This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug kprobes/2071] Probes on ISR with probes on task thread's prehandler crash the system
- From: "mhiramat at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 17 Jan 2008 14:53:37 -0000
- Subject: [Bug kprobes/2071] Probes on ISR with probes on task thread's prehandler crash the system
- References: <20051220073112.2071.anil.s.keshavamurthy@intel.com>
- Reply-to: sourceware-bugzilla at sourceware dot org
------- Additional Comments From mhiramat at redhat dot com 2008-01-17 14:53 -------
I found this bug still exist in the latest kernel.
I'm investing this bug.
Here is the kernel bug message:
------
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
probes registered
kernel BUG at /home/mhiramat/ksrc/linux-2.6.24-rc7/kernel/exit.c:1050!
mv[32200]: bugcheck! 0 [1]
Modules linked in: mon_sched mon_sched_4 mon_sched_3 mon_sched_2 mon_sched_1
mon_irq mon_irq_4 mon_irq_3 mon_irq_2 mon_irq_1 mon_reent mon_dummy sunrpc
binfmt_misc dm_multipath fan sg thermal processor button container dm_snapshot
dm_zero dm_mirror dm_mod usb_storage megaraid_mbox megaraid_mm ehci_hcd ohci_hcd
uhci_hcd usbcore
Pid: 32200, CPU 1, comm: mv
psr : 0000101008526030 ifs : 800000000000040c ip : [<a00000010009def0>] Not
tainted (2.6.24-rc7)
ip is at do_exit+0x11b0/0x11c0
unat: 0000000000000000 pfs : 000000000000040c rsc : 0000000000000003
rnat: 0000000000000400 bsps: 0000000000000400 pr : 0000000000556959
ldrs: 0000000000000000 ccv : 0000000000000000 fpsr: 0009804c8a70033f
csd : 0000000000000000 ssd : 0000000000000000
b0 : a00000010009def0 b6 : a00000010008d300 b7 : a00000010000f9f0
f6 : 1003e000000000001c000 f7 : 1003e0000000000000400
f8 : 1003e0000000000000070 f9 : 0ffff8000000000000000
f10 : 10008fffffffff0000000 f11 : 1003e0000000000000400
r1 : a000000100e60c60 r2 : e00000071eab0024 r3 : a000000100c05348
r8 : 000000000000004a r9 : a000000100c05348 r10 : 0000000000000007
r11 : 0000000000004000 r12 : e0000005a639fe20 r13 : e0000005a6390000
r14 : 0000000000004000 r15 : a000000100c05348 r16 : a000000100c05330
r17 : 0000000000004000 r18 : 0000001516f675a7 r19 : e000000001129460
r20 : e000000001129460 r21 : e0000000011257d8 r22 : e000000707dea6d8
r23 : 0000001513fb8527 r24 : e000000707dea6c0 r25 : e0000000011257c0
r26 : a000000100c79e4c r27 : 0000000000000400 r28 : 0000000000000400
r29 : 0000000000001000 r30 : 0000000000000070 r31 : e00000071eab0048
Call Trace:
[<a000000100015340>] show_stack+0x40/0xa0
sp=e0000005a639f9f0 bsp=e0000005a6390e78
[<a000000100015c50>] show_regs+0x850/0x8a0
sp=e0000005a639fbc0 bsp=e0000005a6390e20
[<a000000100038d60>] die+0x1a0/0x2a0
sp=e0000005a639fbc0 bsp=e0000005a6390dd0
[<a000000100038eb0>] die_if_kernel+0x50/0x80
sp=e0000005a639fbc0 bsp=e0000005a6390da0
[<a0000001007627c0>] ia64_bad_break+0x240/0x440
sp=e0000005a639fbc0 bsp=e0000005a6390d78
[<a00000010000b9a0>] ia64_leave_kernel+0x0/0x270
sp=e0000005a639fc50 bsp=e0000005a6390d78
[<a00000010009def0>] do_exit+0x11b0/0x11c0
sp=e0000005a639fe20 bsp=e0000005a6390d18
[<a00000010009e050>] do_group_exit+0x150/0x160
sp=e0000005a639fe30 bsp=e0000005a6390ce0
[<a00000010009e080>] sys_exit_group+0x20/0x40
sp=e0000005a639fe30 bsp=e0000005a6390c88
[<a00000010000b800>] ia64_ret_from_syscall+0x0/0x20
sp=e0000005a639fe30 bsp=e0000005a6390c88
[<a000000000010720>] __kernel_syscall_via_break+0x0/0x20
sp=e0000005a63a0000 bsp=e0000005a6390c88
Fixing recursive fault but reboot is needed!
------
--
What |Removed |Added
----------------------------------------------------------------------------
Status|RESOLVED |REOPENED
Resolution|FIXED |
http://sourceware.org/bugzilla/show_bug.cgi?id=2071
------- You are receiving this mail because: -------
You are on the CC list for the bug, or are watching someone who is.