* [Bug runtime/24413] New: Running examples functioncallcount.stp twice cause crash on aarch64
@ 2019-04-02 20:43 wcohen at redhat dot com
0 siblings, 0 replies; only message in thread
From: wcohen at redhat dot com @ 2019-04-02 20:43 UTC (permalink / raw)
To: systemtap
https://sourceware.org/bugzilla/show_bug.cgi?id=24413
Bug ID: 24413
Summary: Running examples functioncallcount.stp twice cause
crash on aarch64
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
Assignee: systemtap at sourceware dot org
Reporter: wcohen at redhat dot com
Target Milestone: ---
I am not really sure this is a runtime, a translator, or kernel problem (maybe
the root cause is like pr17140).
When running the examples tests I noticed that functioncallcount.stp was
crashing on Fedora 29 running linux 5.0.5-200.fc29.aarch64 and the most recent
checkout from the SystemTap git repository (git commit c6920539893ec)
When triaging found that the first run of the following was successful and
print out counts:
stap -w functioncallcount.stp "*@mm/*.c" -T 1
However, when the same script was run a second time:
$ stap -w functioncallcount.stp "*@mm/*.c" -T 1
[ 261.743227] Unable to handle kernel write to read-only memory at virtual
address ffff8003c85d6100
[ 261.752065] Mem abort info:
[ 261.754856] ESR = 0x9600004f
[ 261.757895] Exception class = DABT (current EL), IL = 32 bits
[ 261.763790] SET = 0, FnV = 0
[ 261.766827] EA = 0, S1PTW = 0
[ 261.769950] Data abort info:
[ 261.772814] ISV = 0, ISS = 0x0000004f
[ 261.776633] CM = 0, WnR = 1
[ 261.779587] swapper pgtable: 4k pages, 48-bit VAs, pgdp = 000000000a9df8c7
[ 261.786444] [ffff8003c85d6100] pgd=00000043ffff7003, pud=00000043fe1ad003,
pmd=00000043fe16a003, pte=00e00043c85d6793
[ 261.797012] Internal error: Oops: 9600004f [#1] SMP
[ 261.801866] Modules linked in: vfat fat xgene_enet at803x xgene_hwmon
mdio_xgene xgene_edac crct10dif_ce xgene_rng mailbox_xgene_slimpro xfs
libcrc32c sdhci_of_arasan sdhci_pltfm gpio_dwapb sdhci i2c_xgene_slimpro cqhci
xhci_plat_hcd gpio_xgene_sb gpio_keys [last unloaded:
stap_4ff3d2b05e3adfbaf2d4b52c6a328bd5_8_1599]
[ 261.829900] CPU: 3 PID: 1612 Comm: stap Tainted: G OE
5.0.5-200.fc29.aarch64 #1
[ 261.838382] Hardware name: AppliedMicro X-Gene Mustang Board/X-Gene Mustang
Board, BIOS 3.07.05-rc Dec 5 2016
[ 261.848334] pstate: 20400005 (nzCv daif +PAN -UAO)
[ 261.853106] pc : allocate_slab+0x294/0x6e0
[ 261.857181] lr : allocate_slab+0x268/0x6e0
[ 261.861255] sp : ffff000015833a20
[ 261.864551] x29: ffff000015833a20 x28: ffff8003c85d6100
[ 261.869836] x27: 0000000000000001 x26: 0000000000000002
[ 261.875121] x25: 0000000000000001 x24: 0000000000000020
[ 261.880405] x23: 0000000000002000 x22: ffff8003c85d6000
[ 261.885690] x21: ffff7e000f217580 x20: ffff8003c85d7200
[ 261.890973] x19: ffff8003d759f380 x18: 0000000000000000
[ 261.896258] x17: 0000000000004063 x16: 0000000000000000
[ 261.901543] x15: 0000000000000000 x14: 0000000000000000
[ 261.906828] x13: 0000000000000000 x12: 0000000000000000
[ 261.912112] x11: 00000040011ac000 x10: ffff00001170b000
[ 261.917397] x9 : ffff7e000f21dea0 x8 : 0000000000000000
[ 261.922681] x7 : 00000003fa3a0000 x6 : 0000000000000018
[ 261.927965] x5 : ffff00001177b208 x4 : ffff8003c85d7200
[ 261.933250] x3 : c8441274391fffc6 x2 : 0000000000000100
[ 261.938535] x1 : 0000000000000000 x0 : c8441274391fecc6
[ 261.943820] Process stap (pid: 1612, stack limit = 0x00000000a1af00f8)
[ 261.950314] Call trace:
[ 261.952748] allocate_slab+0x294/0x6e0
[ 261.956477] new_slab+0x7c/0x88
[ 261.959602] ___slab_alloc+0x314/0x630
[ 261.963331] __slab_alloc+0x50/0x68
[ 261.966801] kmem_cache_alloc+0x204/0x230
[ 261.970790] __alloc_file+0x34/0xf0
[ 261.974259] alloc_empty_file+0x64/0x110
[ 261.978161] path_openat+0x38/0x238
[ 261.981631] do_filp_open+0x70/0xd0
[ 261.985102] do_sys_open+0x15c/0x1f8
[ 261.988659] __arm64_sys_openat+0x2c/0x38
[ 261.992648] el0_svc_common+0x94/0x108
[ 261.996377] el0_svc_handler+0x38/0x78
[ 262.000107] el0_svc+0x8/0xc
[ 262.002974] Code: 9100075a aa1403e4 ca030000 ca140000 (f8216b80)
[ 262.009037] ---[ end trace a1df1da45a0afbbb ]---
Segmentation fault
--
You are receiving this mail because:
You are the assignee for the bug.
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2019-04-02 20:43 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-04-02 20:43 [Bug runtime/24413] New: Running examples functioncallcount.stp twice cause crash on aarch64 wcohen at redhat dot com
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).