On Fri, May 17, 2013 at 5:56 PM, Truong (Tru) Vu <[email protected]> wrote: > After turned on MALLOCDEBUG on AIX, GPFS command got core dump. It is > running with ksh Version JM 93t+ 2010-06-21. > > # export MALLOCDEBUG=catch_overflow,validate_ptrs > > Segmentation fault in readdir64 at 0xd02358dc > 0xd02358dc (readdir64+0x9c) 901f0020 stw r0,0x20(r31) > (dbx) where > readdir64(??) at 0xd02358dc > gl_dirnext(0x2ff138d8, 0x2003afe0) at 0x100d3954 > glob_dir(0x2ff138d8, 0x20036380) at 0x100d2954 > glob.glob(0x20036359, 0xb850, 0x0, 0x2ff138d8) at 0x100d34b8 > path_expand(0x20036359, 0x2ff13c94) at 0x100d0be4 > path_generate(0x0, 0x2ff13c94) at 0x100d1258 > endfield(0x200300c8, 0x0) at 0x100c6b38 > sh_macexpand(0x20000de8, 0x2029b5b8, 0x2ff13c94, 0x0) at 0x100cf8ec > arg_expand(0x20000de8, 0x2029b5b8, 0x2ff13c94, 0x0) at 0x100b6478 > sh_argbuild(0x20000de8, 0x2ff13d4c, 0x2029b598, 0x0) at 0x100b65f8 > sh_exec(0x2029b598, 0x4) at 0x100ba9b4 > sh_exec(0x2029f878, 0x6) at 0x100bd31c > sh_funscope(0x6, 0x200362ec, 0x0, 0x2ff15ce0, 0x4) at 0x100b9314 > sh_funct(0x20000de8, 0x2031efc0, 0x6, 0x200362ec, 0x0, 0x4) at 0x100b986c > sh_exec(0x2026a088, 0x4) at 0x100bc0d4 > sh_exec(0x2026b250, 0x7) at 0x100bd31c > sh_funscope(0x7, 0x20036234, 0x0, 0x2ff17d50, 0x5) at 0x100b9314 > sh_funct(0x20000de8, 0x2031e820, 0x7, 0x20036234, 0x0, 0x5) at 0x100b986c > sh_exec(0x200360d0, 0x5) at 0x100bc0d4 > sh_subshell(0x200360d0, 0x5, 0x1) at 0x100b2ed8 > comsubst(0x200300c8, 0x200360d0, 0x1) at 0x100c9d7c > varsub(0x200300c8) at 0x100ca8fc > copyto(0x200300c8, 0x0, 0x0) at 0x100ce408 > sh_mactrim(0x20000de8, 0x2025f0d9, 0xffffffff) at 0x100cf478 > nv_setlist(0x2025f0d0, 0x20200, 0x0) at 0x10016a2c > sh_exec(0x2025f1a8, 0x4) at 0x100bb000 > sh_exec(0x2025f208, 0x4) at 0x100bd31c > sh_exec(0x2025ec30, 0x4) at 0x100bdff0 > sh_exec(0x20260740, 0x7) at 0x100bd31c > sh_funscope(0x2, 0x20036060, 0x0, 0x2ff1d780, 0x5) at 0x100b9314 > sh_funct(0x20000de8, 0x2031e7c0, 0x2, 0x20036060, 0x0, 0x5) at 0x100b986c > sh_exec(0x20036018, 0x5) at 0x100bc0d4 > sh_subshell(0x20036018, 0x5, 0x1) at 0x100b2ed8 > comsubst(0x200300c8, 0x20036018, 0x1) at 0x100c9d7c > varsub(0x200300c8) at 0x100ca8fc > copyto(0x200300c8, 0x0, 0x0) at 0x100ce408 > sh_mactrim(0x20000de8, 0x20035b61, 0xffffffff) at 0x100cf478 > nv_setlist(0x20035b58, 0x20200, 0x0) at 0x10016a2c > sh_exec(0x20035b88, 0x4) at 0x100bb000 > sh_exec(0x20035c20, 0x4) at 0x100bd31c > sh_exec(0x20035ad0, 0x4) at 0x100bdff0 > exfile(0x20000de8, 0x201906a8, 0xa) at 0x10001568 > sh_main(0x2, 0x2ff2240c, 0x0) at 0x10002304 > pmain.main(0x2, 0x2ff2240c) at 0x1000036c > > Can you please tell us if this is a known problem and if there is any fix?
Erm... some questions: 1. what exactly does "MALLOCDEBUG" do (it's not in the AST code so I assume it's for libc-controlled heap debugging in AIX's native libc (can't verify this myself right now)) ? 2. Can you test whether the issue still occurs with ksh93v- (latest version can be obtained from http://www2.research.att.com/sw/download/alpha/) ? 3. Please build the alpha with $ ksh ./bin/package make PACKAGE_OPTIONS='map-libc' # ... the "map-libc" option moves some of the functions in libast into a seperate symbol namespace (prefixed with |_ast_*()|) and check whether the issue is gone then... if this happens we may have an issue with libc vs. libast symbol clashes 4. We need the script which caused the crash... preferably a "reduced testcase" which exactly triggers the issue that we can integrate this into ksh93's test suite... ---- Bye, Roland -- __ . . __ (o.\ \/ /.o) [email protected] \__\/\/__/ MPEG specialist, C&&JAVA&&Sun&&Unix programmer /O /==\ O\ TEL +49 641 3992797 (;O/ \/ \O;) _______________________________________________ ast-developers mailing list [email protected] http://lists.research.att.com/mailman/listinfo/ast-developers
