public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
From: "dsmith at redhat dot com" <sourceware-bugzilla@sourceware.org>
To: systemtap@sourceware.org
Subject: [Bug runtime/12645] exelib.exp failures (and hung stapio's) on s390x
Date: Mon, 18 Apr 2011 22:32:00 -0000	[thread overview]
Message-ID: <bug-12645-6586-HizUkNOoqn@http.sourceware.org/bugzilla/> (raw)
In-Reply-To: <bug-12645-6586@http.sourceware.org/bugzilla/>

http://sourceware.org/bugzilla/show_bug.cgi?id=12645

--- Comment #4 from David Smith <dsmith at redhat dot com> 2011-04-18 22:31:21 UTC ---
Here's a run (with a non-prelinked .so) adding DEBUG_TASK_FINDER_VMA:

============
# stap -v -w -DDEBUG_TASK_FINDER_VMA -DDEBUG_UPROBES --ldd
/root/src/testsuite/systemtap.exelib/mark.stp
./uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
./libuprobeslibgcc-O3default-prelink-debug.so -c
./uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
Pass 1: parsed user script and 76 library script(s) using
125672virt/21744res/2648shr kb, in 190usr/20sys/805real ms.
Pass 2: analyzed script: 2 probe(s), 0 function(s), 0 embed(s), 0 global(s)
using 126220virt/22884res/3224shr kb, in 10usr/0sys/41real ms.
Pass 3: translated to C into
"/tmp/stapBCJPs1/stap_21b14b43fda22050ae3798a72081e5a8_1932.c" using
200076virt/23500res/3584shr kb, in 100usr/210sys/5099real ms.
Pass 4: compiled C into "stap_21b14b43fda22050ae3798a72081e5a8_1932.ko" in
3110usr/510sys/9289real ms.
Pass 5: starting run.
stap_uprobe_process_munmap:334: +proc pid 2227 stf 000003c0018895f0
000003c0018895f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x80000000  0xb000  0x0 
r-xp  /usr/local/libexec/systemtap/stapio
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x8000b000  0x1000 
0xb000  rwxp  /usr/local/libexec/systemtap/stapio
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad4ef000  0x21000 
0x0  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad510000  0x1000 
0x20000  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad511000  0x1000 
0x21000  rwxp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad519000  0x1ad000 
0x0  r-xp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6c6000  0x4000 
0x1ac000  r-xp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6ca000  0x1000 
0x1b0000  rwxp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6d9000  0x1c000 
0x0  r-xp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6f5000  0x1000 
0x1c000  r-xp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6f6000  0x1000 
0x1d000  rwxp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x20000014000  0x5e91000 
0x0  r-xp  /usr/lib/locale/locale-archive
stap_uprobe_process_munmap:334: -proc pid 2227 stf 000003c0018895f0
000003c0018895f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_process_munmap:334: +proc pid 2227 stf 000003c0018895f0
000003c0018895f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x80000000  0x1000  0x0 
r-xp 
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x80001000  0x1000  0x0 
rwxp 
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad4ef000  0x21000 
0x0  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad510000  0x2000 
0x20000  rwxp  /lib64/ld-2.12.so
stap_uprobe_process_found:257: +proc pid 2227 stf 000003c001889528
000003c001889528 path
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
stap_uprobe_change_plus:67: +uprobe spec 0 idx 0 process uprobesgcc-O3de[2227]
addr 0000000080000688 pp
process("/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe").statement(0x80000688)
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000002000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000003000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000005000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x20000005000  0x2000 
0x0  r-xp  /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_mmap_found:292: +mmap X pid 2227 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000020000005000
length 8192 offset (null) stf 000003c0018895f0 000003c0018895f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_change_plus:67: +uprobe spec 1 idx 1 process uprobesgcc-O3de[2227]
addr 0000020000005614 pp
process("/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so").statement(0x614)
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000006000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x20000006000  0x1000 
0x0  rwxp  /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_mmap_found:292: +mmap X pid 2227 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000020000006000
length 4096 offset (null) stf 000003c0018895f0 000003c0018895f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_change_plus:67: +uprobe spec 1 idx 2 process uprobesgcc-O3de[2227]
addr 0000020000006614 pp
process("/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so").statement(0x614)
stap_uprobe_mmap_found:307: +mmap W pid 2227 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000020000006000
length 4096 offset (null) stf 000003c0018895f0 000003c0018895f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000007000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x20000007000  0xd000 
0x0  r-xp  /etc/ld.so.cache
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x4aad6fd000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6fd000  0xa6000 
0x0  r-xp  /lib64/libm-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x4aad7a1000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad7a1000  0x2000 
0xa3000  rwxp  /lib64/libm-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x4aad519000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad519000  0x1b7000 
0x0  r-xp  /lib64/libc-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x4aad6c6000
__stp_call_mmap_callbacks:611: pid 2227, a/l/o/p/path 0x4aad6c6000  0x5000 
0x1ac000  rwxp  /lib64/libc-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x4aad6cb000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000014000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found mmap(0x0),
returned 0x20000015000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2227 found
munmap(0x20000007000), returned 0x0
stap_uprobe_munmap_found:322: -mmap pid 2227 addr 0000020000007000 length 49422
stf 000003c0018895f0 000003c0018895f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
main_count: 3
main_count: 2
main_count: 1
func_count: 3
func_count: 2
func_count: 1
stap_uprobe_process_munmap:334: -proc pid 2227 stf 000003c0018895f0
000003c0018895f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_process_found:257: -proc pid 2227 stf 000003c001889528
000003c001889528 path
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
systemtap_module_exit:719: -uprobe spec 0 index 0 pid 2227 addr
0000000080000688
systemtap_module_exit:719: -uprobe spec 1 index 1 pid 2227 addr
0000020000005614
systemtap_module_exit:719: -uprobe spec 1 index 2 pid 2227 addr
0000020000006614
Pass 5: run completed in 10usr/60sys/225real ms.
============

