12-rc1-mm2] relayfs: properly handle oversized events http://www.uwsg.iu.edu/hypermail/linux/kernel/0503.3/0248.html
you seem to be under the impression that relayfs is present in RHEL4. It isn't. It isn't even merged in current upstream.
relayfs is one of two modules we will need (the other is stp_control) to build for each kernel. Both are checked into the systemtap cvs. I have applied the above patch to relayfs.
Patches have been submitted to rhkernel-list.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2005-514.html