This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/22151] New: on rhel6 i686, the nettop.stp example script causes a kernel BUG
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Mon, 18 Sep 2017 18:22:49 +0000
- Subject: [Bug runtime/22151] New: on rhel6 i686, the nettop.stp example script causes a kernel BUG
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=22151
Bug ID: 22151
Summary: on rhel6 i686, the nettop.stp example script causes a
kernel BUG
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
Assignee: systemtap at sourceware dot org
Reporter: dsmith at redhat dot com
Target Milestone: ---
On RHEL6 i686 (2.6.32-696.10.1.el6.i686.debug), running the following:
# make installcheck RUNTESTFLAGS=check.exp CHECK_ONLY=nettop
Crashes the kernel and the following appears on the console:
====
BUG: unable to handle kernel NULL pointer dereference at 00000004
IP: [<fd32d2c4>] _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
*pdpt = 000000002f540001 *pde = 0000000000000000
Oops: 0002 [#1] SMP
last sysfs file: /sys/module/wmi/sections/__ksymtab_strings
Modules linked in: stap_1838c075f00666d1ff60b0cb531a31f6_8489(U)
cpufreq_ondemand acpi_cpufreq mperf ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad
rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr ipv6 microcode iTCO_wdt
iTCO_vendor_support i2c_i801 snd_hda_codec_hdmi sg snd_hda_codec_realtek
lpc_ich snd_hda_codec_generic mfd_core snd_hda_intel snd_hda_codec snd_hwdep
snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc e1000e
ptp pps_core ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif firewire_ohci
firewire_core crc_itu_t ahci pata_acpi ata_generic nouveau ttm drm_kms_helper
drm i2c_algo_bit i2c_core mxm_wmi video output wmi dm_mirror dm_region_hash
dm_log dm_mod [last unloaded: stap_91f3b058ac9ff778669f4eda05368f44__6829]
Pid: 8489, comm: stapio Not tainted 2.6.32-696.10.1.el6.i686.debug #1 Intel To
be filled by O.E.M./To be filled by O.E.M.
EIP: 0060:[<fd32d2c4>] EFLAGS: 00010246 CPU: 1
EIP is at _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
EAX: 00000000 EBX: 00000000 ECX: 00000006 EDX: 00000000
ESI: 00000006 EDI: 00000000 EBP: f1297f04 ESP: f1297ed8
DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
Process stapio (pid: 8489, ti=f1296000 task=c26b07e0 task.ti=f1296000)
Stack:
00000002 00000202 fd3345f0 fd334364 00000000 00000800 00000000 00000000
<0> 0000000c c0b6c158 00000020 f1297f60 fd32ef67 00000002 00000004 00000080
<0> 00000800 00000200 00000000 00000000 f1297f30 c05e0daf f1297f60 c055c57d
Call Trace:
[<fd32ef67>] _stp_ctl_write_cmd+0x5f7/0xba0
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
[<c05e0daf>] ? security_file_permission+0xf/0x20
[<c055c57d>] ? rw_verify_area+0x5d/0xd0
[<c055c68a>] vfs_write+0x9a/0x190
[<fd32e970>] ? _stp_ctl_write_cmd+0x0/0xba0
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
[<c055d204>] sys_write+0x44/0x90
[<c0409edf>] sysenter_do_call+0x12/0x38
Code: 00 00 8d 48 01 a1 28 de 8b c0 ba 20 00 00 00 e8 33 a5 30 c3 3b 05 00 a7
b6 c0 7c d3 8b 43 08 c7 40 28 00 00 00 00 8b 55 e4 89 d8 <89> 73 04 89 13 83 c4
20 5b 5e 5f 5d c3 8d b4 26 00 00 00 00 3d
EIP: [<fd32d2c4>] _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489] SS:ESP 0068:f1297ed8
CR2: 0000000000000004
====
--
You are receiving this mail because:
You are the assignee for the bug.