This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/6499] New: BUG with systemtap's utrace support


When using a simple script:

probe process(<path_to_binary>).syscall
{
        printf("%d thread[%d] syscall\n", pid(), tid())
}

on an app that is blocked on user input (eg., getchar()) and the script is
terminated when the application is still blocked, the following OOPS is seen:

Pid: 21361, comm: threads
EIP: 0060:[<74747500>] EFLAGS: 00010202 CPU: 1
EIP is at 0x74747500
EAX: d7eb22e0 EBX: f7f710a8 ECX: f8fe6ac0 EDX: e3c66690
ESI: d7eb22e0 EDI: f7f710a8 EBP: e3c66690 ESP: e3f39e48
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process threads (pid: 21361, ti=e3f39000 task=e3c66690 task.ti=e3f39000)
Stack: c04663ae c0463fff 00000246 00000246 f73f13b8 e3c66690 f7f710b0 d7eb22e0
00000020 e3c66690 f7f710a8 f793d3b0 c0431eed 00000000 00000008 00003f7c
e3c66bf4 00000000 e3c66688 00000002 f62d25e4 f4fa6a00 00000002 e3f39fb8
Call Trace:
	[<c04663ae>] utrace_report_death+0x58/0x1c9
	[<c0463fff>] taskstats_exit+0x10f/0x2a8
	[<c0431eed>] do_exit+0x62f/0x695
	[<c0431fc9>] sys_exit_group+0x0/0xd
	[<c0438a87>] get_signal_to_deliver+0x39b/0x3c8
	[<c062b2e2>] schedule_timeout+0x13/0x8d
	[<c040474a>] do_notify_resume+0x8c/0x6c8
	[<c043f07c>] remove_wait_queue+0x16/0x22
	[<c0550b10>] read_chan+0x537/0x593
	[<c042680d>] __wake_up+0x32/0x42
	[<c05505d9>] read_chan+0x0/0x593
	[<c054b910>] tty_ldisc_deref+0x55/0x64
	[<c045deca>] audit_syscall_exit+0x2c7/0x2e3
	[<c054dbc1>] tty_read+0x0/0xac
	[<c0408050>] do_syscall_trace+0x4b/0xde
	[<c04052ae>] work_notifysig+0x13/0x19
	[<c0620000>] xfrm_add_pol_expire+0x35/0x1da
	=======================
Code:  Bad EIP value.
EIP: [<74747500>] 0x74747500 SS:ESP 0068:e3f39e48
---[ end trace 7e3113adab3b5cac ]---
Pid: 21362, comm: threads Tainted: P      D (2.6.24.5-85.fc8 #1)
EIP: 0060:[<74747500>] EFLAGS: 00010202 CPU: 0
EIP is at 0x74747500
EAX: d7eb2100 EBX: f7f711c8 ECX: f8fe6ac0 EDX: f793d3b0
ESI: d7eb2100 EDI: f7f711c8 EBP: f793d3b0 ESP: f4fa5e48
DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0068
Process threads (pid: 21362, ti=f4fa5000 task=f793d3b0 task.ti=f4fa5000)
Stack: c04663ae 00000287 00000246 c0431aef 00000287 c0431aef f7f711d0 d7eb2100
00000020 f793d3b0 f7f711c8 f783e000 c0431eed 00000000 00000008 f4fa5e84
f793d914 00000000 f793d3a8 00000002 f62d25e4 f4fa6a00 00000002 f4fa5fb8
Call Trace:
	[<c04663ae>] utrace_report_death+0x58/0x1c9
	[<c0431aef>] do_exit+0x231/0x695
	[<c0431aef>] do_exit+0x231/0x695
	[<c0431eed>] do_exit+0x62f/0x695
	[<c0431fc9>] sys_exit_group+0x0/0xd
	[<c0438a87>] get_signal_to_deliver+0x39b/0x3c8
	[<c04287f4>] default_wake_function+0x0/0x8
	[<c040474a>] do_notify_resume+0x8c/0x6c8
	[<c054b3ac>] tty_default_put_char+0x17/0x1a
	[<c042680d>] __wake_up+0x32/0x42
	[<c054b8d4>] tty_ldisc_deref+0x19/0x64
	[<c054b72e>] tty_write_unlock+0x2f/0x32
	[<c045deca>] audit_syscall_exit+0x2c7/0x2e3
	[<c0449626>] sys_futex+0xfe/0x111
	[<c0408050>] do_syscall_trace+0x4b/0xde
	[<c04052ae>] work_notifysig+0x13/0x19
	=======================
Code:  Bad EIP value.
EIP: [<74747500>] 0x74747500 SS:ESP 0068:f4fa5e48
---[ end trace 7e3113adab3b5cac ]---

[ananth@... ~]$ uname -rvm
2.6.24.5-85.fc8 #1 SMP Sat Apr 19 12:39:34 EDT 2008 i686

-- 
           Summary: BUG with systemtap's utrace support
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: ananth at in dot ibm dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=6499

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]