Here's a failing run after prelinking:

============
# stap -v -w -DDEBUG_TASK_FINDER_VMA -DDEBUG_UPROBES --ldd
/root/src/testsuite/systemtap.exelib/mark.stp
./uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
./libuprobeslibgcc-O3default-prelink-debug.so -c
./uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
Pass 1: parsed user script and 76 library script(s) using
125672virt/21744res/2648shr kb, in 180usr/10sys/253real ms.
Pass 2: analyzed script: 2 probe(s), 0 function(s), 0 embed(s), 0 global(s)
using 126220virt/22884res/3224shr kb, in 10usr/0sys/7real ms.
Pass 3: translated to C into
"/tmp/stapiM5Oh7/stap_60fe9b07c681cb8fbcbbaa2de526f0d3_1940.c" using
200076virt/23504res/3588shr kb, in 90usr/60sys/155real ms.
Pass 4: compiled C into "stap_60fe9b07c681cb8fbcbbaa2de526f0d3_1940.ko" in
3070usr/450sys/3742real ms.
Pass 5: starting run.
stap_uprobe_process_munmap:334: +proc pid 2670 stf 000003c001bae5f0
000003c001bae5f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x80000000  0xb000  0x0 
r-xp  /usr/local/libexec/systemtap/stapio
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x8000b000  0x1000 
0xb000  rwxp  /usr/local/libexec/systemtap/stapio
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad4ef000  0x21000 
0x0  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad510000  0x1000 
0x20000  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad511000  0x1000 
0x21000  rwxp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad519000  0x1ad000 
0x0  r-xp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6c6000  0x4000 
0x1ac000  r-xp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6ca000  0x1000 
0x1b0000  rwxp  /lib64/libc-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6d9000  0x1c000 
0x0  r-xp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6f5000  0x1000 
0x1c000  r-xp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6f6000  0x1000 
0x1d000  rwxp  /lib64/libpthread-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x20000014000  0x5e91000 
0x0  r-xp  /usr/lib/locale/locale-archive
stap_uprobe_process_munmap:334: -proc pid 2670 stf 000003c001bae5f0
000003c001bae5f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_process_munmap:334: +proc pid 2670 stf 000003c001bae5f0
000003c001bae5f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x80000000  0x1000  0x0 
r-xp 
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x80001000  0x1000  0x0 
rwxp 
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad4ef000  0x21000 
0x0  r-xp  /lib64/ld-2.12.so
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad510000  0x2000 
0x20000  rwxp  /lib64/ld-2.12.so
stap_uprobe_process_found:257: +proc pid 2670 stf 000003c001bae528
000003c001bae528 path
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
stap_uprobe_change_plus:67: +uprobe spec 0 idx 0 process uprobesgcc-O3de[2670]
addr 0000000080000688 pp
process("/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe").statement(0x80000688)
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x20000002000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x20000003000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x6400000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x6400000  0x2000  0x0 
r-xp  /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_mmap_found:292: +mmap X pid 2670 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000000006400000
length 8192 offset (null) stf 000003c001bae5f0 000003c001bae5f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_change_plus:67: +uprobe spec 1 idx 1 process uprobesgcc-O3de[2670]
