- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello.
I have build and installed the drivers manually.
./build-driver
./insmod-sep -r -g vtune
Here is the output for : ./insmod-sep -q
When I run vtune:
vtune -collect memory-access -knob sampling-interval=0.01 ./t5.out &>> t5__mem_acc.txt
The system crashed. Afterward, I tried it with larger interval (1ms). It first worked, but running it on the next day crashed the system again.
Looking at the crash report, it seems like some "array index out of bound issue" in sw_driver.c.
Mar 16 10:46:43 srogers kernel: ------------[ cut here ]------------
Mar 16 10:46:43 srogers kernel: memcpy: detected field-spanning write (size 9) of single field "&str->data[0]" at /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:1002 (size 1)
Mar 16 10:46:43 srogers kernel: WARNING: CPU: 53 PID: 91626 at /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:1002 sw_gather_trace_notifier_i+0xf9/0x110 [socwatch2_15] Mar 16 10:46:43 srogers kernel: Modules linked in: tls socwatch2_15(OE) vtsspp(OE) sep5(OE) vhost_net vhost vhost_iotlb tap socperf3(OE) snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore pax(OE) xt_CHECKSUM ipt_REJECT nf_reject_ipv4 xt_tcpudp xt_conntrack xt_MASQUERADE xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rpcsec_gss_krb5 xt_addrtype auth_rpcgss nft_compat nf_tables xfrm_user xfrm_algo nfsv4 nfs lockd grace netfs overlay bridge stp llc qrtr sunrpc binfmt_misc xfs nls_iso8859_1 intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common i10nm_edac skx_edac_common nfit x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm cmdlinepart spi_nor mtd irqbypass crct10dif_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 sha1_ssse3 aesni_intel irdma crypto_simd ipmi_ssif cryptd dax_hmem ib_uverbs cxl_acpi rapl intel_th_gth spi_intel_pci i2c_i801 isst_if_mbox_pci mei_me isst_if_mmio
Mar 16 10:46:43 srogers kernel: intel_cstate cxl_core ib_core ast mei intel_th_pci isst_if_common i2c_smbus spi_intel ioatdma intel_vsec intel_pch_thermal intel_th acpi_power_meter ipmi_si acpi_ipmi ipmi_devintf joydev input_leds ipmi_msghandler acpi_pad mac_hid sch_fq_codel msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 hid_generic usbhid hid rndis_host cdc_ether usbnet mii raid0 ice nvme crc32_pclmul i40e nvme_core gnss igb nvme_auth xhci_pci ahci i2c_algo_bit xhci_pci_renesas libahci dca
Mar 16 10:46:43 srogers kernel: CPU: 53 PID: 91626 Comm: socwatch Tainted: G OE 6.8.0-55-generic #57-Ubuntu
Mar 16 10:46:43 srogers kernel: Hardware name: Supermicro SYS-420GP-TNR/X12DPG-OA6, BIOS 1.4b 02/02/2023
Mar 16 10:46:43 srogers kernel: RIP: 0010:sw_gather_trace_notifier_i+0xf9/0x110 [socwatch2_15]
Mar 16 10:46:43 srogers kernel: Code: 5f b0 00 00 a8 01 75 ae b9 01 00 00 00 48 c7 c2 e8 06 01 c2 4c 89 ee 48 c7 c7 40 06 01 c2 c6 05 a5 eb 00 00 01 e8 87 f7 d0 f3 <0f> 0b eb 88 48 c7 c7 80 0a 00 c2 e8 77 27 54 f4 e9 22 ff ff ff 66
Mar 16 10:46:43 srogers kernel: RSP: 0018:ff73630a5df3f668 EFLAGS: 00010246
Mar 16 10:46:43 srogers kernel: FS: 00007ed1a0884080(0000) GS:ff2621fc7f880000(0000) knlGS:0000000000000000
Mar 16 10:46:43 srogers kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Mar 16 10:46:43 srogers kernel: CR2: 00005bba83dee000 CR3: 00000105dd1ca003 CR4: 0000000000773ef0 Mar 16 10:46:43 srogers kernel: PKRU: 55555554 Mar 16 10:46:43 srogers kernel: Call Trace: Mar 16 10:46:43 srogers kernel: <TASK> Mar 16 10:46:43 srogers kernel: ? show_regs+0x6d/0x80 Mar 16 10:46:43 srogers kernel: ? __warn+0x89/0x160 Mar 16 10:46:43 srogers kernel: ? sw_gather_trace_notifier_i+0xf9/0x110 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? report_bug+0x17e/0x1b0 Mar 16 10:46:43 srogers kernel: ? handle_bug+0x51/0xa0 Mar 16 10:46:43 srogers kernel: ? exc_invalid_op+0x18/0x80 Mar 16 10:46:43 srogers kernel: ? asm_exc_invalid_op+0x1b/0x20 Mar 16 10:46:43 srogers kernel: ? sw_gather_trace_notifier_i+0xf9/0x110 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? sw_gather_trace_notifier_i+0xf9/0x110 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __pfx_sw_gather_tracepoint_i+0x10/0x10 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_gather_tracepoint_i+0x10/0x20 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_for_each_tracepoint_node+0x57/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_get_available_name_id_mappings_i+0xc1/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_unlocked_handle_ioctl_i+0x572/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? xa_find_after+0xe7/0x150 Mar 16 10:46:43 srogers kernel: ? intel_iommu_iotlb_sync_map+0x8f/0x100 Mar 16 10:46:43 srogers kernel: ? mntput_no_expire+0x51/0x260 Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x441/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? mntput+0x24/0x50 Mar 16 10:46:43 srogers kernel: ? terminate_walk+0x65/0x100 Mar 16 10:46:43 srogers kernel: ? path_openat+0x140/0x2d0 Mar 16 10:46:43 srogers kernel: ? do_filp_open+0xaf/0x170 Mar 16 10:46:43 srogers kernel: ? rmqueue+0x824/0xf00 Mar 16 10:46:43 srogers kernel: sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: x64_sys_call+0x12a3/0x25a0 Mar 16 10:46:43 srogers kernel: do_syscall_64+0x7f/0x180 Mar 16 10:46:43 srogers kernel: ? __alloc_pages+0x1e9/0x350 Mar 16 10:46:43 srogers kernel: ? __mod_memcg_lruvec_state+0xd6/0x1a0 Mar 16 10:46:43 srogers kernel: ? __mod_lruvec_state+0x36/0x50 Mar 16 10:46:43 srogers kernel: ? __lruvec_stat_mod_folio+0x70/0xc0 Mar 16 10:46:43 srogers kernel: ? set_ptes.isra.0+0x2b/0xb0 Mar 16 10:46:43 srogers kernel: ? do_anonymous_page+0x1a3/0x430 Mar 16 10:46:43 srogers kernel: ? handle_pte_fault+0x1cb/0x1d0 Mar 16 10:46:43 srogers kernel: ? __handle_mm_fault+0x654/0x800 Mar 16 10:46:43 srogers kernel: ? __count_memcg_events+0x6b/0x120 Mar 16 10:46:43 srogers kernel: ? count_memcg_events.constprop.0+0x2a/0x50 Mar 16 10:46:43 srogers kernel: ? handle_mm_fault+0xad/0x380 Mar 16 10:46:43 srogers kernel: ? do_user_addr_fault+0x333/0x670 Mar 16 10:46:43 srogers kernel: ? irqentry_exit_to_user_mode+0x7b/0x260 Mar 16 10:46:43 srogers kernel: ? irqentry_exit+0x43/0x50 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: entry_SYSCALL_64_after_hwframe+0x78/0x80 Mar 16 10:46:43 srogers kernel: RIP: 0033:0x7ed1a0324ded Mar 16 10:46:43 srogers kernel: Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 Mar 16 10:46:43 srogers kernel: RSP: 002b:00007fff93e38ee0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 Mar 16 10:46:43 srogers kernel: RAX: ffffffffffffffda RBX: 00007ed19f854460 RCX: 00007ed1a0324ded Mar 16 10:46:43 srogers kernel: RDX: 00007fff93e38f60 RSI: ffffffff80086408 RDI: 0000000000000005 Mar 16 10:46:43 srogers kernel: RBP: 00007fff93e38f30 R08: 00005bba83ddfc70 R09: 0000000000010000 Mar 16 10:46:43 srogers kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 Mar 16 10:46:43 srogers kernel: R13: 0000000000000000 R14: 0000000080086408 R15: 0000000000010000 Mar 16 10:46:43 srogers kernel: </TASK> Mar 16 10:46:43 srogers kernel: ---[ end trace 0000000000000000 ]--- Mar 16 10:46:43 srogers kernel: ------------[ cut here ]------------ Mar 16 10:46:43 srogers kernel: UBSAN: array-index-out-of-bounds in /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:990:36 Mar 16 10:46:43 srogers kernel: index 15 is out of range for type 'pw_u8_t [1]' Mar 16 10:46:43 srogers kernel: CPU: 53 PID: 91626 Comm: socwatch Tainted: G W OE 6.8.0-55-generic #57-Ubuntu Mar 16 10:46:43 srogers kernel: Hardware name: Supermicro SYS-420GP-TNR/X12DPG-OA6, BIOS 1.4b 02/02/2023 Mar 16 10:46:43 srogers kernel: Call Trace: Mar 16 10:46:43 srogers kernel: <TASK> Mar 16 10:46:43 srogers kernel: dump_stack_lvl+0x76/0xa0 