Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 676408 - bt: WARNING: possibly bogus exception frame
bt: WARNING: possibly bogus exception frame
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: crash (Show other bugs)
5.6
x86_64 Linux
medium Severity medium
: rc
: ---
Assigned To: Dave Anderson
Han Pingtian
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2011-02-09 13:44 EST by Guy Streeter
Modified: 2016-02-09 20:33 EST (History)
4 users (show)

See Also:
Fixed In Version: crash-5.1.8-1.el5
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-02-21 00:51:56 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)
proposed (upstream) patch for crash-5.1.3 (962 bytes, patch)
2011-02-22 15:17 EST, Dave Anderson
no flags Details | Diff


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2012:0203 normal SHIPPED_LIVE crash bug fix and enhancement update 2012-02-20 09:53:43 EST

  None (edit)
Description Guy Streeter 2011-02-09 13:44:24 EST
crash> bt 19157
PID: 19157  TASK: ffff8102074080c0  CPU: 7   COMMAND: "dbench"
 #0 [ffff81023fcd1f20] crash_nmi_callback at ffffffff8007bce5
 #1 [ffff81023fcd1f40] do_nmi at ffffffff800658c5
 #2 [ffff81023fcd1f50] nmi at ffffffff80064eaf
    [exception RIP: ia32_sysenter_target]
    RIP: ffffffff80061408  RSP: 0000000000000000  RFLAGS: 00000046
    RAX: 0000000000000006  RBX: 0000000000000009  RCX: 0000000000000000
    RDX: 0000000000000005  RSI: 00000000ffdd0f29  RDI: 000000000804a9d5
    RBP: 00000000ffdd0e4c   R8: 0000000000000000   R9: 0000000000000000
    R10: 0000000000000000  R11: 0000000000000000  R12: 0000000000000000
    R13: 0000000000000000  R14: 0000000000000000  R15: 0000000000000000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
bt: WARNING: possibly bogus exception frame
--- <NMI exception stack> ---
 #3 [       0] ia32_sysenter_target at ffffffff80061408
bt: cannot transition from exception stack to current process stack:
    exception stack pointer: ffff81023fcd1f20
      process stack pointer: 0
         current stack base: ffff8101fc918000


I have verified the same behavior on the upstream crash program.

The vmcore and vmlinux files exhibiting this problem are on
megatron.gsslab.rdu.redhat.com
in
/cores/20110207033026/work
Comment 1 Dave Anderson 2011-02-09 14:04:41 EST
Right, and as we discussed, there's no conceivable reason that the RSP
should be zero.

So, given that it actually *is* a "possibly bogus exception frame", I'm
thinking that the crash behavior is more correct as it is than it would
be to artificially end the trace.
Comment 5 Dave Anderson 2011-02-22 15:17:44 EST
Created attachment 480234 [details]
proposed (upstream) patch for crash-5.1.3


FWIW, this is what I'm going with for the next upstream release.

With the patch, the bt output looks like this:

crash> bt
PID: 19157  TASK: ffff8102074080c0  CPU: 7   COMMAND: "dbench"
 #0 [ffff81023fcd1f20] crash_nmi_callback at ffffffff8007bce5
 #1 [ffff81023fcd1f40] do_nmi at ffffffff800658c5
 #2 [ffff81023fcd1f50] nmi at ffffffff80064eaf
    [exception RIP: ia32_sysenter_target]
    RIP: ffffffff80061408  RSP: 0000000000000000  RFLAGS: 00000046
    RAX: 0000000000000006  RBX: 0000000000000009  RCX: 0000000000000000
    RDX: 0000000000000005  RSI: 00000000ffdd0f29  RDI: 000000000804a9d5
    RBP: 00000000ffdd0e4c   R8: 0000000000000000   R9: 0000000000000000
    R10: 0000000000000000  R11: 0000000000000000  R12: 0000000000000000
    R13: 0000000000000000  R14: 0000000000000000  R15: 0000000000000000
    ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
--- <NMI exception stack> ---
 #3 [       0] ia32_sysenter_target at ffffffff80061408
crash> 

At this point it's unlikely that the crash utility will get
approval for a RHEL-5.7 errata release, especially since this
is such an extremely unlikely occurrance.  Plus it's really
quite harmless.
Comment 6 RHEL Product and Program Management 2011-05-31 11:34:58 EDT
This request was evaluated by Red Hat Product Management for
inclusion in the current release of Red Hat Enterprise Linux.
Because the affected component is not scheduled to be updated in the
current release, Red Hat is unfortunately unable to address this
request at this time. Red Hat invites you to ask your support
representative to propose this request, if appropriate and relevant,
in the next release of Red Hat Enterprise Linux.
Comment 7 Dave Anderson 2011-06-27 08:55:24 EDT
Han,

I have the vmcore/vmlinux -- can you set qa_ack+?
Comment 10 errata-xmlrpc 2012-02-21 00:51:56 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHBA-2012-0203.html

Note You need to log in before you can comment on or make changes to this bug.