This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug kprobes/4542] New: systemtap.stress/current.stp crashes on 2.6.22-rc2 kernel


When running the systemtap.stress/current.stp on i686 machine with the
2.6.22-rc2 kernel the test crashes.

 ./stap_snap_200705231900/install/bin/stap -gv
/home/wcohen/stap_snap_200705231900/src/testsuite/systemtap.stress/current.stp

Yields

slingshot.devel.redhat.com login: BUG: unable to handle kernel NULL pointer der0
 printing eip:                                                                  
c030234e                                                                        
*pde = 00000000                                                                 
Oops: 0000 [#1]                                                                 
Modules linked in: stap_c18c8aab9a7aed7921fe30dc73e43aae_306945 ipv6 parport_pcd
CPU:    0                                                                       
EIP:    0060:[<c030234e>]    Not tainted VLI                                    
EFLAGS: 00010002   (2.6.22-rc2 #2)                                              
EIP is at trampoline_handler+0xc8/0x134                                         
eax: d8e09201   ebx: d8e0917c   ecx: d8e09220   edx: d8e09200                   
esi: df4732e0   edi: 00000000   ebp: c4fc6efc   esp: c4fc6ed0                   
ds: 007b   es: 007b   fs: 0000  gs: 0000  ss: 0068                              
Process systemtap/0 (pid: 4540, ti=c4fc6000 task=dfc35030 task.ti=c4fc6000)     
Stack: c0301d28 ffff4ff0 00000000 00000000 00000082 00000000 d8e0917c df4732e0  
       00000000 ca687f20 c030226d d8e0917c d8e09220 d8e09220 df4732e0 00000000  
       ca687f20 d8e09070 0000007b 0000007b 00000000 ffffffff c0302257 00000060  
Call Trace:                                                                     
 [<c0301d28>] do_debug+0x34/0xb0                                                
 [<c030226d>] kretprobe_trampoline+0x16/0x2f                                    
 [<c0302257>] kretprobe_trampoline+0x0/0x2f                                     
 [<c0127b69>] worker_thread+0x0/0xd6                                            
 [<c0127c00>] worker_thread+0x97/0xd6                                           
 [<c012a827>] autoremove_wake_function+0x0/0x33                                 
 [<c012a827>] autoremove_wake_function+0x0/0x33                                 
 [<c0127b69>] worker_thread+0x0/0xd6                                            
 [<c012a479>] kthread+0x33/0x54                                                 
 [<c012a446>] kthread+0x0/0x54                                                  
 [<c010472b>] kernel_thread_helper+0x7/0x10                                     
 =======================                                                        
Code: d7 0d 00 00 81 7c 24 0c 57 22 30 c0 75 04 89 f0 eb 9b 83 7c 24 0c 00 0f 9 
EIP: [<c030234e>] trampoline_handler+0xc8/0x134 SS:ESP 0068:c4fc6ed0            
BUG: spinlock lockup on CPU#0, systemtap/0/4540, c03ad65c                       
 [<c01d2158>] __spin_lock_debug+0x9a/0xa4                                       
 [<c01d21b3>] _raw_spin_lock+0x51/0x62                                          
 [<c0301470>] _spin_lock_irqsave+0x9/0xd                                        
 [<c0303687>] pre_handler_kretprobe+0x12/0x96                                   
 [<c0302fe5>] aggr_pre_handler+0x2e/0x5f                                        
 [<c0117d61>] account_system_time+0x1/0x8b                                      
 [<c030220d>] kprobe_handler+0xea/0x134                                         
 [<c03025fb>] kprobe_exceptions_notify+0x45/0x7d                                
 [<c0302ce2>] notifier_call_chain+0x37/0x65                                     
 [<c0302d2e>] atomic_notifier_call_chain+0x17/0x1a                              
 [<c012d57c>] notify_die+0x30/0x34                                              
 [<c012ed63>] clocksource_get_next+0x39/0x3f                                    
 [<c0301cb5>] do_int3+0x2d/0x6c                                                 
 [<c030176f>] int3+0x27/0x2c                                                    
 [<c0117d61>] account_system_time+0x1/0x8b                                      
 [<c0121fc0>] update_process_times+0x2d/0x54                                    
 [<c012fc62>] tick_periodic+0x62/0x6c                                           
 [<c012fc7a>] tick_handle_periodic+0xe/0x5c                                     
 [<c0112b5d>] local_apic_timer_interrupt+0x3e/0x41                              
 [<c0112b85>] smp_apic_timer_interrupt+0x25/0x32                                
 [<c01045a8>] apic_timer_interrupt+0x28/0x30                                    
 [<c011d55a>] do_exit+0x191/0x374                                               
 [<c0222980>] do_unblank_screen+0x2a/0x11d                                      
 [<c0104d93>] die+0x199/0x1a1                                                   
 [<c0302bd1>] do_page_fault+0x45e/0x538                                         
 [<c0302604>] kprobe_exceptions_notify+0x4e/0x7d                                
 [<c0302773>] do_page_fault+0x0/0x538                                           
 [<c03015e2>] error_code+0x6a/0x70                                              
 [<c030234e>] trampoline_handler+0xc8/0x134                                     
 [<c0301d28>] do_debug+0x34/0xb0                                                
 [<c030226d>] kretprobe_trampoline+0x16/0x2f                                    
 [<c0302257>] kretprobe_trampoline+0x0/0x2f                                     
 [<c0127b69>] worker_thread+0x0/0xd6                                            
 [<c0127c00>] worker_thread+0x97/0xd6                                           
 [<c012a827>] autoremove_wake_function+0x0/0x33                                 
 [<c012a827>] autoremove_wake_function+0x0/0x33                                 
 [<c0127b69>] worker_thread+0x0/0xd6                                            
 [<c012a479>] kthread+0x33/0x54                                                 
 [<c012a446>] kthread+0x0/0x54                                                  
 [<c010472b>] kernel_thread_helper+0x7/0x10                                     
 =======================

-- 
           Summary: systemtap.stress/current.stp crashes on 2.6.22-rc2
                    kernel
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: critical
          Priority: P2
         Component: kprobes
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: wcohen at redhat dot com
  GCC host triplet: i686


http://sourceware.org/bugzilla/show_bug.cgi?id=4542

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]