public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
@ 2014-07-10 14:59 dsmith at redhat dot com
  2014-07-30 19:17 ` [Bug runtime/17140] " dsmith at redhat dot com
                   ` (7 more replies)
  0 siblings, 8 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-07-10 14:59 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

            Bug ID: 17140
           Summary: systemtap.examples/profiling/functioncallcount.stp
                    causing kernel panic on s390x
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com
              Host: s390x

On RHEL7 (3.10.0-123.el7.s390x), when I run the following command:

====
# stap -v ../src/testsuite/systemtap.examples/profiling/functioncallcount.stp
"*@mm/*.c" -c "sleep 1"
Pass 1: parsed user script and 103 library script(s) using
143240virt/28188res/3092shr/25540data kb, in 130usr/20sys/442real ms.
WARNING: function mem_init is in blacklisted section: keyword at
../src/testsuite/systemtap.examples/profiling/functioncallcount.stp:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function paging_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_initrd_mem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function nopfault is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pfault_irq_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: kprobes function do_protection_exception is blacklisted: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: kprobes function do_dat_exception is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function fault_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_map_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_convert_memory_chunk is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmma_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmma is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_huge_pte_at is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function huge_pte_offset is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function huge_pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function absent_pages_in_range is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_per_cpu_pageset is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_area_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_area_init_nodes is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_with_active_regions is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmdline_parse_movablecore is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_alloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_pageblock_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmdline_parse_kernelcore is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function find_min_pfn_for_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_large_system_hash is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function node_map_pfn_alignment is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_dma_reserve is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_memory_present_with_active_regions is in blacklisted
section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function find_min_pfn_with_active_regions is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_writeback_init is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function swap_setup is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kswapd_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function shmem_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_vmstat is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function extfrag_debug_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bdi_class_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function default_bdi_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_mminit_loglevel is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mminit_verify_pageflags_layout is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mm_sysfs_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_embed_first_chunk is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_free_alloc_info is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_setup_first_chunk is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function percpu_init_late is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_dfl_fc_free is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_alloc_alloc_info is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function percpu_alloc_setup is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_dfl_fc_alloc is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_per_cpu_areas is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_boot_cache is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function slab_proc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_kmalloc_caches is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_kmalloc_cache is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function workingset_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_zero_pfn is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function copy_pte_range is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __pte_alloc_kernel is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function disable_randmaps is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mmap_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function special_mapping_fault is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function special_mapping_close is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function anon_vma_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmalloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function proc_vmalloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vm_area_add_early is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vm_area_register_early is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_nopanic is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function reserve_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootmem_bootmap_pages is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node_high is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_node_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low_node is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __free is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootmem_debug_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_late is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_bdata is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mark_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_core is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem_core is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function reserve_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem_core is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mark_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_nopanic is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __reserve is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_allow_resize is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_nid is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_base is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_phys_mem_size is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __memblock_alloc_base is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function early_memblock is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_mem_size is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_is_reserved is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_enforce_memory_limit is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_base_nid is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_try_nid is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function procswaps_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_frontswap is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_exit is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_nrpages_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_add_hstate is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_default_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_huge_page is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_hstate_alloc_pages is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_early_usemaps_alloc_node is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memory_present is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function node_memmap_size_bytes is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmemmap_pte_populate is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_mem_maps_populate_node is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ksm_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function slab_sysfs_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootstrap is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_debug is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_min_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kmem_cache_init_late is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_min_objects is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_max_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_nomerge is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kmem_cache_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_transparent_hugepage is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugepage_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_move_charge_pte_range is blacklisted: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_count_precharge_pte_range is blacklisted: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function enable_swap_account is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_cgroup_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_cleancache is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
Pass 2: analyzed script: 1536 probe(s), 7 function(s), 4 embed(s), 1 global(s)
using 179368virt/64488res/4284shr/61668data kb, in 710usr/340sys/6198real ms.
Pass 3: translated to C into
"/tmp/stapfAIHgx/stap_7f45c75080212845924364cc12433973_290793_src.c" using
179368virt/64836res/4608shr/61668data kb, in 150usr/40sys/271real ms.
Pass 4: compiled C into "stap_7f45c75080212845924364cc12433973_290793.ko" in
5700usr/790sys/7925real ms.
Pass 5: starting run.
====

