public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
From: "wcohen at redhat dot com" <sourceware-bugzilla@sourceware.org>
To: systemtap@sourceware.org
Subject: [Bug runtime/31472] systemtap.base/tracepoints.stp causes reboot with RHEL9 linux 5.14.0-428.el9.x86_64
Date: Tue, 12 Mar 2024 18:29:39 +0000	[thread overview]
Message-ID: <bug-31472-6586-jR8q0zVs9q@http.sourceware.org/bugzilla/> (raw)
In-Reply-To: <bug-31472-6586@http.sourceware.org/bugzilla/>

https://sourceware.org/bugzilla/show_bug.cgi?id=31472

--- Comment #4 from William Cohen <wcohen at redhat dot com> ---
Traceback from the scaled down reproducer:


$ ../install/bin/stap -k -p4 -v -mpr31472 pr31472_mmap_lock.stp 
Pass 1: parsed user script and 503 library scripts using
204124virt/175892res/15616shr/160016data kb, in 270usr/30sys/309real ms.
Pass 2: analyzed script: 4 probes, 1 function, 0 embeds, 0 globals using
211220virt/186660res/18948shr/167112data kb, in 100usr/110sys/210real ms.
Pass 3: translated to C into "/tmp/stap0VnT14/pr31472_src.c" using
211220virt/186660res/18948shr/167112data kb, in 0usr/0sys/0real ms.
pr31472.ko
Pass 4: compiled C into "pr31472.ko" in 2210usr/460sys/2709real ms.
Keeping temporary directory "/tmp/stap0VnT14"
$ sudo ../install/bin/staprun pr31472.ko 
[sudo] password for wcohen: 
[  224.637382] pr31472 (pr31472_mmap_lock.stp): systemtap: 5.1/0.190, base:
ffffffffc0cd0000, memory: 40data/28text/10ctx/16486net/121alloc kb, probes: 4
[  224.637402] jump_label: Fatal kernel bug, unexpected op at
__access_process_vm_.constprop.0+0x3d/0x1f0 [pr31472] [00000000c7948df7] (e9 eb
00 00 00 != 0f 1f 44 00 00)) size:5 type:1
[  224.637415] ------------[ cut here ]------------
[  224.637416] kernel BUG at arch/x86/kernel/jump_label.c:73!
[  224.637423] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[  224.638345] CPU: 0 PID: 2304 Comm: stapio Kdump: loaded Tainted: G          
OE     -------  ---  5.14.0-428.el9.x86_64 #1
[  224.638345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
1.16.3-1.fc39 04/01/2014
[  224.638345] RIP: 0010:__jump_label_patch.cold+0x24/0x26
[  224.638345] Code: ba e9 6a ff 40 ff 49 c7 c7 c8 95 a3 bb 41 56 45 89 e1 4d
89 f8 4c 89 e9 4c 89 ea 4c 89 ee 48 c7 c7 58 a8 50 ba e8 ad d2 00 00 <0f> 0b 53
48 c7 c6 58 b2 50 ba 48 89 fb 48 8d bf c0 00 00 00 e8 9a
[  224.638345] RSP: 0018:ffffb2c78121fb38 EFLAGS: 00010246
[  224.638345] RAX: 00000000000000a9 RBX: 00000000000000eb RCX:
0000000000000027
[  224.638345] RDX: 0000000000000000 RSI: ffffffffbac67a20 RDI:
ffff9edc7bc20848
[  224.638345] RBP: ffffb2c78121fb70 R08: 80000000ffff8328 R09:
0000000000ffff0a
[  224.638345] R10: 0000000000000000 R11: 000000000000000f R12:
0000000000000005
[  224.638345] R13: ffffffffc0cd119d R14: 0000000000000001 R15:
ffffffffba00a26a
[  224.638345] FS:  00007fba1baf1000(0000) GS:ffff9edc7bc00000(0000)
knlGS:0000000000000000
[  224.638345] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  224.638345] CR2: 00007ffe20128084 CR3: 0000000102f4c006 CR4:
0000000000370ef0
[  224.638345] DR0: 0000000000000000 DR1: 0000000000000000 DR2:
0000000000000000
[  224.638345] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7:
0000000000000400
[  224.638345] Call Trace:
[  224.638345]  <TASK>
[  224.638345]  ? show_trace_log_lvl+0x1c4/0x2df
[  224.638345]  ? show_trace_log_lvl+0x1c4/0x2df
[  224.638345]  ? arch_jump_label_transform_queue+0x34/0x80
[  224.638345]  ? __die_body.cold+0x8/0xd
[  224.638345]  ? die+0x2b/0x50
[  224.638345]  ? do_trap+0xce/0x120
[  224.638345]  ? __jump_label_patch.cold+0x24/0x26
