This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
Re: [Bug runtime/3379] probe on "atomic_notifier_call_chain" crashes the system
- From: Keshavamurthy Anil S <anil dot s dot keshavamurthy at intel dot com>
- To: dsmith at redhat dot com <sourceware-bugzilla at sourceware dot org>
- Cc: systemtap at sources dot redhat dot com
- Date: Wed, 18 Oct 2006 14:28:41 -0700
- Subject: Re: [Bug runtime/3379] probe on "atomic_notifier_call_chain" crashes the system
- References: <20061018073138.3379.guij@cn.ibm.com> <20061018191129.345.qmail@sourceware.org>
- Reply-to: Keshavamurthy Anil S <anil dot s dot keshavamurthy at intel dot com>
On Wed, Oct 18, 2006 at 07:11:29PM -0000, dsmith at redhat dot com wrote:
>
> Bibo Mao volunteered to add kernel patches for the 3 problem areas I found.
> Here's the specific one for atomic_notifier_call_chain(), which marks it with
> "__kprobes":
>
> <http://www.ussg.iu.edu/hypermail/linux/kernel/0609.3/0589.html>
BTW, today I ran the
stap -vv -e 'probe kernel.function("*") { log(".") }' on i386 box running
2.6.19-rc2-git2 and I had no issues. I even was able to do ls -l though the
system was on its knees. I had left this running for ~10 minutes before I killed
(and the stap module got unloaded cleanly).
>
> A problem we have is that atomic_notifier_call_chain() has been marked as
> "__kprobes" in the upstream kernel, but hasn't made it to a released kernel from
> my understanding (by either kernel.org or a vendor).
Yup, this is in upstream kernel.
>
> I have no problem with adding "atomic_notifier_call_chain" to the blacklist in
> the meantime.
We need this in any case as the systemtap could be run on older version of the kernel too.
-Anil Keshavamurthy