I get the following kernel panic:

====
[  129.520018] Unable to handle kernel pointer dereference at virtual kernel
add
ress 000000f421d05000
[  129.520063] Oops: 003b [#1] SMP
[  129.520066] Modules linked in:
stap_7f45c75080212845924364cc12433973_2_2903(O
F) sg qeth_l2 vmur nfsd auth_rpcgss nfs_acl lockd sunrpc xfs libcrc32c
dasd_fba_
mod dasd_eckd_mod dasd_mod lcs ctcm fsm qeth qdio ccwgroup dm_mirror
dm_region_h
ash dm_log dm_mod
[  129.520093] CPU: 0 PID: 730 Comm: systemd-udevd Tainted: GF         
O-------
-------   3.10.0-123.el7.s390x #1
[  129.520097] task: 000000000165ecc0 ti: 000000007f040000 task.ti:
000000007f04
0000
[  129.520100] Krnl PSW : 0704e00180000000 000000000026cf7e
(__mem_cgroup_commit
_charge+0x4e/0x468)
[  129.520110]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0
EA:
3
Krnl GPRS: 0000000000000000 0000000000000001 000000f421d050d8 000000000000f420
[  129.520119]            000000f421d050d8 0000000000000001 0000000000000000
000
003d101912400
[  129.520189]            0000000000000001 0000000000000001 000000007ff79000
000
0000000000001
[  129.520196]            000003d101912400 00000000005cd340 000000000026cf6e
000
000007f043bb0
[  129.520205] Krnl Code: 000000000026cf6e: e320f0a00024        stg    
%r2,160(
%r15)
           000000000026cf74: a7190001           lghi    %r1,1
          #000000000026cf78: e340f0a00004       lg      %r4,160(%r15)
          >000000000026cf7e: e32040000004       lg      %r2,0(%r4)
           000000000026cf84: b9040032           lgr     %r3,%r2
           000000000026cf88: b9810031           ogr     %r3,%r1
           000000000026cf8c: eb2340000030       csg     %r2,%r3,0(%r4)
           000000000026cf92: a744fff9           brc     4,26cf84
[  129.520287] Call Trace:
[  129.520291] ([<000003ffff82f000>] 0x3ffff82f000)
[  129.520299]  [<000000000026f56e>] mem_cgroup_charge_common+0x9e/0xe0
[  129.520306]  [<0000000000234420>] do_wp_page+0x178/0xa80
[  129.520313]  [<0000000000237afe>] handle_mm_fault+0x7a6/0xe98
[  129.520318]  [<00000000005b3588>] 01: HCPGSP2629I The virtual machine is
plac
ed in CP mode due to a SIGP stop from
 CPU 01.
do_protection_exception+0x198/0x3d0
[  129.520367]  [<00000000005b1de6>] pgm_check_handler+0x17a/0x17e
[  129.520369]  [<000003fffd5b0900>] 0x3fffd5b0900
[  129.520371] Last Breaking-Event-Address:
[  129.520373]  [<0000000000271f6a>] lookup_page_cgroup+0x42/0x48
[  129.520400]
[  129.520403] Kernel panic - not syncing: Fatal exception: panic_on_oops
00: HCPGIR450W CP entered; disabled wait PSW 00020001 80000000 00000000
0010DEEE
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
@ 2014-07-30 19:17 ` dsmith at redhat dot com
  2014-07-31 17:58 ` dsmith at redhat dot com
                   ` (6 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-07-30 19:17 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #1 from David Smith <dsmith at redhat dot com> ---
OK, I've finally narrowed this one down a bit more. There are 2 problems here.

