public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
From: "dsmith at redhat dot com" <sourceware-bugzilla@sourceware.org>
To: systemtap@sourceware.org
Subject: [Bug runtime/17140] New: systemtap.examples/profiling/functioncallcount.stp causing kernel panic on s390x
Date: Thu, 10 Jul 2014 14:59:00 -0000	[thread overview]
Message-ID: <bug-17140-6586@http.sourceware.org/bugzilla/> (raw)

https://sourceware.org/bugzilla/show_bug.cgi?id=17140

            Bug ID: 17140
           Summary: systemtap.examples/profiling/functioncallcount.stp
                    causing kernel panic on s390x
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com
              Host: s390x

On RHEL7 (3.10.0-123.el7.s390x), when I run the following command:

====
# stap -v ../src/testsuite/systemtap.examples/profiling/functioncallcount.stp
"*@mm/*.c" -c "sleep 1"
Pass 1: parsed user script and 103 library script(s) using
143240virt/28188res/3092shr/25540data kb, in 130usr/20sys/442real ms.
WARNING: function mem_init is in blacklisted section: keyword at
../src/testsuite/systemtap.examples/profiling/functioncallcount.stp:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function paging_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_initrd_mem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function nopfault is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pfault_irq_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: kprobes function do_protection_exception is blacklisted: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: kprobes function do_dat_exception is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function fault_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_map_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmem_convert_memory_chunk is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmma_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmma is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_huge_pte_at is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function huge_pte_offset is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function huge_pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function absent_pages_in_range is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_per_cpu_pageset is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_area_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_area_init_nodes is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_with_active_regions is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmdline_parse_movablecore is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_alloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_pageblock_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function cmdline_parse_kernelcore is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function find_min_pfn_for_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_large_system_hash is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function node_map_pfn_alignment is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_dma_reserve is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_memory_present_with_active_regions is in blacklisted
section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function find_min_pfn_with_active_regions is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_writeback_init is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function swap_setup is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kswapd_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function shmem_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_vmstat is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function extfrag_debug_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bdi_class_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function default_bdi_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function set_mminit_loglevel is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mminit_verify_pageflags_layout is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mm_sysfs_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_embed_first_chunk is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_free_alloc_info is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_setup_first_chunk is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function percpu_init_late is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_dfl_fc_free is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_alloc_alloc_info is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function percpu_alloc_setup is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function pcpu_dfl_fc_alloc is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_per_cpu_areas is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_boot_cache is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function slab_proc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_kmalloc_caches is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function create_kmalloc_cache is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function workingset_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_zero_pfn is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function copy_pte_range is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __pte_alloc is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __pte_alloc_kernel is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function disable_randmaps is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mmap_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function special_mapping_fault is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function special_mapping_close is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function anon_vma_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmalloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function proc_vmalloc_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vm_area_add_early is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vm_area_register_early is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_nopanic is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function reserve_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootmem_bootmap_pages is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node_high is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_node_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low_node is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __free is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootmem_debug_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_late is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_bdata is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mark_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_core is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem_core is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function reserve_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_bootmem_core is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_all_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mark_bootmem_node is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ___alloc_bootmem_nopanic is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_node is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __reserve is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __alloc_bootmem_low_nopanic is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function free_bootmem is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_allow_resize is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_nid is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_base is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_phys_mem_size is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function __memblock_alloc_base is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function early_memblock is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_mem_size is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_is_reserved is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_enforce_memory_limit is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_base_nid is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memblock_alloc_try_nid is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function procswaps_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_frontswap is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_exit is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_nrpages_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_add_hstate is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_default_setup is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function alloc_bootmem_huge_page is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugetlb_hstate_alloc_pages is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_early_usemaps_alloc_node is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function memory_present is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function node_memmap_size_bytes is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function vmemmap_pte_populate is blacklisted: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function sparse_mem_maps_populate_node is in blacklisted section:
keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function ksm_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function slab_sysfs_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function bootstrap is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_debug is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_min_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kmem_cache_init_late is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_min_objects is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_max_order is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_slub_nomerge is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function kmem_cache_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function setup_transparent_hugepage is in blacklisted section: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function hugepage_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_move_charge_pte_range is blacklisted: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_count_precharge_pte_range is blacklisted: keyword
at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function mem_cgroup_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function enable_swap_account is in blacklisted section: keyword at
:7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function page_cgroup_init is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
WARNING: function init_cleancache is in blacklisted section: keyword at :7:1
 source: probe kernel.function(@1).call {  # probe functions listed on
commandline
         ^
Pass 2: analyzed script: 1536 probe(s), 7 function(s), 4 embed(s), 1 global(s)
using 179368virt/64488res/4284shr/61668data kb, in 710usr/340sys/6198real ms.
Pass 3: translated to C into
"/tmp/stapfAIHgx/stap_7f45c75080212845924364cc12433973_290793_src.c" using
179368virt/64836res/4608shr/61668data kb, in 150usr/40sys/271real ms.
Pass 4: compiled C into "stap_7f45c75080212845924364cc12433973_290793.ko" in
5700usr/790sys/7925real ms.
Pass 5: starting run.
====

