This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug uprobes/13539] occasional oops, kernel SEGV, RHEL5, :uprobes:uprobe_free_process+0xba/0x131
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Fri, 27 Jan 2012 14:51:13 +0000
- Subject: [Bug uprobes/13539] occasional oops, kernel SEGV, RHEL5, :uprobes:uprobe_free_process+0xba/0x131
- Auto-submitted: auto-generated
- References: <bug-13539-6586@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=13539
--- Comment #10 from David Smith <dsmith at redhat dot com> 2012-01-27 14:51:13 UTC ---
(In reply to comment #9)
> (In reply to comment #8)
> > When testing this on RHEL6 (2.6.32-220.4.1.el6.x86_64.debug), I just saw the
> > following (which is still better than an oops):
> >
> > BUG: MAX_LOCKDEP_KEYS too low!
> > turning off the locking correctness validator.
>
> See the last section in linux/Documentation/lockdep-design.txt -- in summary,
> the leading causes are (1) every module load/unload leaks lock classes, and (2)
> statically initialized locks create separate classes.
>
> It might be possible for us to reduce the latter effect, but we can't help the
> former. Either way, it's not any sign that we have a problem, just that we've
> caused lockdep to exceed its internal maximum.
Right.
If that list of systemtap modules is loaded concurrently, I think I'll need to
look at the testcase. I'd bet that wasn't intended.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.