There are 2 functions that crash the kernel when a kprobe is placed on them,
without systemtap involved. I verified this using the scripts down in
src/scripts/kprobes_test. They are:

  set_pageblock_flags_group()
  lookup_page_cgroup()

I've filed bugzilla bugs on each of those:

  BZ1123425 - kprobe on set_pageblock_flags_group() causes kernel panic on
s390x
  BZ1123429 - kprobe on lookup_page_cgroup() causes kernel panic on s390x

We will probably need to add those functions to the blacklist. With those 2
functions removed from the list produced by:

  stap -l 'kernel.function("*@mm/*.c").call'

I still see a crash. So, I modified the scripts in src/scripts/kprobes_test to
build systemtap modules instead of straight kernel modules. After running that,
it appears that the following function is the culprit:

  free_pages()

Here's the crash you get when probing free_pages():

====
[ 6071.705497] Kernel BUG at 00000000002118b6 [verbose debug info unavailable]
[ 6071.705535] specification exception: 0006 [#1] SMP
[ 6071.705537] Modules linked in: probe_module(OF) tun ext4 mbcache jbd2 loop
sg
 qeth_l2 vmur nfsd auth_rpcgss nfs_acl lockd sunrpc xfs libcrc32c dasd_fba_mod
l
cs ctcm fsm dasd_eckd_mod qeth qdio dasd_mod ccwgroup dm_mirror dm_region_hash
d
m_log dm_mod [last unloaded: probe_module]
[ 6071.705564] CPU: 0 PID: 34156 Comm: basename Tainted: GF         
O----------
----   3.10.0-123.el7.s390x #1
[ 6071.705568] task: 000000007c87daa0 ti: 0000000068d50000 task.ti:
0000000068d5
0000
[ 6071.705571] Krnl PSW : 0704e00180000000 00000000002118b6
(__free_pages+0x36/0
x90)
[ 6071.705580]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0
EA:
3
Krnl GPRS: 0000000000000001 0000000000000001 000000000acfcecc 000000000acfcecd
[ 6071.705588]            000003ff7fffffff 0000000000000000 0000000080000000
000
000003fda0008
[ 6071.705592]            0000000068d53e00 00000000ae64dfff 00000000ae64e000
000
000001d1e9738
[ 6071.706153] ------------[ cut here ]------------
[ 6071.706154] Kernel BUG at 00000000002118b6 [verbose debug info unavailable]
[ 6071.708530]            0000000000000002 0000000000747a01 0000000068d53c30
000
0000068d53c08
[ 6071.708543] Krnl Code: 00000000002118ac: d01c18231b21        trtr   
2083(29,
%r1),2849(%r1)
          #00000000002118b2: ba32d01c           cs      %r3,%r2,28(%r13)
          >00000000002118b6: a744fffc           brc     4,2118ae
           00000000002118ba: ec260010007e       cij     %r2,0,6,2118da
           00000000002118c0: b904002d           lgr     %r2,%r13
           00000000002118c4: ecc80012007c       cgij    %r12,0,8,2118e8
           00000000002118ca: b904003c           lgr     %r3,%r12
           00000000002118ce: c0e5ffffeef5       brasl   %r14,20f6b8
[ 6071.708595] Call Trace:
[ 6071.708599] ([<00000000ae64dfff>] 0xae64dfff)
[ 6071.708606]  [<000000000023316a>] free_pgd_range+0x40a/0x480
[ 6071.708613]  [<00000000002332ce>] free_pgtables+0xee/0x148
[ 6071.708619]  [<000000000023e84c>] 01: HCPGSP2629I The virtual machine is
plac
ed in CP mode due to a SIGP stop from
 CPU 01.
exit_mmap+0x12c/0x1c8
[ 6071.708656]  [<000000000012d8ae>] mmput+0x7e/0x138
[ 6071.708659]  [<000000000013723e>] do_exit+0x2be/0xa88
[ 6071.708663]  [<0000000000137abe>] do_group_exit+0x4e/0xe0
[ 6071.708679]  [<0000000000137b7a>] SyS_exit_group+0x2a/0x30
[ 6071.708682]  [<00000000005b1c1c>] sysc_tracego+0x14/0x1a
[ 6071.708687]  [<000003fffd624694>] 0x3fffd624694
[ 6071.708690] Last Breaking-Event-Address:
[ 6071.708692]  [<0000000000211920>] free_pages.part.49+0x10/0x18
[ 6071.708696]
[ 6071.708698] Kernel panic - not syncing: Fatal exception: panic_on_oops
[ 6071.708701] specification exception: 0006 [#2] SMP
[ 6071.708706] Modules linked in:00: HCPGIR450W CP entered; disabled wait PSW
00
020001 80000000 00000000 0010DEEE
====

