From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10510 invoked by alias); 9 Aug 2013 15:21:03 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 10485 invoked by uid 89); 9 Aug 2013 15:21:02 -0000 X-Spam-SWARE-Status: No, score=-7.3 required=5.0 tests=AWL,BAYES_20,KHOP_PGP_SIGNED,RCVD_IN_HOSTKARMA_W,RCVD_IN_HOSTKARMA_WL,RDNS_NONE,SPF_HELO_PASS,SPF_PASS autolearn=no version=3.3.1 Received: from Unknown (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.84/v0.84-167-ge50287c) with ESMTP; Fri, 09 Aug 2013 15:21:01 +0000 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id r79FKqUs032612 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Fri, 9 Aug 2013 11:20:52 -0400 Received: from redhat.com (dhcp-10-15-16-136.yyz.redhat.com [10.15.16.136]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id r79FKmED017762 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Fri, 9 Aug 2013 11:20:51 -0400 Date: Fri, 09 Aug 2013 15:21:00 -0000 From: Lukas Berk To: Holger Brunck Cc: Mark Wielaard , systemtap@sourceware.org Subject: Re: print_ubacktrace() and ppc 32 Message-ID: <20130809152046.GD2101@redhat.com> Reply-To: Lukas Berk References: <51BF1C1E.7020208@keymile.com> <1371491014.4501.97.camel@bordewijk.wildebeest.org> <20130617180008.GC2219@redhat.com> <1371492348.4501.106.camel@bordewijk.wildebeest.org> <51C005AA.8010300@keymile.com> <20130803011202.GA1956@redhat.com> <51FF6667.1090404@keymile.com> <20130806190715.GA3387@redhat.com> <5201F432.3000800@keymile.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="Ycz6tD7Th1CMF4v7" Content-Disposition: inline In-Reply-To: <5201F432.3000800@keymile.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-Virus-Found: No X-SW-Source: 2013-q3/txt/msg00112.txt.bz2 --Ycz6tD7Th1CMF4v7 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable Content-length: 2988 Hey, I quickly discussed this with Mark, comments inline. [...] >=20 > probe compiled with: > stap -DDEBUG_UNWIND=3D99 -g -a powerpc -B CROSS_COMPILE=3Dpowerpc-linux- = script.stp >=20 Looks good. > On the target the trace output of staprun is: >=20 > _stp_stack_unwind_one_user:460: STARTING user unwind > 0x10000448 : foo+0x1c/0x7c [/usr/local/bin/main] > _stp_stack_unwind_one_user:476: CONTINUING user unwind to depth 1 > unwind:1452: pc=3D10000448, 10000448 > unwind:1492: trying debug_frame > unwind_frame:1168: Module /usr/local/bin/main: no unwind frame data > unwind:1496: debug_frame failed: -5, trying eh_frame > unwind_frame:1168: Module /usr/local/bin/main: no unwind frame data > unwind:1504: unwinding failed: -5 > _stp_stack_unwind_one_user:500: ret=3D-5 PC=3D10000448 SP=3Dbfffd640 I'm going to assume debuginfo is present, but if stap can't find the debug_frame or eh_frame, the unwinder shouldn't continue. >=20 > And the probed binary is crashing: >=20 > stap_ac60c2e404cade1c833497ae4f16b820_1577: systemtap: 2.3/0.152, base: > cc581000, memory: 34data/68text/3ctx/2058net/8alloc kb, probes: 1 > Unable to handle kernel paging request for data at address 0xbffffb10 > Faulting instruction address: 0xc04965d4 > Oops: Kernel access of bad area, sig: 11 [#2] > PREEMPT km82xx > Modules linked in: stap_ac60c2e404cade1c833497ae4f16b820_1577(O) [last un= loaded: > stap_ac60c2e404cade1c833497ae4f16b820_1577] > CPU: 0 PID: 407 Comm: main Tainted: G D O 3.10.0-04826-gc82c8d0-d= irty #7 > task: c7bab160 ti: c7b8c000 task.ti: c7b8c000 > NIP: c04965d4 LR: c0000028 CTR: c03c742c > REGS: c7b8de10 TRAP: 0300 Tainted: G D O (3.10.0-04826-gc82c8d= 0-dirty) > MSR: 00009032 CR: 44000284 XER: 20000000 > DAR: bffffb10, DSISR: 20000000 >=20 > GPR00: c00bd950 c7b8dec0 c7bab160 c69d2104 c7b8df50 00000002 cc902209 382= 05350 > GPR08: c0000000 c050b668 00000000 3b9aca00 28000288 10018794 00000000 000= 00000 > GPR16: 00000000 00000000 00000000 00000000 100ab3f5 10081f20 c0440928 000= 00000 > GPR24: c69d20d0 c69d2104 c69d20c0 00000000 c7b8c000 c7b8df50 c0000028 000= 00002 > NIP [c04965d4] prom_init+0x28/0xfc0 > LR [c0000028] __start+0x1c/0x30 > Call Trace: > [c7b8dec0] [c00bd950] uprobe_notify_resume+0x4dc/0x920 (unreliable) > [c7b8df30] [c00099b0] do_notify_resume+0x78/0x94 > [c7b8df40] [c0010848] do_user_signal+0x74/0xc4 > --- Exception: 700 at 0x10000448 > LR =3D 0x100004ec > Instruction dump: > 9361004c 7cbb2b78 93a10054 7c9d2378 93c10058 7fc802a6 93e1005c 7cbf2b78 > 90010064 91c10018 93810050 91810014 <821efae8> 823eff98 88040000 829efaec > ---[ end trace e21ded4f2ec79037 ]--- >=20 > Segmentation fault >=20 > Version numbers: > Kernel: v3.10 > gcc: powerpc-gcc (GCC) 4.6.4 20120303 (prerelease) > systemtap: 2.3-32645 Ouch, would you mind running a simple hello world style probe? Along the lines of 'probe process.function("main") {log("Hello")}' and seeing if that runs properly? Thanks for testing, Lukas --Ycz6tD7Th1CMF4v7 Content-Type: application/pgp-signature Content-length: 836 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJSBQjOAAoJEAaRCclx+kwJJJUP+wST0uB2oOcMYOFKoiQnlvD8 ndxmniqYZQscur9oeB6VvHsnUBf47nc5h333yjqDNeoMOfso5MrMde8WQQOKst+n bNO4elLweVfIj6CYdDwoBCWQJ2fOkdWeM9wFev9t03QK6m/XOj6fr3hxW7LDgkrW TBQ15PYqgsOB9LkIZ6HG09o9yduuIqgoGFReOE7h5i/9b3eK4TEHy6ntdsDIwv/g cgJd/5kint14ZO0IH0Rjf/u50vksEjQKOmBpDu2wR+NMSBaCEWsYdjlOjOKdGYUy on9x25WVZMVjo3a0UKGVKW8nEEJjGTwMDTrlcieQp5Nno02RR0oFn/6JAy89zxF9 5wmWcxbe4N+rVWDVbH88RhrIUiAtuZmmN989kktvNNn/5Z/ZmEvWX9pac0N3dS1x 3W2bJ8lxwjSv2+5tIr1+lMu/MDowBw5f3oRB2sAIxJvjDRgypECWGMLO/DfFs1N8 Yewam0s1BCN3o9U6o9KkF2NGiAfDAzzsFR87EaeKF43KS0YAurKb8UHZjD2VvhPo P6KBDj7fHWu/rcpxVgHcxfAYV0wN/9VH7Dd/EVykiD+KND9zHUNvZKqAaiZ/Q9cc f8XiF1P2xJo2eTGQ21CcWsNIWq/l0Ie6D9v9f9Wpu5+RmzXGZqTAhYUMLIZxl786 GkksAlvNS8j0cTwkj6zJ =FF0t -----END PGP SIGNATURE----- --Ycz6tD7Th1CMF4v7--