[Bug 281825] SDT tracepoints are not cleaned up when a module is unloaded
Date: Thu, 03 Oct 2024 18:06:13 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281825 --- Comment #1 from John Baldwin <jhb@FreeBSD.org> --- This seems to reproduce the original panic reported to me: kldload nvmft kldload dtraceall kldunload nvmft kldload ctl kldload nvmft Fatal trap 12: page fault while in kernel mode cpuid = 11; apic id = 0b fault virtual address = 0xffffffff8281d078 fault code = supervisor write data, protection violation instruction pointer = 0x20:0xffffffff828f4761 stack pointer = 0x28:0xfffffe00dc30b8f0 frame pointer = 0x28:0xfffffe00dc30ba80 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 1084 (kldload) rdi: ffffffff8285e70e rsi: ffffffff8285ed86 rdx: 0000000000000000 rcx: ffffffff8281d078 r8: 0000000000000004 r9: 0000000000000000 rax: ffffffff82865018 rbx: ffffffff82865000 rbp: fffffe00dc30ba80 r10: 0000000000010000 r11: 0000000000000001 r12: fffff80008085c00 r13: fffff8013dd2a220 r14: fffff8003cee6628 r15: fffff80003f37000 trap number = 12 panic: page fault cpuid = 11 time = 1727978657 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00dc30b5c0 vpanic() at vpanic+0x13f/frame 0xfffffe00dc30b6f0 panic() at panic+0x43/frame 0xfffffe00dc30b750 trap_fatal() at trap_fatal+0x40b/frame 0xfffffe00dc30b7b0 trap_pfault() at trap_pfault+0xa0/frame 0xfffffe00dc30b820 calltrap() at calltrap+0x8/frame 0xfffffe00dc30b820 --- trap 0xc, rip = 0xffffffff828f4761, rsp = 0xfffffe00dc30b8f0, rbp = 0xfffffe00dc30ba80 --- sdt_kld_load_probes() at sdt_kld_load_probes+0x3c1/frame 0xfffffe00dc30ba80 linker_load_module() at linker_load_module+0xe90/frame 0xfffffe00dc30bd80 kern_kldload() at kern_kldload+0x16e/frame 0xfffffe00dc30bdd0 sys_kldload() at sys_kldload+0x5c/frame 0xfffffe00dc30be00 amd64_syscall() at amd64_syscall+0x158/frame 0xfffffe00dc30bf30 fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe00dc30bf30 --- syscall (304, FreeBSD ELF64, kldload), rip = 0x1085b13898da, rsp = 0x1085aeefe008, rbp = 0x1085aeefe580 --- -- You are receiving this mail because: You are the assignee for the bug.