public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug runtime/24413] New: Running examples functioncallcount.stp twice cause crash on aarch64
@ 2019-04-02 20:43 wcohen at redhat dot com
  0 siblings, 0 replies; only message in thread
From: wcohen at redhat dot com @ 2019-04-02 20:43 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=24413

            Bug ID: 24413
           Summary: Running examples functioncallcount.stp twice cause
                    crash on aarch64
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: wcohen at redhat dot com
  Target Milestone: ---

I am not really sure this is a runtime, a translator, or kernel problem (maybe
the root cause is like pr17140).

When running the examples tests I noticed that functioncallcount.stp was
crashing on Fedora 29 running linux 5.0.5-200.fc29.aarch64 and the most recent
checkout from the SystemTap git repository (git commit c6920539893ec)

When triaging found that the first run of the following was successful and
print out counts:

 stap -w functioncallcount.stp "*@mm/*.c" -T 1

However, when the same script was run a second time:

$  stap -w functioncallcount.stp "*@mm/*.c" -T 1
[  261.743227] Unable to handle kernel write to read-only memory at virtual
address ffff8003c85d6100
[  261.752065] Mem abort info:
[  261.754856]   ESR = 0x9600004f
[  261.757895]   Exception class = DABT (current EL), IL = 32 bits
[  261.763790]   SET = 0, FnV = 0
[  261.766827]   EA = 0, S1PTW = 0
[  261.769950] Data abort info:
[  261.772814]   ISV = 0, ISS = 0x0000004f
[  261.776633]   CM = 0, WnR = 1
[  261.779587] swapper pgtable: 4k pages, 48-bit VAs, pgdp = 000000000a9df8c7
[  261.786444] [ffff8003c85d6100] pgd=00000043ffff7003, pud=00000043fe1ad003,
pmd=00000043fe16a003, pte=00e00043c85d6793
[  261.797012] Internal error: Oops: 9600004f [#1] SMP
[  261.801866] Modules linked in: vfat fat xgene_enet at803x xgene_hwmon
mdio_xgene xgene_edac crct10dif_ce xgene_rng mailbox_xgene_slimpro xfs
libcrc32c sdhci_of_arasan sdhci_pltfm gpio_dwapb sdhci i2c_xgene_slimpro cqhci
xhci_plat_hcd gpio_xgene_sb gpio_keys [last unloaded:
stap_4ff3d2b05e3adfbaf2d4b52c6a328bd5_8_1599]
[  261.829900] CPU: 3 PID: 1612 Comm: stap Tainted: G           OE    
5.0.5-200.fc29.aarch64 #1
[  261.838382] Hardware name: AppliedMicro X-Gene Mustang Board/X-Gene Mustang
Board, BIOS 3.07.05-rc Dec  5 2016
[  261.848334] pstate: 20400005 (nzCv daif +PAN -UAO)
[  261.853106] pc : allocate_slab+0x294/0x6e0
[  261.857181] lr : allocate_slab+0x268/0x6e0
[  261.861255] sp : ffff000015833a20
[  261.864551] x29: ffff000015833a20 x28: ffff8003c85d6100 
[  261.869836] x27: 0000000000000001 x26: 0000000000000002 
[  261.875121] x25: 0000000000000001 x24: 0000000000000020 
[  261.880405] x23: 0000000000002000 x22: ffff8003c85d6000 
[  261.885690] x21: ffff7e000f217580 x20: ffff8003c85d7200 
[  261.890973] x19: ffff8003d759f380 x18: 0000000000000000 
[  261.896258] x17: 0000000000004063 x16: 0000000000000000 
[  261.901543] x15: 0000000000000000 x14: 0000000000000000 
[  261.906828] x13: 0000000000000000 x12: 0000000000000000 
[  261.912112] x11: 00000040011ac000 x10: ffff00001170b000 
[  261.917397] x9 : ffff7e000f21dea0 x8 : 0000000000000000 
[  261.922681] x7 : 00000003fa3a0000 x6 : 0000000000000018 
[  261.927965] x5 : ffff00001177b208 x4 : ffff8003c85d7200 
[  261.933250] x3 : c8441274391fffc6 x2 : 0000000000000100 
[  261.938535] x1 : 0000000000000000 x0 : c8441274391fecc6 
[  261.943820] Process stap (pid: 1612, stack limit = 0x00000000a1af00f8)
[  261.950314] Call trace:
[  261.952748]  allocate_slab+0x294/0x6e0
[  261.956477]  new_slab+0x7c/0x88
[  261.959602]  ___slab_alloc+0x314/0x630
[  261.963331]  __slab_alloc+0x50/0x68
[  261.966801]  kmem_cache_alloc+0x204/0x230
[  261.970790]  __alloc_file+0x34/0xf0
[  261.974259]  alloc_empty_file+0x64/0x110
[  261.978161]  path_openat+0x38/0x238
[  261.981631]  do_filp_open+0x70/0xd0
[  261.985102]  do_sys_open+0x15c/0x1f8
[  261.988659]  __arm64_sys_openat+0x2c/0x38
[  261.992648]  el0_svc_common+0x94/0x108
[  261.996377]  el0_svc_handler+0x38/0x78
[  262.000107]  el0_svc+0x8/0xc
[  262.002974] Code: 9100075a aa1403e4 ca030000 ca140000 (f8216b80) 
[  262.009037] ---[ end trace a1df1da45a0afbbb ]---
Segmentation fault

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2019-04-02 20:43 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-04-02 20:43 [Bug runtime/24413] New: Running examples functioncallcount.stp twice cause crash on aarch64 wcohen at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).