This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/3379] probe on "atomic_notifier_call_chain" crashes the system


------- Additional Comments From anil dot s dot keshavamurthy at intel dot com  2006-10-18 21:48 -------
Subject: Re:  probe on "atomic_notifier_call_chain" crashes the system

On Wed, Oct 18, 2006 at 07:11:29PM -0000, dsmith at redhat dot com wrote:
> 
> Bibo Mao volunteered to add kernel patches for the 3 problem areas I found. 
> Here's the specific one for atomic_notifier_call_chain(), which marks it with
> "__kprobes":
> 
> <http://www.ussg.iu.edu/hypermail/linux/kernel/0609.3/0589.html>

BTW, today I ran the 
stap -vv -e 'probe kernel.function("*") { log(".") }' on i386 box running
2.6.19-rc2-git2 and I had no issues. I even was able to do ls -l though the
system was on its knees. I had left this running for ~10 minutes before I killed
(and the stap module got unloaded cleanly).

> 
> A problem we have is that atomic_notifier_call_chain() has been marked as
> "__kprobes" in the upstream kernel, but hasn't made it to a released kernel from
> my understanding (by either kernel.org or a vendor).
Yup, this is in upstream kernel.

> 
> I have no problem with adding "atomic_notifier_call_chain" to the blacklist in
> the meantime.
We need this in any case as the systemtap could be run on older version of the kernel too.

-Anil Keshavamurthy


-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=3379

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]