[  224.638345]  ? do_error_trap+0x65/0x80
[  224.638345]  ? __jump_label_patch.cold+0x24/0x26
[  224.638345]  ? exc_invalid_op+0x4e/0x70
[  224.638345]  ? __jump_label_patch.cold+0x24/0x26
[  224.638345]  ? asm_exc_invalid_op+0x16/0x20
[  224.638345]  ? __access_process_vm_.constprop.0+0x3d/0x1f0 [pr31472]
[  224.638345]  ? __jump_label_patch.cold+0x24/0x26
[  224.638345]  ? __jump_label_patch.cold+0x24/0x26
[  224.638345]  arch_jump_label_transform_queue+0x34/0x80
[  224.638345]  __jump_label_update+0x6a/0x120
[  224.638345]  jump_label_update+0x98/0xf0
[  224.638345]  static_key_enable_cpuslocked+0x5f/0x90
[  224.638345]  static_key_enable+0x16/0x20
[  224.638345]  tracepoint_add_func+0x2e5/0x3f0
[  224.638345]  ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472]
[  224.638345]  tracepoint_probe_register+0x58/0x90
[  224.638345]  ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472]
[  224.638345]  ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472]
[  224.638345]  stp_tracepoint_probe_register+0x127/0x1a0 [pr31472]
[  224.638345]  ? systemtap_module_init.cold+0xc8/0x284 [pr31472]
[  224.638345]  ? _stp_ctl_write_cmd+0x2b4/0x440 [pr31472]
[  224.638345]  ? proc_reg_write+0x53/0xa0
[  224.638345]  ? vfs_write+0xe4/0x410
[  224.638345]  ? __fget_light+0x9f/0x130
[  224.638345]  ? ksys_write+0x5f/0xe0
[  224.638345]  ? do_syscall_64+0x59/0x90
[  224.638345]  ? syscall_exit_to_user_mode+0x22/0x40
[  224.638345]  ? do_syscall_64+0x69/0x90
[  224.638345]  ? do_syscall_64+0x69/0x90
[  224.638345]  ? syscall_exit_work+0x103/0x130
[  224.638345]  ? syscall_exit_to_user_mode+0x22/0x40
[  224.638345]  ? do_syscall_64+0x69/0x90
[  224.638345]  ? do_user_addr_fault+0x1d6/0x6a0
[  224.638345]  ? exc_page_fault+0x62/0x150
[  224.638345]  ? entry_SYSCALL_64_after_hwframe+0x72/0xdc
[  224.638345]  </TASK>
[  224.638345] Modules linked in: pr31472(OE) uinput snd_seq_dummy snd_hrtimer
nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4
nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack
nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr sunrpc
intel_rapl_msr intel_rapl_common intel_pmc_core intel_vsec pmt_telemetry
pmt_class kvm_intel snd_hda_codec_generic ledtrig_audio snd_hda_intel kvm
snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep
snd_seq snd_seq_device snd_pcm irqbypass rapl snd_timer iTCO_wdt
iTCO_vendor_support snd pcspkr i2c_i801 virtio_balloon lpc_ich soundcore joydev
i2c_smbus xfs libcrc32c qxl drm_ttm_helper ttm drm_kms_helper syscopyarea
sysfillrect sysimgblt fb_sys_fops ahci drm libahci libata crct10dif_pclmul
crc32_pclmul crc32c_intel virtio_net virtio_scsi virtio_blk ghash_clmulni_intel
virtio_console net_failover failover serio_raw dm_mirror dm_region_hash dm_log
dm_mod fuse

-- 
You are receiving this mail because:
You are the assignee for the bug.

  parent reply	other threads:[~2024-03-12 18:29 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-11 13:54 [Bug runtime/31472] New: " wcohen at redhat dot com
2024-03-11 13:57 ` [Bug runtime/31472] " fche at redhat dot com
2024-03-12 16:13 ` wcohen at redhat dot com
2024-03-12 18:16 ` wcohen at redhat dot com
2024-03-12 18:29 ` wcohen at redhat dot com [this message]
2024-03-14 18:51 ` wcohen at redhat dot com
2024-03-18 21:06 ` wcohen at redhat dot com

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-31472-6586-jR8q0zVs9q@http.sourceware.org/bugzilla/ \
    --to=sourceware-bugzilla@sourceware.org \
    --cc=systemtap@sourceware.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).