From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 80254 invoked by alias); 8 Feb 2019 07:18:12 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 78858 invoked by uid 48); 8 Feb 2019 07:18:08 -0000 From: "mcermak at redhat dot com" To: systemtap@sourceware.org Subject: [Bug runtime/24193] New: rhel7 stapbpf SEGV Date: Fri, 08 Feb 2019 07:18:00 -0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: runtime X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: mcermak at redhat dot com X-Bugzilla-Status: NEW X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-SW-Source: 2019-q1/txt/msg00037.txt.bz2 https://sourceware.org/bugzilla/show_bug.cgi?id=3D24193 Bug ID: 24193 Summary: rhel7 stapbpf SEGV Product: systemtap Version: unspecified Status: NEW Severity: normal Priority: P2 Component: runtime Assignee: systemtap at sourceware dot org Reporter: mcermak at redhat dot com Target Milestone: --- I seem to be able to reliably reproduce a SEGV that happens with git stap 4e768695 and kernel-3.10.0-993.el7.x86_64. (This doesn't happen with rhel packaged systemtap-3.3-3.el7): =3D=3D=3D=3D=3D=3D=3D 7.7 Server x86_64 # stap -v -p4 -k --runtime=3Dbpf /root/.mcermak/systemtap/testsuite/systemtap.bpf/bpf_tests/array.stp Pass 1: parsed user script and 49 library scripts using 216880virt/14620res/3360shr/11024data kb, in 40usr/0sys/32real ms. Pass 2: analyzed script: 3 probes, 2 functions, 0 embeds, 1 global using 257120virt/55720res/4288shr/51264data kb, in 700usr/130sys/1184real ms. stap_14165.bo Pass 4: compiled BPF into "stap_14165.bo" in 0usr/0sys/3real ms. Keeping temporary directory "/tmp/stap8MN8vG" 7.7 Server x86_64 #=20 7.7 Server x86_64 # gdb -q -args /usr/local/bin/stapbpf stap_14165.bo Reading symbols from /usr/local/bin/stapbpf...done. (gdb) r Starting program: /usr/local/bin/stapbpf stap_14165.bo [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib64/libthread_db.so.1". Program received signal SIGSEGV, Segmentation fault. ___fprintf_chk (fp=3D0x0, flag=3D1, format=3D0x40bc58 "%s (%s): stapbpf: %s= , name: %s, d_size: %lu\n") at fprintf_chk.c:31 31 _IO_acquire_lock_clear_flags2 (fp); (gdb)=20 (gdb)=20 (gdb) bt full #0 ___fprintf_chk (fp=3D0x0, flag=3D1, format=3D0x40bc58 "%s (%s): stapbpf= : %s, name: %s, d_size: %lu\n") at fprintf_chk.c:31 _IO_acquire_lock_file =3D 0x0 ap =3D {{gp_offset =3D 0, fp_offset =3D 0, overflow_arg_area =3D 0x= 0, reg_save_area =3D 0x0}} done =3D #1 0x0000000000407104 in fprintf (__fmt=3D0x40bc58 "%s (%s): stapbpf: %s, = name: %s, d_size: %lu\n", __stream=3D) at /usr/include/bits/stdio2= .h:98 No locals. #2 prog_load (data=3D0x159f678, data=3D0x159f678, name=3D0x7f4a977c7806 "kprobe/0x242f90") at ../../systemtap/stapbpf/stapbpf.cxx:318 prog_type =3D BPF_PROG_TYPE_KPROBE fd =3D #3 load_bpf_file (module=3D) at ../../systemtap/stapbpf/stapbpf.cxx:1210 shdr =3D sh_name =3D license_idx =3D 2541516806 script_name_idx =3D 10 begin_idx =3D 2 end_idx =3D 4 sh_data =3D maps_idx =3D 1 version_idx =3D 8 kprobes_idx =3D 0 buf =3D module_basename_str =3D "stap_14165.bo" len =3D fd =3D elf =3D shnum =3D 13 module_name_str =3D "stap_14165.bo" ehdr =3D shdrs =3D #4 0x00000000004034bf in main (argc=3D2, argv=3D0x7ffd36a1d258) at ../../systemtap/stapbpf/stapbpf.cxx:1442 long_opts =3D {{name =3D 0x40b5ea "help", has_arg =3D 0, flag =3D 0= x0, val =3D 104}, {name =3D 0x40b5ef "verbose", has_arg =3D 0, flag =3D 0x0, val =3D 11= 8}, {name =3D 0x40b407 "version", has_arg =3D 0, flag =3D 0x0, val =3D 86}} rc =3D (gdb) =3D=3D=3D=3D=3D=3D=3D --=20 You are receiving this mail because: You are the assignee for the bug.