From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 11315 invoked by alias); 22 Jan 2010 09:20:54 -0000 Received: (qmail 11248 invoked by uid 48); 22 Jan 2010 09:20:35 -0000 Date: Fri, 22 Jan 2010 09:20:00 -0000 Message-ID: <20100122092035.11247.qmail@sourceware.org> From: "pavan dot naregundi at in dot ibm dot com" To: systemtap@sources.redhat.com In-Reply-To: <20091020052448.10812.pavan.naregundi@in.ibm.com> References: <20091020052448.10812.pavan.naregundi@in.ibm.com> Reply-To: sourceware-bugzilla@sourceware.org Subject: [Bug runtime/10812] 2.6.32-rc5: Vector: 300 (Data Access) with systemtap tests X-Bugzilla-Reason: AssignedTo Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org X-SW-Source: 2010-q1/txt/msg00227.txt.bz2 ------- Additional Comments From pavan dot naregundi at in dot ibm dot com 2010-01-22 09:20 ------- Can recreate this with git (2.6.33-rc4-git5 ..6ccf80eb..). Here is the supporting info. stap_07505bf65828be510a2a08652a12f45b_4303: systemtap: 1.1/0.144, base: d0000000099f0000, memory: 29data/40text/145ctx/13net/24856alloc kb, probes: 4 Unable to handle kernel paging request for data at address 0xd000000001d02710 Faulting instruction address: 0xc00000000004460c Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=1024 DEBUG_PAGEALLOC NUMA pSeries Modules linked in: stap_5e64ec831c6c1c2fa9784d7081f8e5fa_7859 ipv6 fuse loop dm_mod sr_mod ibmveth cdrom sg sd_mod crc_t10dif ibmvscsic scsi_transport_srp scsi_tgt scsi_mod [last unloaded: stap_07505bf65828be510a2a08652a12f45b_4303] NIP: c00000000004460c LR: d000000009d563d4 CTR: 0000000000000014 REGS: c0000000e6513950 TRAP: 0300 Not tainted (2.6.33-rc4-git5-autotest) MSR: 8000000000009032 CR: 44000424 XER: 00000001 DAR: d000000001d02710, DSISR: 0000000040010000 TASK = c0000000ec9fc050[18734] 'stapio' THREAD: c0000000e6510000 CPU: 17 GPR00: 000000000000006b c0000000e6513bd0 c000000000bb1e70 000000000000009d GPR04: d000000001d0270f 0000000000000014 d000000009d59315 0000000000000000 GPR08: 000000000000e99c d000000009d59200 c000000010001d20 c0000000000445f4 GPR12: d000000009d58160 c000000000c85080 0000000010008f48 00000fffedd0aa60 GPR16: 0000000010022670 0000000010008af0 0000000010008ad0 0000000000000008 GPR20: 0000000010022890 0000000010008ea0 0000000010003954 000000001001b018 GPR24: 00000fffedd0aa64 0000000010022668 d000000009d591f8 d000000009d59b34 GPR28: d000000001d02724 d000000001cf8638 d000000009d629b8 d000000009d5a540 NIP [c00000000004460c] .memcmp+0x18/0x30 LR [d000000009d563d4] ._stp_ctl_write_cmd+0x45c/0x98c [stap_5e64ec831c6c1c2fa9784d7081f8e5fa_7859] Call Trace: [c0000000e6513bd0] [d000000009d562e0] ._stp_ctl_write_cmd+0x368/0x98c [stap_5e64ec831c6c1c2fa9784d7081f8e5fa_7859] (unreliable) [c0000000e6513ce0] [c000000000182cd8] .vfs_write+0xd0/0x1dc [c0000000e6513d80] [c000000000182eec] .SyS_write+0x58/0xa0 [c0000000e6513e30] [c0000000000085b4] syscall_exit+0x0/0x40 Instruction dump: 3883ffff 8c040001 2c000000 4082fff8 7c632050 4e800020 2c050000 40c10024 7ca903a6 38c3ffff 3884ffff 8c660001 <8c040001> 7c601851 4102fff4 4e800020 ---[ end trace 21b12feeeff20bee ]--- objdump of the corresponding module shows this following code 63b8: 7f 9d 2a 14 add r28,r29,r5 } /* build-id note payload start address */ /* XXX: But see https://bugzilla.redhat.com/show_bug.cgi?id=465872; dwfl_module_build_id was not intended to return the end address. */ notes_addr -= m->build_id_len; 63bc: e8 bf 00 7a lwa r5,120(r31) 63c0: 7c 85 e0 50 subf r4,r5,r28 if (notes_addr <= base_addr) /* shouldn't happen */ 63c4: 7f a4 e8 40 cmpld cr7,r4,r29 63c8: 40 9d ff 48 ble+ cr7,6310 <._stp_ctl_write_cmd+0x398> continue; if (memcmp(m->build_id_bits, (unsigned char*) notes_addr, m->build_id_len)) { 63cc: e8 7f 00 60 ld r3,96(r31) 63d0: 48 00 00 01 bl 63d0 <._stp_ctl_write_cmd+0x458> 63d0: R_PPC64_REL24 .memcmp 63d4: 60 00 00 00 nop 63d8: 2f a3 00 00 cmpdi cr7,r3,0 63dc: 41 9e ff 34 beq+ cr7,6310 <._stp_ctl_write_cmd+0x398> const char *basename; basename = strrchr(m->path, '/'); Attaching the objdump o/p. -- http://sourceware.org/bugzilla/show_bug.cgi?id=10812 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee.