From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: by sourceware.org (Postfix, from userid 48) id A690D385829A; Tue, 12 Mar 2024 18:29:39 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org A690D385829A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sourceware.org; s=default; t=1710268179; bh=RU1U+h03Bo4kuU1RBYPDxmcPlubrvA06hsFCDOTUQGY=; h=From:To:Subject:Date:In-Reply-To:References:From; b=HuzNzS64aB0obefgleMUer+p4KANGcPm60SSYXp62zgOSx2Rg9z6ijS2mBZ9hTWa7 ksSjiffjbQ0m7/XWIrf6CG+Fwt3HWf1e8Q7dhGjlBlbQlEowrDNTBXPmsZJKo+LbaU pExZTkQ/d9d5RiqnzpyONyzUjyAwTYBAwH+f5Rlg= From: "wcohen at redhat dot com" To: systemtap@sourceware.org Subject: [Bug runtime/31472] systemtap.base/tracepoints.stp causes reboot with RHEL9 linux 5.14.0-428.el9.x86_64 Date: Tue, 12 Mar 2024 18:29:39 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: systemtap X-Bugzilla-Component: runtime X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: wcohen at redhat dot com X-Bugzilla-Status: ASSIGNED X-Bugzilla-Resolution: X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: systemtap at sourceware dot org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://sourceware.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 List-Id: https://sourceware.org/bugzilla/show_bug.cgi?id=3D31472 --- Comment #4 from William Cohen --- Traceback from the scaled down reproducer: $ ../install/bin/stap -k -p4 -v -mpr31472 pr31472_mmap_lock.stp=20 Pass 1: parsed user script and 503 library scripts using 204124virt/175892res/15616shr/160016data kb, in 270usr/30sys/309real ms. Pass 2: analyzed script: 4 probes, 1 function, 0 embeds, 0 globals using 211220virt/186660res/18948shr/167112data kb, in 100usr/110sys/210real ms. Pass 3: translated to C into "/tmp/stap0VnT14/pr31472_src.c" using 211220virt/186660res/18948shr/167112data kb, in 0usr/0sys/0real ms. pr31472.ko Pass 4: compiled C into "pr31472.ko" in 2210usr/460sys/2709real ms. Keeping temporary directory "/tmp/stap0VnT14" $ sudo ../install/bin/staprun pr31472.ko=20 [sudo] password for wcohen:=20 [ 224.637382] pr31472 (pr31472_mmap_lock.stp): systemtap: 5.1/0.190, base: ffffffffc0cd0000, memory: 40data/28text/10ctx/16486net/121alloc kb, probes:= 4 [ 224.637402] jump_label: Fatal kernel bug, unexpected op at __access_process_vm_.constprop.0+0x3d/0x1f0 [pr31472] [00000000c7948df7] (e= 9 eb 00 00 00 !=3D 0f 1f 44 00 00)) size:5 type:1 [ 224.637415] ------------[ cut here ]------------ [ 224.637416] kernel BUG at arch/x86/kernel/jump_label.c:73! [ 224.637423] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI [ 224.638345] CPU: 0 PID: 2304 Comm: stapio Kdump: loaded Tainted: G=20=20= =20=20=20=20=20=20=20=20 OE ------- --- 5.14.0-428.el9.x86_64 #1 [ 224.638345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39 04/01/2014 [ 224.638345] RIP: 0010:__jump_label_patch.cold+0x24/0x26 [ 224.638345] Code: ba e9 6a ff 40 ff 49 c7 c7 c8 95 a3 bb 41 56 45 89 e1 = 4d 89 f8 4c 89 e9 4c 89 ea 4c 89 ee 48 c7 c7 58 a8 50 ba e8 ad d2 00 00 <0f> 0= b 53 48 c7 c6 58 b2 50 ba 48 89 fb 48 8d bf c0 00 00 00 e8 9a [ 224.638345] RSP: 0018:ffffb2c78121fb38 EFLAGS: 00010246 [ 224.638345] RAX: 00000000000000a9 RBX: 00000000000000eb RCX: 0000000000000027 [ 224.638345] RDX: 0000000000000000 RSI: ffffffffbac67a20 RDI: ffff9edc7bc20848 [ 224.638345] RBP: ffffb2c78121fb70 R08: 80000000ffff8328 R09: 0000000000ffff0a [ 224.638345] R10: 0000000000000000 R11: 000000000000000f R12: 0000000000000005 [ 224.638345] R13: ffffffffc0cd119d R14: 0000000000000001 