This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug uprobes/13539] occasional oops, kernel SEGV, RHEL5, :uprobes:uprobe_free_process+0xba/0x131
- From: "jistone at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Thu, 26 Jan 2012 22:57:36 +0000
- Subject: [Bug uprobes/13539] occasional oops, kernel SEGV, RHEL5, :uprobes:uprobe_free_process+0xba/0x131
- Auto-submitted: auto-generated
- References: <bug-13539-6586@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=13539
Josh Stone <jistone at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |jistone at redhat dot com
--- Comment #9 from Josh Stone <jistone at redhat dot com> 2012-01-26 22:57:36 UTC ---
(In reply to comment #8)
> When testing this on RHEL6 (2.6.32-220.4.1.el6.x86_64.debug), I just saw the
> following (which is still better than an oops):
>
> BUG: MAX_LOCKDEP_KEYS too low!
> turning off the locking correctness validator.
See the last section in linux/Documentation/lockdep-design.txt -- in summary,
the leading causes are (1) every module load/unload leaks lock classes, and (2)
statically initialized locks create separate classes.
It might be possible for us to reduce the latter effect, but we can't help the
former. Either way, it's not any sign that we have a problem, just that we've
caused lockdep to exceed its internal maximum.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.