Hi, I am seeing kernel crash after enabling utrace for systemtap user space support. My setup is : - Cross Instrumentation with user space trace support required. - Host : Running CentOS 5.4 with 2.6.18-164.el5 i686 - Target : Self compiled Kernel 2.6.32.10 i686
I applied three utrace patches on target kernel and enabled EXPERIMENTAL and UTRACE flags along with other systemtap flags. After doing this, whenever I run systemtap kernel profiling script, it crashes with following on serial. Am I missing any step ? (Also, after enabling EXPERIMENTAL, I saw some memory model related flags are enabled automatically which I believe don't affect kernel. ) Thanks, hp trace : BUG: unable to handle kernel NULL pointer dereference at 00000003 IP: [<c04ea10e>] __list_add+0xa/0x5c *pdpt = 0000000036814001 *pde = 0000000000000000 Oops: 0000 [#1] SMP last sysfs file: /sys/module/xt_tcpudp/sections/.text Modules linked in: topsys xt_mark xt_MARK xt_TCPMSS ipt_REJECT xt_tcpudp iptable _filter iptable_mangle ipt_vlan_routing ip_gre 8021q atsfilter atsvif force_frag ipt_CLSFY ip_tables x_tables rebrid_ioctl rebridging wncreg reg reg_table kcomm 2(P) meru_debug meru_util iTCO_wdt iTCO_vendor_support bonding igb Pid: 705, comm: monit Tainted: P W (2.6.32.10 #20) To Be Filled By O.E.M . EIP: 0060:[<c04ea10e>] EFLAGS: 00010286 CPU: 0 EIP is at __list_add+0xa/0x5c EAX: f1c797dc EBX: f1c79778 ECX: ffffffff EDX: f1c30660 ESI: f1c30660 EDI: f1c797dc EBP: f25c9f54 ESP: f25c9f48 DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 Process monit (pid: 705, ti=f25c8000 task=f756d350 task.ti=f25c8000) Stack: f1c79778 f1c30648 f1c79778 f25c9f64 c04842d4 f1c79778 f1c30648 f25c9f74 <0> c048438b 00000002 f2347d18 f25c9f50 c05b5538 f25c9fac c05b657e 00000002 <0> 00000001 00000000 00000002 00000001 00000000 00000000 c04e68c8 b7806424 Call Trace: [<c04842d4>] ? __d_instantiate+0x1b/0xaa [<c048438b>] ? d_instantiate+0x28/0x36 [<c05b5538>] ? sock_attach_fd+0x5f/0xab [<c05b657e>] ? sys_socketcall+0x55/0x178 [<c04e68c8>] ? trace_hardirqs_on_thunk+0xc/0x10 [<c0402898>] ? sysenter_do_call+0x12/0x36 Code: f3 ff 83 c4 14 8b 13 8b 43 04 89 42 04 89 10 c7 43 04 00 02 20 00 c7 03 00 01 10 00 8b 5d fc c9 c3 55 89 e5 57 89 c7 56 89 d6 53 <8b> 41 04 89 cb 39 d0 74 17 51 50 52 68 f1 51 72 c0 6a 1a 68 a6 EIP: [<c04ea10e>] __list_add+0xa/0x5c SS:ESP 0068:f25c9f48 CR2: 0000000000000003 ---[ end trace 7c8b87fe60b0346b ]---