Here's the source to free_pages():

====
void free_pages(unsigned long addr, unsigned int order)                         
{                                                                               
        if (addr != 0) {                                                        
                VM_BUG_ON(!virt_addr_valid((void *)addr));                      
                __free_pages(virt_to_page((void *)addr), order);                
        }                                                                       
}                                                                               
====

So, I'm guessing we're hitting that VM_BUG_ON().

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
  2014-07-30 19:17 ` [Bug runtime/17140] " dsmith at redhat dot com
@ 2014-07-31 17:58 ` dsmith at redhat dot com
  2014-07-31 19:49 ` dsmith at redhat dot com
                   ` (5 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-07-31 17:58 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #2 from David Smith <dsmith at redhat dot com> ---
Here's a small update. This BUG doesn't happen on the debug kernel (which is
odd). The BUG still happens with -DSTP_ALIBI.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
  2014-07-30 19:17 ` [Bug runtime/17140] " dsmith at redhat dot com
  2014-07-31 17:58 ` dsmith at redhat dot com
@ 2014-07-31 19:49 ` dsmith at redhat dot com
  2014-08-04 16:08 ` dsmith at redhat dot com
                   ` (4 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-07-31 19:49 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #3 from David Smith <dsmith at redhat dot com> ---
Here's additional information. The following works fine (using
'kprobe.function'):

# stap -DSTP_ALIBI -ve 'probe kprobe.function("free_pages").call {
printf("here\n") }'

Bug the corresponding 'kernel.function' version crashes almost immediately:

# stap -DSTP_ALIBI -ve 'probe kernel.function("free_pages").call {
printf("here\n") }'

Looking at the translator's C output, 'kernel.function("free_pages").call' puts
probes at 2 addresses:

  { .address=(unsigned long)0x111928ULL, .module="kernel", .section="_stext",
.probe=(&stap_probes[0]), },
  { .address=(unsigned long)0x111910ULL, .module="kernel", .section="_stext",
.probe=(&stap_probes[1]), },
};

Putting a probe at the first address, 0x111928ULL, works fine. Putting a probe
at the 2nd address, 0x111910ULL, causes the BUG to appear immediately.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
                   ` (2 preceding siblings ...)
  2014-07-31 19:49 ` dsmith at redhat dot com
@ 2014-08-04 16:08 ` dsmith at redhat dot com
  2014-08-04 17:40 ` dsmith at redhat dot com
                   ` (3 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-08-04 16:08 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #4 from David Smith <dsmith at redhat dot com> ---
Here's the output of the eu-readelf that relates to free_pages()

# eu-readelf --debug-dump=loc
/usr/lib/debug/lib/modules/3.10.0-123.el7.s390x/vmlinux

====
 [422a8b]  0x0000000000211910 <free_pages.part.49>..0x000000000021191c
<free_pages.part.49+0xc> [   0] reg2
           0x000000000021191c <free_pages.part.49+0xc>..0x0000000000211926 [  
0] GNU_entry_value:
       [   0] reg2
                                                  [   3] stack_value
 [422ac4]  0x0000000000211910 <free_pages.part.49>..0x0000000000211925
<free_pages.part.49+0x15> [   0] reg3
           0x0000000000211925 <free_pages.part.49+0x15>..0x0000000000211926 [  
0] GNU_entry_value:
       [   0] reg3
                                                  [   3] stack_value
 [422afd]  0x0000000000211928 <free_pages>..0x0000000000211935 <free_pages+0xd>
[   0] reg2
           0x0000000000211935 <free_pages+0xd>..0x0000000000211936 [   0]
GNU_entry_value:
       [   0] reg2
                                                  [   3] stack_value
 [422b36]  0x0000000000211928 <free_pages>..0x0000000000211935 <free_pages+0xd>
[   0] reg3
           0x0000000000211935 <free_pages+0xd>..0x0000000000211936 [   0]
GNU_entry_value:
       [   0] reg3
                                                  [   3] stack_value
====

