public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug runtime/30534] New: program received "Illegal instruction" when using systemtap set a probe and hit the probe
@ 2023-06-09 14:39 yang.pan@nokia-sbell.com
  2023-10-12 20:43 ` [Bug runtime/30534] " wcohen at redhat dot com
  0 siblings, 1 reply; 2+ messages in thread
From: yang.pan@nokia-sbell.com @ 2023-06-09 14:39 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=30534

            Bug ID: 30534
           Summary: program received "Illegal instruction" when using
                    systemtap set a probe and hit the probe
           Product: systemtap
           Version: unspecified
            Status: UNCONFIRMED
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: yang.pan@nokia-sbell.com
  Target Milestone: ---

I am using systemtap to set a user-space probe for any Linux program et. "ls".
If the probe is hit, the program will get a signal "signal 4 (Illegal
instruction)".

------------------------------------------------
# stap dbg-core.stp -c /usr/bin/ls
WARNING: Child process exited with signal 4 (Illegal instruction)
start debug coredump

WARNING: /usr/bin/staprun exited with status: 1
Pass 5: run failed.  [man error::pass5]
-------------------------------------------------

----------- piece code of dbg-core.stp ---------
probe process("/lib64/libc.so.6").function("_IO_new_fclose").return
{
    printf ("call _IO_new_fclose()")
}
------------------------------------------------  

My Linux system info is as below:

# uname -a
Linux SPVM116A-0-0-1 3.10.0-862.6.3.el7.x86_64 #1 SMP Fri Jun 15 17:57:37 EDT
2018 x86_64 x86_64 x86_64 GNU/Linux

# stap -V
Systemtap translator/driver (version 4.0/0.170/0.176, rpm 4.0-13.el7)
Copyright (C) 2005-2018 Red Hat, Inc. and others
This is free software; see the source for copying conditions.
tested kernel versions: 2.6.18 ... 4.19-rc7
enabled features: AVAHI BOOST_STRING_REF DYNINST BPF JAVA PYTHON2 LIBRPM
LIBSQLITE3 LIBVIRT LIBXML2 NLS NSS READLINE

Please give a suggestion to solve it. Thanks in advance!

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Bug runtime/30534] program received "Illegal instruction" when using systemtap set a probe and hit the probe
  2023-06-09 14:39 [Bug runtime/30534] New: program received "Illegal instruction" when using systemtap set a probe and hit the probe yang.pan@nokia-sbell.com
@ 2023-10-12 20:43 ` wcohen at redhat dot com
  0 siblings, 0 replies; 2+ messages in thread
From: wcohen at redhat dot com @ 2023-10-12 20:43 UTC (permalink / raw)
  To: systemtap

https://sourceware.org/bugzilla/show_bug.cgi?id=30534

William Cohen <wcohen at redhat dot com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |WORKSFORME
                 CC|                            |wcohen at redhat dot com
             Status|UNCONFIRMED                 |RESOLVED

--- Comment #1 from William Cohen <wcohen at redhat dot com> ---
As the upstream systemtap doesn't currently build on RHEL7 because of missing
debuginfod support in elfutils resorted to trying things with the existing
systemtap available in RHEL7.9.  Things appeared to work correctly:

[root@hpe-dl160gen8-01 ~]# rpm -q kernel glibc systemtap
kernel-3.10.0-1160.el7.x86_64
glibc-2.17-317.el7.x86_64
glibc-2.17-317.el7.i686
systemtap-4.0-13.el7.x86_64
[root@hpe-dl160gen8-01 ~]# stap dbg-core.stp -c /usr/bin/ls
anaconda-ks.cfg  NETBOOT_METHOD.TXT  rpmbuild
dbg-core.stp     original-ks.cfg     systemtap-5.0-1.el8.src.rpm
dbg-core.stp~    RECIPE.TXT          systemtap_write
call _IO_new_fclose()call _IO_new_fclose()[root@hpe-dl160gen8-01 ~]# cat
dbg-core.stp
probe process("/lib64/libc.so.6").function("_IO_new_fclose").return
{
  printf ("call _IO_new_fclose()")
}


The only difference I can see is that this is the kernel is a bit newer. 
Doesn't look like we are able to replicate this.

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2023-10-12 20:43 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-06-09 14:39 [Bug runtime/30534] New: program received "Illegal instruction" when using systemtap set a probe and hit the probe yang.pan@nokia-sbell.com
2023-10-12 20:43 ` [Bug runtime/30534] " wcohen at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).