This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

Re: Results of systemtap-20071215 snapshot on ia64


Masami Hiramatsu wrote:
Hi Will,

William Cohen wrote:
FAIL: backtrace of yyy_func4.return (0)
FAIL: print_stack of yyy_func4.return (0)

Could you show me the error log in systemtap.log about this testcase? I saw a patch which fixes this bug was merged into 2.6.24-rc5. So I expected it would pass on 2.6.24-rc5.

Thank you,


Do you have a pointer to the patch that is suppose to fix this? Below is the output from the systemtap.log file related to those tests.


-Will


backtrace from module("systemtap_test_module2").function("yyy_func3@/home/wcohen/stap_snap_200712152157/src/testsuite/systemtap.context/stapte:


0xa000000200af0020 : yyy_func3+0x0/0x60 [systemtap_test_module2]
0xa000000200af0020 : yyy_func3+0x0/0x60 [systemtap_test_module2]
0xa000000200af00b0 : yyy_func2+0x30/0x60 [systemtap_test_module2]
0xa000000200af0110 : yyy_func1+0x30/0x60 [systemtap_test_module2]
0xa000000200ac8220 : stm_write_cmd+0x100/0x0 [systemtap_test_module1]
0xa0000001001ebaa0 : proc_reg_write+0x120/0x160 []
0xa0000001001664d0 : vfs_write+0x1d0/0x320 []
0xa000000100166f50 : sys_write+0x70/0xe0 []
0xa00000010000b2d0 : ia64_trace_syscall+0xd0/0x110 []
0xa000000000010720
--------
the call stack is 0xa000000200af0020 0xa000000200af00b0 0xa000000200af0110 0xa000000200ac8220 0xa0000001001ebaa0 0xa0000001001664d0 0xa0000001001
--------
0xa000000200af0020 : yyy_func3+0x0/0x60 [systemtap_test_module2]
0xa000000200af00b0 : yyy_func2+0x30/0x60 [systemtap_test_module2]
0xa000000200af0110 : yyy_func1+0x30/0x60 [systemtap_test_module2]
0xa000000200ac8220 : stm_write_cmd+0x100/0x0 [systemtap_test_module1]
0xa0000001001ebaa0 : proc_reg_write+0x120/0x160 []
0xa0000001001664d0 : vfs_write+0x1d0/0x320 []
0x00000a0000001001
--------
backtrace from module("systemtap_test_module2").function("yyy_func4@/home/wcohen/stap_snap_200712152157/src/testsuite/systemtap.context/stapte:


Returning from: 0xa000000200af0000 : yyy_func4+0x0/0x20 [systemtap_test_module2]
Returning to : 0xa000000200af0050 : yyy_func3+0x30/0x60 [systemtap_test_module2]
0xa000000200af0050 : yyy_func3+0x30/0x60 [systemtap_test_module2]
0xa000000200af00b0 : yyy_func2+0x30/0x60 [systemtap_test_module2]
0xa000000200af0110 : yyy_func1+0x30/0x60 [systemtap_test_module2]
0xa000000200ac8220 : stm_write_cmd+0x100/0x0 [systemtap_test_module1]
0xa0000001001ebaa0 : proc_reg_write+0x120/0x160 []
0xa0000001001664d0 : vfs_write+0x1d0/0x320 []
0xa000000100166f50 : sys_write+0x70/0xe0 []
0xa00000010000b2d0 : ia64_trace_syscall+0xd0/0x110 []
0xa000000000010720
--------
the return stack is 0xa000000200af0050 0xa000000200af00b0 0xa000000200af0110 0xa000000200ac8220 0xa0000001001ebaa0 0xa0000001001664d0 0xa0000001001
--------
0xa000000200af0050 : yyy_func3+0x30/0x60 [systemtap_test_module2]
0xa000000200af00b0 : yyy_func2+0x30/0x60 [systemtap_test_module2]
0xa000000200af0110 : yyy_func1+0x30/0x60 [systemtap_test_module2]
0xa000000200ac8220 : stm_write_cmd+0x100/0x0 [systemtap_test_module1]
0xa0000001001ebaa0 : proc_reg_write+0x120/0x160 []
0xa0000001001664d0 : vfs_write+0x1d0/0x320 []
0x00000a0000001001
--------
backtrace from timer.profile:
0x200000000021c280
--------
the profile stack is 0x200000000021c280
--------
0x200000000021c280
--------
PASS: backtrace of yyy_func3
PASS: print_stack of yyy_func3
FAIL: backtrace of yyy_func4.return (0)
FAIL: print_stack of yyy_func4.return (0)
PASS: backtrace of timer.profile
PASS: print_stack of timer.profile
READY



Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]