addr 0000000006400614 pp
process("/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so").statement(0x6400614)
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x6401000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x6401000  0x1000  0x0 
rwxp  /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_mmap_found:292: +mmap X pid 2670 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000000006401000
length 4096 offset (null) stf 000003c001bae5f0 000003c001bae5f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_change_plus:67: +uprobe spec 1 idx 1 process uprobesgcc-O3de[2670]
addr 0000000006401614 pp
process("/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so").statement(0x6400614)
stap_uprobe_mmap_found:307: +mmap W pid 2670 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so addr 0000000006401000
length 4096 offset (null) stf 000003c001bae5f0 000003c001bae5f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x20000005000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x20000005000  0xd000 
0x0  r-xp  /etc/ld.so.cache
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x4aad6fd000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6fd000  0xa6000 
0x0  r-xp  /lib64/libm-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x4aad7a1000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad7a1000  0x2000 
0xa3000  rwxp  /lib64/libm-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x4aad519000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad519000  0x1b7000 
0x0  r-xp  /lib64/libc-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x4aad6c6000
__stp_call_mmap_callbacks:611: pid 2670, a/l/o/p/path 0x4aad6c6000  0x5000 
0x1ac000  rwxp  /lib64/libc-2.12.so
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x4aad6cb000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x20000012000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found mmap(0x0),
returned 0x20000013000
__stp_utrace_task_finder_target_syscall_exit:1435: tsk 2670 found
munmap(0x20000005000), returned 0x0
stap_uprobe_munmap_found:322: -mmap pid 2670 addr 0000020000005000 length 49422
stf 000003c001bae5f0 000003c001bae5f0 path
/root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
main_count: 3
main_count: 2
main_count: 1
stap_uprobe_process_munmap:334: -proc pid 2670 stf 000003c001bae5f0
000003c001bae5f0 path /root/s390x/libuprobeslibgcc-O3default-prelink-debug.so
stap_uprobe_process_found:257: -proc pid 2670 stf 000003c001bae528
000003c001bae528 path
/root/s390x/uprobesgcc-O3default-debug-uprobeslibgcc-O3default-prelink-debug_exe
systemtap_module_exit:719: -uprobe spec 0 index 0 pid 2670 addr
0000000080000688
============

-- 
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

  parent reply	other threads:[~2011-04-18 22:32 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2011-04-06 20:08 [Bug runtime/12645] New: " dsmith at redhat dot com
2011-04-18 19:21 ` [Bug runtime/12645] " dsmith at redhat dot com
2011-04-18 21:22 ` dsmith at redhat dot com
2011-04-18 22:12 ` dsmith at redhat dot com
2011-04-18 22:32 ` dsmith at redhat dot com [this message]
2011-04-18 23:49 ` jistone at redhat dot com
2011-04-20 19:12 ` dsmith at redhat dot com

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-12645-6586-HizUkNOoqn@http.sourceware.org/bugzilla/ \
    --to=sourceware-bugzilla@sourceware.org \
    --cc=systemtap@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).