This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug testsuite/10212] System hangs on running check.exp in systemtap snapshot : 0.9.7/0.141 commit release-0.9.7-167-geee30f4
- From: "maranp at linux dot vnet dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 23 Jun 2009 09:32:27 -0000
- Subject: [Bug testsuite/10212] System hangs on running check.exp in systemtap snapshot : 0.9.7/0.141 commit release-0.9.7-167-geee30f4
- References: <20090528090535.10212.maranp@linux.vnet.ibm.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From maranp at linux dot vnet dot ibm dot com 2009-06-23 09:32 -------
The patch given by Heiko for kprobe.c resolved the issue with modprobe
kprobe_example.ko and kprobe sanity test. On applying this patch and testing
check.exp, I see the following issue. One improvement is that the system is not
hanging as before.
# make installcheck RUNTESTFLAGS=check.exp
make check-DEJAGNU RUNTESTFLAGS="check.exp --tool_opts \'install \'"
make[1]: Entering directory
`/root/maran/systemtap/s390test/systemtap.git/systemtap/testsuite'
srcdir=`CDPATH="${ZSH_VERSION+.}:" && cd . && pwd`; export srcdir; \
EXPECT=expect; export EXPECT; \
runtest="env SYSTEMTAP_RUNTIME=/usr/local/share/systemtap/runtime
SYSTEMTAP_TAPSET=/usr/local/share/systemtap/tapset
LD_LIBRARY_PATH=/usr/local/lib/systemtap CRASH_LIBDIR=/usr/local/lib/systemtap
PATH=/usr/local/bin:$PATH SYSTEMTAP_PATH=/usr/local/bin
SYSTEMTAP_INCLUDES=/usr/local/include ./execrc runtest"; \
if /bin/sh -c "$runtest --version" > /dev/null 2>&1; then \
exit_status=0; l='systemtap'; for tool in $l; do \
if $runtest --tool $tool --tool_opts \'\' --srcdir $srcdir check.exp
--tool_opts \'install \'; \
then :; else exit_status=1; fi; \
done; \
else echo "WARNING: could not find \`runtest'" 1>&2; :;\
fi; \
exit $exit_status
WARNING: Couldn't find the global config file.
kernel location:
kernel version: 2.6.30jun22-07769-gf234012-dirty
systemtap location: /usr/local/bin/stap
systemtap version: version 0.9.8/0.142 commit release-0.9.8-85-g98a1242 + changes
gcc location: /usr/bin/gcc
gcc version: gcc (GCC) 4.1.2 20080704 (Red Hat 4.1.2-44)
Test Run By root on Tue Jun 23 10:53:36 2009
Native configuration is s390x-ibm-linux
=== systemtap tests ===
Schedule of variations:
unix
Running target unix
Using /usr/local/share/dejagnu/baseboards/unix.exp as board description file for
target.
Using /usr/local/share/dejagnu/config/unix.exp as generic interface file for target.
Using
/root/maran/systemtap/s390test/systemtap.git/systemtap/testsuite/config/unix.exp
as tool-and-target-specific interface file.
Host: Linux t6345054 2.6.30jun22-07769-gf234012-dirty #1 SMP PREEMPT Mon Jun 22
16:01:12 CEST 2009 s390x s390x s390x GNU/Linux
Snapshot: version 0.9.8/0.142 commit release-0.9.8-85-g98a1242 + changes
GCC: 4.1.2 [gcc (GCC) 4.1.2 20080704 (Red Hat 4.1.2-44)]
Distro: Red Hat Enterprise Linux Server release 5.3 (Tikanga)
Running
/root/maran/systemtap/s390test/systemtap.git/systemtap/testsuite/systemtap.examples/check.exp
...
FAIL: systemtap.examples/memory/pfaults build
FAIL: systemtap.examples/memory/pfaults run
FAIL: systemtap.examples/process/forktracker run
=== systemtap Summary ===
# of expected passes 78
# of unexpected failures 3
# of untested testcases 1
make[1]: Leaving directory
`/root/maran/systemtap/s390test/systemtap.git/systemtap/testsuite'
if test -n ""; then mail < systemtap.sum; fi
"dmesg" on running the above command is pasted below.
