This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x


https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #3 from David Smith <dsmith at redhat dot com> ---
Here's additional information. The following works fine (using
'kprobe.function'):

# stap -DSTP_ALIBI -ve 'probe kprobe.function("free_pages").call {
printf("here\n") }'

Bug the corresponding 'kernel.function' version crashes almost immediately:

# stap -DSTP_ALIBI -ve 'probe kernel.function("free_pages").call {
printf("here\n") }'

Looking at the translator's C output, 'kernel.function("free_pages").call' puts
probes at 2 addresses:

  { .address=(unsigned long)0x111928ULL, .module="kernel", .section="_stext",
.probe=(&stap_probes[0]), },
  { .address=(unsigned long)0x111910ULL, .module="kernel", .section="_stext",
.probe=(&stap_probes[1]), },
};

Putting a probe at the first address, 0x111928ULL, works fine. Putting a probe
at the 2nd address, 0x111910ULL, causes the BUG to appear immediately.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]