[Bug 281825] SDT tracepoints are not cleaned up when a module is unloaded

From: <bugzilla-noreply_at_freebsd.org>
Date: Thu, 03 Oct 2024 18:06:13 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=281825

--- Comment #1 from John Baldwin <jhb@FreeBSD.org> ---
This seems to reproduce the original panic reported to me:

kldload nvmft
kldload dtraceall
kldunload nvmft
kldload ctl
kldload nvmft

Fatal trap 12: page fault while in kernel mode
cpuid = 11; apic id = 0b
fault virtual address   = 0xffffffff8281d078
fault code              = supervisor write data, protection violation
instruction pointer     = 0x20:0xffffffff828f4761
stack pointer           = 0x28:0xfffffe00dc30b8f0
frame pointer           = 0x28:0xfffffe00dc30ba80
code segment            = base 0x0, limit 0xfffff, type 0x1b
                        = DPL 0, pres 1, long 1, def32 0, gran 1
processor eflags        = interrupt enabled, resume, IOPL = 0
current process         = 1084 (kldload)
rdi: ffffffff8285e70e rsi: ffffffff8285ed86 rdx: 0000000000000000
rcx: ffffffff8281d078  r8: 0000000000000004  r9: 0000000000000000
rax: ffffffff82865018 rbx: ffffffff82865000 rbp: fffffe00dc30ba80
r10: 0000000000010000 r11: 0000000000000001 r12: fffff80008085c00
r13: fffff8013dd2a220 r14: fffff8003cee6628 r15: fffff80003f37000
trap number             = 12
panic: page fault
cpuid = 11
time = 1727978657
KDB: stack backtrace:
db_trace_self_wrapper() at db_trace_self_wrapper+0x2b/frame 0xfffffe00dc30b5c0
vpanic() at vpanic+0x13f/frame 0xfffffe00dc30b6f0
panic() at panic+0x43/frame 0xfffffe00dc30b750
trap_fatal() at trap_fatal+0x40b/frame 0xfffffe00dc30b7b0
trap_pfault() at trap_pfault+0xa0/frame 0xfffffe00dc30b820
calltrap() at calltrap+0x8/frame 0xfffffe00dc30b820
--- trap 0xc, rip = 0xffffffff828f4761, rsp = 0xfffffe00dc30b8f0, rbp =
0xfffffe00dc30ba80 ---
sdt_kld_load_probes() at sdt_kld_load_probes+0x3c1/frame 0xfffffe00dc30ba80
linker_load_module() at linker_load_module+0xe90/frame 0xfffffe00dc30bd80
kern_kldload() at kern_kldload+0x16e/frame 0xfffffe00dc30bdd0
sys_kldload() at sys_kldload+0x5c/frame 0xfffffe00dc30be00
amd64_syscall() at amd64_syscall+0x158/frame 0xfffffe00dc30bf30
fast_syscall_common() at fast_syscall_common+0xf8/frame 0xfffffe00dc30bf30
--- syscall (304, FreeBSD ELF64, kldload), rip = 0x1085b13898da, rsp =
0x1085aeefe008, rbp = 0x1085aeefe580 ---

-- 
You are receiving this mail because:
You are the assignee for the bug.