R15: ffffffffba00a26a [ 224.638345] FS: 00007fba1baf1000(0000) GS:ffff9edc7bc00000(0000) knlGS:0000000000000000 [ 224.638345] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 224.638345] CR2: 00007ffe20128084 CR3: 0000000102f4c006 CR4: 0000000000370ef0 [ 224.638345] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 224.638345] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 224.638345] Call Trace: [ 224.638345] [ 224.638345] ? show_trace_log_lvl+0x1c4/0x2df [ 224.638345] ? show_trace_log_lvl+0x1c4/0x2df [ 224.638345] ? arch_jump_label_transform_queue+0x34/0x80 [ 224.638345] ? __die_body.cold+0x8/0xd [ 224.638345] ? die+0x2b/0x50 [ 224.638345] ? do_trap+0xce/0x120 [ 224.638345] ? __jump_label_patch.cold+0x24/0x26 [ 224.638345] ? do_error_trap+0x65/0x80 [ 224.638345] ? __jump_label_patch.cold+0x24/0x26 [ 224.638345] ? exc_invalid_op+0x4e/0x70 [ 224.638345] ? __jump_label_patch.cold+0x24/0x26 [ 224.638345] ? asm_exc_invalid_op+0x16/0x20 [ 224.638345] ? __access_process_vm_.constprop.0+0x3d/0x1f0 [pr31472] [ 224.638345] ? __jump_label_patch.cold+0x24/0x26 [ 224.638345] ? __jump_label_patch.cold+0x24/0x26 [ 224.638345] arch_jump_label_transform_queue+0x34/0x80 [ 224.638345] __jump_label_update+0x6a/0x120 [ 224.638345] jump_label_update+0x98/0xf0 [ 224.638345] static_key_enable_cpuslocked+0x5f/0x90 [ 224.638345] static_key_enable+0x16/0x20 [ 224.638345] tracepoint_add_func+0x2e5/0x3f0 [ 224.638345] ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472] [ 224.638345] tracepoint_probe_register+0x58/0x90 [ 224.638345] ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472] [ 224.638345] ? contexts+0xffffffffc0c99f98/0xffffffffc0c99f98 [pr31472] [ 224.638345] stp_tracepoint_probe_register+0x127/0x1a0 [pr31472] [ 224.638345] ? systemtap_module_init.cold+0xc8/0x284 [pr31472] [ 224.638345] ? _stp_ctl_write_cmd+0x2b4/0x440 [pr31472] [ 224.638345] ? proc_reg_write+0x53/0xa0 [ 224.638345] ? vfs_write+0xe4/0x410 [ 224.638345] ? __fget_light+0x9f/0x130 [ 224.638345] ? ksys_write+0x5f/0xe0 [ 224.638345] ? do_syscall_64+0x59/0x90 [ 224.638345] ? syscall_exit_to_user_mode+0x22/0x40 [ 224.638345] ? do_syscall_64+0x69/0x90 [ 224.638345] ? do_syscall_64+0x69/0x90 [ 224.638345] ? syscall_exit_work+0x103/0x130 [ 224.638345] ? syscall_exit_to_user_mode+0x22/0x40 [ 224.638345] ? do_syscall_64+0x69/0x90 [ 224.638345] ? do_user_addr_fault+0x1d6/0x6a0 [ 224.638345] ? exc_page_fault+0x62/0x150 [ 224.638345] ? entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 224.638345] [ 224.638345] Modules linked in: pr31472(OE) uinput snd_seq_dummy snd_hrti= mer nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ip= v4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rfkill ip_set nf_tables nfnetlink qrtr sunrpc intel_rapl_msr intel_rapl_common intel_pmc_core intel_vsec pmt_telemetry pmt_class kvm_intel snd_hda_codec_generic ledtrig_audio snd_hda_intel kvm snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec snd_hda_core snd_hwdep snd_seq snd_seq_device snd_pcm irqbypass rapl snd_timer iTCO_wdt iTCO_vendor_support snd pcspkr i2c_i801 virtio_balloon lpc_ich soundcore jo= ydev i2c_smbus xfs libcrc32c qxl drm_ttm_helper ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ahci drm libahci libata crct10dif_pclmul crc32_pclmul crc32c_intel virtio_net virtio_scsi virtio_blk ghash_clmulni_i= ntel virtio_console net_failover failover serio_raw dm_mirror dm_region_hash dm_= log dm_mod fuse --=20 You are receiving this mail because: You are the assignee for the bug.=