This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Oops when running context.exp on 2.6.33-rc2


Hi,

To test latest stap, I got serious error when running context.exp on 2.6.33-rc2.

[234928.288999] BUG: unable to handle kernel NULL pointer dereference at (null)
[234928.288999] IP: [<(null)>] (null)
[234928.288999] *pde = 00000000
[234928.288999] Oops: 0000 [#1] SMP
[234928.288999] last sysfs file: /sys/module/systemtap_test_module2/sections/__mcount_loc
[234928.288999] Modules linked in: stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801 systemtap_test_module1 systemtap_test_module2 stap_59e08229c97e72f4b69b3aa3c5a4f780_464 stap_1fcfdb29e95e34c6357c7010e36406cf_464 [last unloaded: stap_7eb34d035ef198d5cb33e154c7bd0677_2485]
[234928.288999]
[234928.288999] Pid: 14605, comm: echo Not tainted 2.6.33-rc2 #2 440BX Desktop Reference Platform/VMware Virtual Platform
[234928.288999] EIP: 0060:[<00000000>] EFLAGS: 00210086 CPU: 1
[234928.288999] EIP is at 0x0
[234928.288999] EAX: cb512000 EBX: cb512000 ECX: cb513d54 EDX: cb513f44
[234928.288999] ESI: d087d84c EDI: cb513d54 EBP: cb513d54 ESP: cb513d2c
[234928.288999] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068
[234928.288999] Process echo (pid: 14605, ti=cb512000 task=cdf37ab0 task.ti=cb512000)
[234928.288999] Stack:
[234928.288999] c020439d d087d84c cb513db8 00000000 cb513d44 cb513dc4 00000000 00000000
[234928.288999] <0> 00000000 cb513efc cb513ddc d087c97a 00000000 d087d84c cb513db8 00000001
[234928.288999] <0> b772e000 fffffff2 00000030 00000002 fffffffb cb513f4c 000004d2 0000007b
[234928.288999] Call Trace:
[234928.288999] [<c020439d>] ? dump_trace+0x7e/0xad
[234928.288999] [<d087c97a>] ? _stp_stack_print+0x18e/0x2ad [stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801]
[234928.288999] [<d0832097>] ? stm_write_cmd+0x46/0xf7 [systemtap_test_module1]
[234928.288999] [<d087cad9>] ? function_print_backtrace+0x40/0x68 [stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801]
[234928.288999] [<d087cc56>] ? function_print_all_trace_info+0xbf/0x2ff [stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801]
[234928.289999] [<c039742f>] ? strlcpy+0x33/0x43
[234928.289999] [<d087d04b>] ? probe_1917+0x45/0xb8 [stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801]
[234928.289999] [<d081701c>] ? yyy_func2+0x1/0x10 [systemtap_test_module2]
[234928.289999] [<d087b615>] ? enter_kprobe_probe+0x153/0x2ec [stap_0f82dfbb035551305fcda9ca5dc4a0f4_2801]
[234928.289999] [<c05a7ec9>] ? is_IF_modifier+0x8/0x28
[234928.289999] [<c05a8209>] ? kprobe_exceptions_notify+0x139/0x357
[234928.289999] [<c05a8d65>] ? notifier_call_chain+0x30/0x4f
[234928.289999] [<c05a8d9a>] ? __atomic_notifier_call_chain+0x16/0x18
[234928.289999] [<c05a8dad>] ? atomic_notifier_call_chain+0x11/0x13
[234928.289999] [<c05a8ddc>] ? notify_die+0x2d/0x2f
[234928.289999] [<c05a721d>] ? do_int3+0x24/0x5e
[234928.289999] [<c05a70fa>] ? int3+0x2e/0x34
[234928.289999] [<d081701b>] ? yyy_func2+0x0/0x10 [systemtap_test_module2]
[234928.289999] [<d0817038>] ? yyy_func1+0xd/0x10 [systemtap_test_module2]
[234928.289999] [<d0832097>] ? stm_write_cmd+0x46/0xf7 [systemtap_test_module1]
[234928.289999] [<d0832051>] ? stm_write_cmd+0x0/0xf7 [systemtap_test_module1]
[234928.289999] [<c02e9e27>] ? proc_reg_write+0x5b/0x6f
[234928.289999] [<c02b5e81>] ? vfs_write+0x87/0xe1
[234928.289999] [<c02e9dcc>] ? proc_reg_write+0x0/0x6f
[234928.289999] [<c02b5f7b>] ? sys_write+0x40/0x62
[234928.289999] [<c020298c>] ? sysenter_do_call+0x12/0x27
[234928.289999] Code: Bad EIP value.
[234928.289999] EIP: [<00000000>] 0x0 SS:ESP 0068:cb513d2c
[234928.289999] CR2: 0000000000000000
[234928.289999] ---[ end trace fab8ca5171d1c08e ]---



Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]