This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/22151] New: on rhel6 i686, the nettop.stp example script causes a kernel BUG


https://sourceware.org/bugzilla/show_bug.cgi?id=22151

            Bug ID: 22151
           Summary: on rhel6 i686, the nettop.stp example script causes a
                    kernel BUG
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com
  Target Milestone: ---

On RHEL6 i686 (2.6.32-696.10.1.el6.i686.debug), running the following:

# make installcheck RUNTESTFLAGS=check.exp CHECK_ONLY=nettop

Crashes the kernel and the following appears on the console:

====
BUG: unable to handle kernel NULL pointer dereference at 00000004
IP: [<fd32d2c4>] _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
*pdpt = 000000002f540001 *pde = 0000000000000000 
Oops: 0002 [#1] SMP 
last sysfs file: /sys/module/wmi/sections/__ksymtab_strings
Modules linked in: stap_1838c075f00666d1ff60b0cb531a31f6_8489(U)
cpufreq_ondemand acpi_cpufreq mperf ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad
rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core ib_addr ipv6 microcode iTCO_wdt
iTCO_vendor_support i2c_i801 snd_hda_codec_hdmi sg snd_hda_codec_realtek
lpc_ich snd_hda_codec_generic mfd_core snd_hda_intel snd_hda_codec snd_hwdep
snd_seq snd_seq_device snd_pcm snd_timer snd soundcore snd_page_alloc e1000e
ptp pps_core ext4 jbd2 mbcache sr_mod cdrom sd_mod crc_t10dif firewire_ohci
firewire_core crc_itu_t ahci pata_acpi ata_generic nouveau ttm drm_kms_helper
drm i2c_algo_bit i2c_core mxm_wmi video output wmi dm_mirror dm_region_hash
dm_log dm_mod [last unloaded: stap_91f3b058ac9ff778669f4eda05368f44__6829]

Pid: 8489, comm: stapio Not tainted 2.6.32-696.10.1.el6.i686.debug #1 Intel To
be filled by O.E.M./To be filled by O.E.M.
EIP: 0060:[<fd32d2c4>] EFLAGS: 00010246 CPU: 1
EIP is at _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
EAX: 00000000 EBX: 00000000 ECX: 00000006 EDX: 00000000
ESI: 00000006 EDI: 00000000 EBP: f1297f04 ESP: f1297ed8
 DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
Process stapio (pid: 8489, ti=f1296000 task=c26b07e0 task.ti=f1296000)
Stack:
 00000002 00000202 fd3345f0 fd334364 00000000 00000800 00000000 00000000
<0> 0000000c c0b6c158 00000020 f1297f60 fd32ef67 00000002 00000004 00000080
<0> 00000800 00000200 00000000 00000000 f1297f30 c05e0daf f1297f60 c055c57d
Call Trace:
 [<fd32ef67>] _stp_ctl_write_cmd+0x5f7/0xba0
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
 [<c05e0daf>] ? security_file_permission+0xf/0x20
 [<c055c57d>] ? rw_verify_area+0x5d/0xd0
 [<c055c68a>] vfs_write+0x9a/0x190
 [<fd32e970>] ? _stp_ctl_write_cmd+0x0/0xba0
[stap_1838c075f00666d1ff60b0cb531a31f6_8489]
 [<c055d204>] sys_write+0x44/0x90
 [<c0409edf>] sysenter_do_call+0x12/0x38
Code: 00 00 8d 48 01 a1 28 de 8b c0 ba 20 00 00 00 e8 33 a5 30 c3 3b 05 00 a7
b6 c0 7c d3 8b 43 08 c7 40 28 00 00 00 00 8b 55 e4 89 d8 <89> 73 04 89 13 83 c4
20 5b 5e 5f 5d c3 8d b4 26 00 00 00 00 3d 
EIP: [<fd32d2c4>] _stp_pmap_new_issix+0x124/0x360
[stap_1838c075f00666d1ff60b0cb531a31f6_8489] SS:ESP 0068:f1297ed8
CR2: 0000000000000004
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]