I get the following kernel panic:

====
[  129.520018] Unable to handle kernel pointer dereference at virtual kernel
add
ress 000000f421d05000
[  129.520063] Oops: 003b [#1] SMP
[  129.520066] Modules linked in:
stap_7f45c75080212845924364cc12433973_2_2903(O
F) sg qeth_l2 vmur nfsd auth_rpcgss nfs_acl lockd sunrpc xfs libcrc32c
dasd_fba_
mod dasd_eckd_mod dasd_mod lcs ctcm fsm qeth qdio ccwgroup dm_mirror
dm_region_h
ash dm_log dm_mod
[  129.520093] CPU: 0 PID: 730 Comm: systemd-udevd Tainted: GF         
O-------
-------   3.10.0-123.el7.s390x #1
[  129.520097] task: 000000000165ecc0 ti: 000000007f040000 task.ti:
000000007f04
0000
[  129.520100] Krnl PSW : 0704e00180000000 000000000026cf7e
(__mem_cgroup_commit
_charge+0x4e/0x468)
[  129.520110]            R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0
EA:
3
Krnl GPRS: 0000000000000000 0000000000000001 000000f421d050d8 000000000000f420
[  129.520119]            000000f421d050d8 0000000000000001 0000000000000000
000
003d101912400
[  129.520189]            0000000000000001 0000000000000001 000000007ff79000
000
0000000000001
[  129.520196]            000003d101912400 00000000005cd340 000000000026cf6e
000
000007f043bb0
[  129.520205] Krnl Code: 000000000026cf6e: e320f0a00024        stg    
%r2,160(
%r15)
           000000000026cf74: a7190001           lghi    %r1,1
          #000000000026cf78: e340f0a00004       lg      %r4,160(%r15)
          >000000000026cf7e: e32040000004       lg      %r2,0(%r4)
           000000000026cf84: b9040032           lgr     %r3,%r2
           000000000026cf88: b9810031           ogr     %r3,%r1
           000000000026cf8c: eb2340000030       csg     %r2,%r3,0(%r4)
           000000000026cf92: a744fff9           brc     4,26cf84
[  129.520287] Call Trace:
[  129.520291] ([<000003ffff82f000>] 0x3ffff82f000)
[  129.520299]  [<000000000026f56e>] mem_cgroup_charge_common+0x9e/0xe0
[  129.520306]  [<0000000000234420>] do_wp_page+0x178/0xa80
[  129.520313]  [<0000000000237afe>] handle_mm_fault+0x7a6/0xe98
[  129.520318]  [<00000000005b3588>] 01: HCPGSP2629I The virtual machine is
plac
ed in CP mode due to a SIGP stop from
 CPU 01.
do_protection_exception+0x198/0x3d0
[  129.520367]  [<00000000005b1de6>] pgm_check_handler+0x17a/0x17e
[  129.520369]  [<000003fffd5b0900>] 0x3fffd5b0900
[  129.520371] Last Breaking-Event-Address:
[  129.520373]  [<0000000000271f6a>] lookup_page_cgroup+0x42/0x48
[  129.520400]
[  129.520403] Kernel panic - not syncing: Fatal exception: panic_on_oops
00: HCPGIR450W CP entered; disabled wait PSW 00020001 80000000 00000000
0010DEEE
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

             reply	other threads:[~2014-07-10 14:59 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-07-10 14:59 dsmith at redhat dot com [this message]
2014-07-30 19:17 ` [Bug runtime/17140] " dsmith at redhat dot com
2014-07-31 17:58 ` dsmith at redhat dot com
2014-07-31 19:49 ` dsmith at redhat dot com
2014-08-04 16:08 ` dsmith at redhat dot com
2014-08-04 17:40 ` dsmith at redhat dot com
2014-10-10  8:31 ` mcermak at redhat dot com
2014-12-17 20:35 ` dsmith at redhat dot com
2015-01-07 19:12 ` mcermak at redhat dot com

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-17140-6586@http.sourceware.org/bugzilla/ \
    --to=sourceware-bugzilla@sourceware.org \
    --cc=systemtap@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).