BUG: sleeping function called from invalid context at include/linux/kernel.h:157
in_atomic(): 1, irqs_disabled(): 1, pid: 7769, name: sleep
CPU: 1 Tainted: G W 2.6.30jun22-07769-gf234012-dirty #1
Process sleep (pid: 7769, task: 000000004b4e2198, ksp: 000000004b4ebc08)
0000000000000000 000000004b4eb8a8 0000000000000002 0000000000000000
000000004b4eb948 000000004b4eb8c0 000000004b4eb8c0 00000000000486de
00000000003f0e50 000000004b4e2510 000000002ef887d0 0000000000000000
0000000000000000 000000004b4eb8a8 000000000000000d 000000004b4eb918
00000000003f00b8 000000000001647c 000000004b4eb8a8 000000004b4eb8f0
Call Trace:
([<0000000000016406>] show_trace+0x13a/0x148)
[<0000000000034eca>] __might_sleep+0x13a/0x164
[<000003e00318c6e4>] function_user_string+0x108/0x1d8
[stap_cb8a76165dd80354cfa224077e9d9fd0_17578]
[<000003e003192b08>] probe_1744+0xd8/0x210
[stap_cb8a76165dd80354cfa224077e9d9fd0_17578]
[<000003e0031921bc>] enter_kprobe_probe+0x22c/0x404
[stap_cb8a76165dd80354cfa224077e9d9fd0_17578]
[<00000000003ec67e>] aggr_pre_handler+0x86/0x100
[<00000000003e99cc>] kprobe_exceptions_notify+0x3fc/0x464
[<00000000003e9e7c>] notifier_call_chain+0x58/0xa0
[<00000000003e9f0e>] __atomic_notifier_call_chain+0x4a/0x8c
[<00000000003e9f7a>] atomic_notifier_call_chain+0x2a/0x3c
[<0000000000069a10>] notify_die+0x4c/0x58
[<0000000000017d70>] illegal_op+0x74/0x1fc
[<0000000000028194>] sysc_return+0x0/0x8
[<00000000000d5c82>] SyS_open+0x2/0x1c
([<0000000000028194>] sysc_return+0x0/0x8)
[<0000004a44836032>] 0x4a44836032
stap_71b9eba82a713a9a16c1b7682fcf8c6e_6114: systemtap: 0.9.8/0.142, base:
000003e0033d4000, memory: 123158+34322+12176+14000 data+text+ctx+net, probes: 3
stap_776166d0dfaf221f69b760020ce48936_385430: systemtap: 0.9.8/0.142, base:
000003e00270e000, memory: 2458774+561386+30416+14000 data+text+ctx+net, probes: 704
BUG: sleeping function called from invalid context at include/linux/kernel.h:157
in_atomic(): 1, irqs_disabled(): 1, pid: 10728, name: stapio
CPU: 1 Tainted: G W 2.6.30jun22-07769-gf234012-dirty #1
Process stapio (pid: 10728, task: 0000000013f335c0, ksp: 00000000404b7e00)
0000000000000000 00000000404b7800 0000000000000002 0000000000000000
00000000404b78a0 00000000404b7818 00000000404b7818 00000000000486de
00000000003f0e50 0000000013f33938 00000000359ac0f8 0000000000000000
0000000000000000 00000000404b7800 000000000000000d 00000000404b7870
00000000003f00b8 000000000001647c 00000000404b7800 00000000404b7848
Call Trace:
([<0000000000016406>] show_trace+0x13a/0x148)
[<0000000000034eca>] __might_sleep+0x13a/0x164
[<000003e002710f4a>] _stp_strncpy_from_user+0x3e/0x60
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e00272a15a>] probe_1852+0x226/0x4f8
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e002720168>] enter_kprobe_probe+0x224/0x3fc
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<00000000003ec67e>] aggr_pre_handler+0x86/0x100
[<00000000003e99cc>] kprobe_exceptions_notify+0x3fc/0x464
[<00000000003e9e7c>] notifier_call_chain+0x58/0xa0
[<00000000003e9f0e>] __atomic_notifier_call_chain+0x4a/0x8c
[<00000000003e9f7a>] atomic_notifier_call_chain+0x2a/0x3c
[<0000000000069a10>] notify_die+0x4c/0x58
[<0000000000017d70>] illegal_op+0x74/0x1fc
[<0000000000028194>] sysc_return+0x0/0x8
[<00000000000df122>] do_execve+0x2/0x3ac
([<000000000001b19e>] sys_execve+0x3e/0xa8)
[<000000000002818e>] sysc_noemu+0x10/0x16
[<0000004a448f13f0>] 0x4a448f13f0
BUG: sleeping function called from invalid context at include/linux/kernel.h:157
in_atomic(): 1, irqs_disabled(): 1, pid: 10730, name: stapio
