This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/9816] functioncallcount.stp causes system crash
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 5 Feb 2009 19:02:11 -0000
- Subject: [Bug translator/9816] functioncallcount.stp causes system crash
- References: <20090204113414.9816.ananth@in.ibm.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From fche at redhat dot com 2009-02-05 19:02 -------
On 2.6.29-0.78.rc3.git5.fc11.i686 kernel,
BUG: unable to handle kernel NULL pointer dereference at 00000075
IP: [<c07b6dcb>] .LC52+0x1634/0x12e73
Oops: 0002 [#1] SMP DEBUG_PAGEALLOC
last sysfs file: /sys/module/sunrpc/sections/__param
Modules linked in: stap_2203 iptable_nat nf_nat nfs lockd nfs_acl auth_rpcgss
sunrpc ipv6 dm_multipath ppdev pcspkr 8139cp 8139too mii i2c_piix4 i2c_core
parport_pc parport ata_generic pata_acpi [last unloaded: scsi_wait_scan]
Pid: 1858, comm: ntpd Not tainted (2.6.29-0.78.rc3.git5.fc11.i686 #1)
EIP: 0060:[<c07b6dcb>] EFLAGS: 00210283 CPU: 0
EIP is at .LC52+0x1634/0x12e73
EAX: acd0b904 EBX: f8bc294c ECX: 00000001 EDX: 00000000
ESI: ef58ce04 EDI: c1ff15e0 EBP: ef58cd68 ESP: ef58cd54
DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
Process ntpd (pid: 1858, ti=ef58c000 task=ef61d480 task.ti=ef58c000)
Stack:
00200246 ef58cd80 c0848a10 00000000 ffffffff ef58cd88 c06e4662 ef58cdcc
00000002 c0849398 c0846690 ef58cdcc 00000002 ef58cdb4 c06e46c3 ffffffff
00000000 00000002 00000001 00000000 c06e468a ef58ce04 00000000 ef58ce6c
Call Trace:
[<c06e4662>] ? notifier_call_chain+0x49/0x71
[<c06e46c3>] ? __atomic_notifier_call_chain+0x39/0x5c
[<c06e468a>] ? __atomic_notifier_call_chain+0x0/0x5c
[<c06e46f2>] ? atomic_notifier_call_chain+0xc/0xe
[<c0444acd>] ? notify_die+0x2d/0x2f
[<c06e29f9>] ? do_int3+0x1f/0x71
[<c06e28f4>] ? int3+0x2c/0x34
[<c048007b>] ? try_set_zone_oom+0x1f/0x151
[<c048d49f>] ? might_fault+0x1/0x80
[<c04b108b>] ? set_fd_set+0x17/0x2e
[<c04b1e22>] ? core_sys_select+0x17d/0x1ce
[<c041bed2>] ? pvclock_clocksource_read+0x48/0xa3
[<c041bed2>] ? pvclock_clocksource_read+0x48/0xa3
[<c041b551>] ? kvm_clock_read+0x16/0x18
[<c0407f43>] ? sched_clock+0x8/0xb
[<c044cc13>] ? lock_release_holdtime+0x30/0x131
[<c044fc0d>] ? lock_release_non_nested+0xa8/0x1a9
[<c044fc0d>] ? lock_release_non_nested+0xa8/0x1a9
[<c041bed2>] ? pvclock_clocksource_read+0x48/0xa3
[<c041b551>] ? kvm_clock_read+0x16/0x18
[<c0447ec0>] ? getnstimeofday+0x56/0xe4
[<c04b202a>] ? sys_select+0x6e/0x8c
[<c0403af6>] ? syscall_call+0x7/0xb
Code: 31 3d 25 64 20 70 69 6e 31 3d 25 64 20 61 70 69 63 32 3d 25 64 20 70 69 6e
32 3d 25 64 0a 00 3c 33 3e 2e 2e 4d 50 2d 42 49 4f 53 <20> 62 75 67 3a 20 38 32
35 34 20 74 69 6d 65 72 20 6e 6f 74 20
EIP: [<c07b6dcb>] .LC52+0x1634/0x12e73 SS:ESP 0068:ef58cd54
--
http://sourceware.org/bugzilla/show_bug.cgi?id=9816
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.