This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/6499] New: BUG with systemtap's utrace support
- From: "ananth at in dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 8 May 2008 16:00:11 -0000
- Subject: [Bug runtime/6499] New: BUG with systemtap's utrace support
- Reply-to: sourceware-bugzilla at sourceware dot org
When using a simple script:
probe process(<path_to_binary>).syscall
{
printf("%d thread[%d] syscall\n", pid(), tid())
}
on an app that is blocked on user input (eg., getchar()) and the script is
terminated when the application is still blocked, the following OOPS is seen:
Pid: 21361, comm: threads
EIP: 0060:[<74747500>] EFLAGS: 00010202 CPU: 1
EIP is at 0x74747500
EAX: d7eb22e0 EBX: f7f710a8 ECX: f8fe6ac0 EDX: e3c66690
ESI: d7eb22e0 EDI: f7f710a8 EBP: e3c66690 ESP: e3f39e48
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process threads (pid: 21361, ti=e3f39000 task=e3c66690 task.ti=e3f39000)
Stack: c04663ae c0463fff 00000246 00000246 f73f13b8 e3c66690 f7f710b0 d7eb22e0
00000020 e3c66690 f7f710a8 f793d3b0 c0431eed 00000000 00000008 00003f7c
e3c66bf4 00000000 e3c66688 00000002 f62d25e4 f4fa6a00 00000002 e3f39fb8
Call Trace:
[<c04663ae>] utrace_report_death+0x58/0x1c9
[<c0463fff>] taskstats_exit+0x10f/0x2a8
[<c0431eed>] do_exit+0x62f/0x695
[<c0431fc9>] sys_exit_group+0x0/0xd
[<c0438a87>] get_signal_to_deliver+0x39b/0x3c8
[<c062b2e2>] schedule_timeout+0x13/0x8d
[<c040474a>] do_notify_resume+0x8c/0x6c8
[<c043f07c>] remove_wait_queue+0x16/0x22
[<c0550b10>] read_chan+0x537/0x593
[<c042680d>] __wake_up+0x32/0x42
[<c05505d9>] read_chan+0x0/0x593
[<c054b910>] tty_ldisc_deref+0x55/0x64
[<c045deca>] audit_syscall_exit+0x2c7/0x2e3
[<c054dbc1>] tty_read+0x0/0xac
[<c0408050>] do_syscall_trace+0x4b/0xde
[<c04052ae>] work_notifysig+0x13/0x19
[<c0620000>] xfrm_add_pol_expire+0x35/0x1da
=======================
Code: Bad EIP value.
EIP: [<74747500>] 0x74747500 SS:ESP 0068:e3f39e48
---[ end trace 7e3113adab3b5cac ]---
Pid: 21362, comm: threads Tainted: P D (2.6.24.5-85.fc8 #1)
EIP: 0060:[<74747500>] EFLAGS: 00010202 CPU: 0
EIP is at 0x74747500
EAX: d7eb2100 EBX: f7f711c8 ECX: f8fe6ac0 EDX: f793d3b0
ESI: d7eb2100 EDI: f7f711c8 EBP: f793d3b0 ESP: f4fa5e48
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process threads (pid: 21362, ti=f4fa5000 task=f793d3b0 task.ti=f4fa5000)
Stack: c04663ae 00000287 00000246 c0431aef 00000287 c0431aef f7f711d0 d7eb2100
00000020 f793d3b0 f7f711c8 f783e000 c0431eed 00000000 00000008 f4fa5e84
f793d914 00000000 f793d3a8 00000002 f62d25e4 f4fa6a00 00000002 f4fa5fb8
Call Trace:
[<c04663ae>] utrace_report_death+0x58/0x1c9
[<c0431aef>] do_exit+0x231/0x695
[<c0431aef>] do_exit+0x231/0x695
[<c0431eed>] do_exit+0x62f/0x695
[<c0431fc9>] sys_exit_group+0x0/0xd
[<c0438a87>] get_signal_to_deliver+0x39b/0x3c8
[<c04287f4>] default_wake_function+0x0/0x8
[<c040474a>] do_notify_resume+0x8c/0x6c8
[<c054b3ac>] tty_default_put_char+0x17/0x1a
[<c042680d>] __wake_up+0x32/0x42
[<c054b8d4>] tty_ldisc_deref+0x19/0x64
[<c054b72e>] tty_write_unlock+0x2f/0x32
[<c045deca>] audit_syscall_exit+0x2c7/0x2e3
[<c0449626>] sys_futex+0xfe/0x111
[<c0408050>] do_syscall_trace+0x4b/0xde
[<c04052ae>] work_notifysig+0x13/0x19
=======================
Code: Bad EIP value.
EIP: [<74747500>] 0x74747500 SS:ESP 0068:f4fa5e48
---[ end trace 7e3113adab3b5cac ]---
[ananth@... ~]$ uname -rvm
2.6.24.5-85.fc8 #1 SMP Sat Apr 19 12:39:34 EDT 2008 i686
--
Summary: BUG with systemtap's utrace support
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: ananth at in dot ibm dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=6499
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.