CPU: 1 Tainted: G W 2.6.30jun22-07769-gf234012-dirty #1
Process stapio (pid: 10730, task: 0000000013f32198, ksp: 000000004048f8c8)
0000000000000000 000000004048f848 0000000000000002 0000000000000000
000000004048f8e8 000000004048f860 000000004048f860 00000000000486de
00000000003f0e50 0000000013f32510 000000004048fe10 0000000000000000
0000000000000000 000000004048f848 000000000000000d 000000004048f8b8
00000000003f00b8 000000000001647c 000000004048f848 000000004048f890
Call Trace:
([<0000000000016406>] show_trace+0x13a/0x148)
[<0000000000034eca>] __might_sleep+0x13a/0x164
[<000003e002710f4a>] _stp_strncpy_from_user+0x3e/0x60
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e00271106c>] function_user_string+0x100/0x1b8
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e00274f73c>] probe_2416+0xdc/0x388
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e002720168>] enter_kprobe_probe+0x224/0x3fc
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<00000000003ec67e>] aggr_pre_handler+0x86/0x100
[<00000000003e99cc>] kprobe_exceptions_notify+0x3fc/0x464
[<00000000003e9e7c>] notifier_call_chain+0x58/0xa0
[<00000000003e9f0e>] __atomic_notifier_call_chain+0x4a/0x8c
[<00000000003e9f7a>] atomic_notifier_call_chain+0x2a/0x3c
[<0000000000069a10>] notify_die+0x4c/0x58
[<0000000000017d70>] illegal_op+0x74/0x1fc
[<0000000000028194>] sysc_return+0x0/0x8
[<00000000000d8a52>] SyS_write+0x2/0x88
([<0000000000030c20>] kretprobe_trampoline+0x0/0x4)
[<0000004a449d8d24>] 0x4a449d8d24
BUG: sleeping function called from invalid context at include/linux/kernel.h:157
in_atomic(): 1, irqs_disabled(): 1, pid: 10730, name: stapio
CPU: 1 Tainted: G W 2.6.30jun22-07769-gf234012-dirty #1
Process stapio (pid: 10730, task: 0000000013f32198, ksp: 000000004048f8c8)
0000000000000000 000000004048f848 0000000000000002 0000000000000000
000000004048f8e8 000000004048f860 000000004048f860 00000000000486de
00000000003f0e50 0000000013f32510 000000004048fe10 0000000000000000
0000000000000000 000000004048f848 000000000000000d 000000004048f8b8
00000000003f00b8 000000000001647c 000000004048f848 000000004048f890
Call Trace:
([<0000000000016406>] show_trace+0x13a/0x148)
[<0000000000034eca>] __might_sleep+0x13a/0x164
[<000003e002710f4a>] _stp_strncpy_from_user+0x3e/0x60
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e00271106c>] function_user_string+0x100/0x1b8
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e00274f73c>] probe_2416+0xdc/0x388
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<000003e002720168>] enter_kprobe_probe+0x224/0x3fc
[stap_776166d0dfaf221f69b760020ce48936_385430]
[<00000000003ec67e>] aggr_pre_handler+0x86/0x100
[<00000000003e99cc>] kprobe_exceptions_notify+0x3fc/0x464
[<00000000003e9e7c>] notifier_call_chain+0x58/0xa0
[<00000000003e9f0e>] __atomic_notifier_call_chain+0x4a/0x8c
[<00000000003e9f7a>] atomic_notifier_call_chain+0x2a/0x3c
[<0000000000069a10>] notify_die+0x4c/0x58
[<0000000000017d70>] illegal_op+0x74/0x1fc
[<0000000000028194>] sysc_return+0x0/0x8
[<00000000000d8a52>] SyS_write+0x2/0x88
([<0000000000030c20>] kretprobe_trampoline+0x0/0x4)
[<0000004a449d8d24>] 0x4a449d8d24
stap_54dac69e50c7c61034709699ac3a30a6_13700: systemtap: 0.9.8/0.142, base:
000003e002c90000, memory: 121560+35400+8176+14000 data+text+ctx+net, probes: 3
stap_378345d837ee11dbc9221ea0c193f29d_2066: systemtap: 0.9.8/0.142, base:
000003e0034c3000, memory: 2034428+31556+9136+14000 data+text+ctx+net, probes: 2
--
http://sourceware.org/bugzilla/show_bug.cgi?id=10212
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.