So, it looks like the 'free_pages.part' address doesn't work, while the
'free_pages' address does.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
                   ` (3 preceding siblings ...)
  2014-08-04 16:08 ` dsmith at redhat dot com
@ 2014-08-04 17:40 ` dsmith at redhat dot com
  2014-10-10  8:31 ` mcermak at redhat dot com
                   ` (2 subsequent siblings)
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-08-04 17:40 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #5 from David Smith <dsmith at redhat dot com> ---
Here's disassembly output for 'free_pages' and 'free_pages.part.49':

====
# objdump -d --start-address=0x0000000000211910
--stop-address=0x0000000000211938
/usr/lib/debug/lib/modules/3.10.0-123.el7.s390x/vmlinux

/usr/lib/debug/lib/modules/3.10.0-123.el7.s390x/vmlinux:     file format
elf64-s390


Disassembly of section .text:

0000000000211910 <free_pages.part.49>:
  211910:    c4 18 00 39 29 34     lgrl    %r1,936b78 <vmemmap>
  211916:    ec 22 06 b9 3a 55     risbg    %r2,%r2,6,185,58
  21191c:    b9 08 00 21           agr    %r2,%r1
  211920:    c0 f4 ff ff ff b0     jg    211880 <__free_pages>
  211926:    07 07                 nopr    %r7

0000000000211928 <free_pages>:
  211928:    ec 26 00 04 00 7c     cgij    %r2,0,6,211930 <free_pages+0x8>
  21192e:    07 fe                 br    %r14
  211930:    c0 f4 ff ff ff f0     jg    211910 <free_pages.part.49>
  211936:    07 07                 nopr    %r7
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
                   ` (4 preceding siblings ...)
  2014-08-04 17:40 ` dsmith at redhat dot com
@ 2014-10-10  8:31 ` mcermak at redhat dot com
  2014-12-17 20:35 ` dsmith at redhat dot com
  2015-01-07 19:12 ` mcermak at redhat dot com
  7 siblings, 0 replies; 9+ messages in thread
From: mcermak at redhat dot com @ 2014-10-10  8:31 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

Martin Cermak <mcermak at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |mcermak at redhat dot com

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
                   ` (5 preceding siblings ...)
  2014-10-10  8:31 ` mcermak at redhat dot com
@ 2014-12-17 20:35 ` dsmith at redhat dot com
  2015-01-07 19:12 ` mcermak at redhat dot com
  7 siblings, 0 replies; 9+ messages in thread
From: dsmith at redhat dot com @ 2014-12-17 20:35 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

David Smith <dsmith at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|---                         |FIXED

--- Comment #6 from David Smith <dsmith at redhat dot com> ---
This has been fixed in the upstream kernel and the fix backported to RHEL7.
It should be fixed in kernels >= 3.10.0-155.el7.s390x. I just verified it
worked in 3.10.0-217.el7.s390x

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [Bug runtime/17140] systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
  2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
                   ` (6 preceding siblings ...)
  2014-12-17 20:35 ` dsmith at redhat dot com
@ 2015-01-07 19:12 ` mcermak at redhat dot com
  7 siblings, 0 replies; 9+ messages in thread
From: mcermak at redhat dot com @ 2015-01-07 19:12 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

--- Comment #7 from Martin Cermak <mcermak at redhat dot com> ---
Looks good using kernel-3.10.0-220.el7.s390x and stap based on commit 772e206.
Thank you.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2015-01-07 19:12 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-07-10 14:59 [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x dsmith at redhat dot com
2014-07-30 19:17 ` [Bug runtime/17140] " dsmith at redhat dot com
2014-07-31 17:58 ` dsmith at redhat dot com
2014-07-31 19:49 ` dsmith at redhat dot com
2014-08-04 16:08 ` dsmith at redhat dot com
2014-08-04 17:40 ` dsmith at redhat dot com
2014-10-10  8:31 ` mcermak at redhat dot com
2014-12-17 20:35 ` dsmith at redhat dot com
2015-01-07 19:12 ` mcermak at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).