Mar 16 10:46:43 srogers kernel: dump_stack+0x10/0x20 Mar 16 10:46:43 srogers kernel: __ubsan_handle_out_of_bounds+0xc6/0x110 Mar 16 10:46:43 srogers kernel: sw_gather_trace_notifier_i+0x109/0x110 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __pfx_sw_gather_tracepoint_i+0x10/0x10 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_gather_tracepoint_i+0x10/0x20 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_for_each_tracepoint_node+0x57/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_get_available_name_id_mappings_i+0xc1/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_unlocked_handle_ioctl_i+0x572/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? xa_find_after+0xe7/0x150 Mar 16 10:46:43 srogers kernel: ? intel_iommu_iotlb_sync_map+0x8f/0x100 Mar 16 10:46:43 srogers kernel: ? mntput_no_expire+0x51/0x260 Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x441/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? mntput+0x24/0x50 Mar 16 10:46:43 srogers kernel: ? terminate_walk+0x65/0x100 Mar 16 10:46:43 srogers kernel: ? path_openat+0x140/0x2d0 Mar 16 10:46:43 srogers kernel: ? do_filp_open+0xaf/0x170 Mar 16 10:46:43 srogers kernel: ? rmqueue+0x824/0xf00 Mar 16 10:46:43 srogers kernel: sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: x64_sys_call+0x12a3/0x25a0 Mar 16 10:46:43 srogers kernel: do_syscall_64+0x7f/0x180 Mar 16 10:46:43 srogers kernel: ? __alloc_pages+0x1e9/0x350 Mar 16 10:46:43 srogers kernel: ? __mod_memcg_lruvec_state+0xd6/0x1a0 Mar 16 10:46:43 srogers kernel: ? __mod_lruvec_state+0x36/0x50 Mar 16 10:46:43 srogers kernel: ? __lruvec_stat_mod_folio+0x70/0xc0 Mar 16 10:46:43 srogers kernel: ? set_ptes.isra.0+0x2b/0xb0 Mar 16 10:46:43 srogers kernel: ? do_anonymous_page+0x1a3/0x430 Mar 16 10:46:43 srogers kernel: ? handle_pte_fault+0x1cb/0x1d0 Mar 16 10:46:43 srogers kernel: ? __handle_mm_fault+0x654/0x800 Mar 16 10:46:43 srogers kernel: ? __count_memcg_events+0x6b/0x120 Mar 16 10:46:43 srogers kernel: ? count_memcg_events.constprop.0+0x2a/0x50 Mar 16 10:46:43 srogers kernel: ? handle_mm_fault+0xad/0x380 Mar 16 10:46:43 srogers kernel: ? do_user_addr_fault+0x333/0x670 Mar 16 10:46:43 srogers kernel: ? irqentry_exit_to_user_mode+0x7b/0x260 Mar 16 10:46:43 srogers kernel: ? irqentry_exit+0x43/0x50 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: entry_SYSCALL_64_after_hwframe+0x78/0x80 Mar 16 10:46:43 srogers kernel: RIP: 0033:0x7ed1a0324ded Mar 16 10:46:43 srogers kernel: Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 Mar 16 10:46:43 srogers kernel: RSP: 002b:00007fff93e38ee0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 Mar 16 10:46:43 srogers kernel: RAX: ffffffffffffffda RBX: 00007ed19f854460 RCX: 00007ed1a0324ded Mar 16 10:46:43 srogers kernel: RDX: 00007fff93e38f60 RSI: ffffffff80086408 RDI: 0000000000000005 Mar 16 10:46:43 srogers kernel: RBP: 00007fff93e38f30 R08: 00005bba83ddfc70 R09: 0000000000010000 Mar 16 10:46:43 srogers kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 Mar 16 10:46:43 srogers kernel: R13: 0000000000000000 R14: 0000000080086408 R15: 0000000000010000 Mar 16 10:46:43 srogers kernel: </TASK> Mar 16 10:46:43 srogers kernel: ---[ end trace ]--- Mar 16 10:46:43 srogers kernel: ------------[ cut here ]------------ Mar 16 10:46:43 srogers kernel: memcpy: detected field-spanning write (size 4) of single field "&str->data[0]" at /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:1076 (size 1) Mar 16 10:46:43 srogers kernel: WARNING: CPU: 53 PID: 91626 at /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:1076 sw_gather_hw_op_i+0x10b/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: Modules linked in: tls socwatch2_15(OE) vtsspp(OE) sep5(OE) vhost_net vhost vhost_iotlb tap socperf3(OE) snd_seq_dummy snd_hrtimer snd_seq_midi snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device snd_timer snd soundcore pax(OE) xt_CHECKSUM ipt_REJECT nf_reject_ipv4 xt_tcpudp xt_conntrack xt_MASQUERADE xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 rpcsec_gss_krb5 xt_addrtype auth_rpcgss nft_compat nf_tables xfrm_user xfrm_algo nfsv4 nfs lockd grace netfs overlay bridge stp llc qrtr sunrpc binfmt_misc xfs nls_iso8859_1 intel_rapl_msr intel_rapl_common intel_uncore_frequency intel_uncore_frequency_common i10nm_edac skx_edac_common nfit x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm cmdlinepart spi_nor mtd irqbypass crct10dif_pclmul polyval_clmulni polyval_generic ghash_clmulni_intel sha256_ssse3 sha1_ssse3 aesni_intel irdma crypto_simd ipmi_ssif cryptd dax_hmem ib_uverbs cxl_acpi rapl intel_th_gth spi_intel_pci i2c_i801 isst_if_mbox_pci mei_me isst_if_mmio Mar 16 10:46:43 srogers kernel: intel_cstate cxl_core ib_core ast mei intel_th_pci isst_if_common i2c_smbus spi_intel ioatdma intel_vsec intel_pch_thermal intel_th acpi_power_meter ipmi_si acpi_ipmi ipmi_devintf joydev input_leds ipmi_msghandler acpi_pad mac_hid sch_fq_codel msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 btrfs blake2b_generic raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 hid_generic usbhid hid rndis_host cdc_ether usbnet mii raid0 ice nvme crc32_pclmul i40e nvme_core gnss igb nvme_auth xhci_pci ahci i2c_algo_bit xhci_pci_renesas libahci dca Mar 16 10:46:43 srogers kernel: CPU: 53 PID: 91626 Comm: socwatch Tainted: G W OE 6.8.0-55-generic #57-Ubuntu Mar 16 10:46:43 srogers kernel: Hardware name: Supermicro SYS-420GP-TNR/X12DPG-OA6, BIOS 1.4b 02/02/2023 Mar 16 10:46:43 srogers kernel: RIP: 0010:sw_gather_hw_op_i+0x10b/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: Code: 62 b1 00 00 a8 01 75 ae b9 01 00 00 00 48 c7 c2 c8 05 01 c2 4c 89 ee 48 c7 c7 40 06 01 c2 c6 05 c2 ec 00 00 01 e8 a5 f8 d0 f3 <0f> 0b eb 88 48 c7 c7 a0 0a 00 c2 e8 95 28 54 f4 e9 0d ff ff ff 90 Mar 16 10:46:43 srogers kernel: RSP: 0018:ff73630a5df3f610 EFLAGS: 00010246 Mar 16 10:46:43 srogers kernel: RAX: 0000000000000000 RBX: ff73630a71fcf004 RCX: 0000000000000000 Mar 16 10:46:43 srogers kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 Mar 16 10:46:43 srogers kernel: RBP: ff73630a5df3f640 R08: 0000000000000000 R09: 0000000000000000 Mar 16 10:46:43 srogers kernel: R10: 0000000000000000 R11: 0000000000000000 R12: ff73630a71fcf000 Mar 16 10:46:43 srogers kernel: R13: 0000000000000004 R14: ffffffffc2012a49 R15: ff73630a71fcf00a Mar 16 10:46:43 srogers kernel: FS: 00007ed1a0884080(0000) GS:ff2621fc7f880000(0000) knlGS:0000000000000000 Mar 16 10:46:43 srogers kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Mar 16 10:46:43 srogers kernel: CR2: 00005bba682d0270 CR3: 00000105dd1ca003 CR4: 0000000000773ef0 Mar 16 10:46:43 srogers kernel: PKRU: 55555554 Mar 16 10:46:43 srogers kernel: Call Trace: Mar 16 10:46:43 srogers kernel: <TASK> Mar 16 10:46:43 srogers kernel: ? show_regs+0x6d/0x80 Mar 16 10:46:43 srogers kernel: ? __warn+0x89/0x160 Mar 16 10:46:43 srogers kernel: ? sw_gather_hw_op_i+0x10b/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? report_bug+0x17e/0x1b0 Mar 16 10:46:43 srogers kernel: ? handle_bug+0x51/0xa0 Mar 16 10:46:43 srogers kernel: ? exc_invalid_op+0x18/0x80 Mar 16 10:46:43 srogers kernel: ? asm_exc_invalid_op+0x1b/0x20 Mar 16 10:46:43 srogers kernel: ? sw_gather_hw_op_i+0x10b/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __pfx_sw_gather_hw_op_i+0x10/0x10 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_for_each_hw_op+0x3f/0x80 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_get_available_name_id_mappings_i+0xd2/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_unlocked_handle_ioctl_i+0x59c/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? vfree+0x34/0x60 Mar 16 10:46:43 srogers kernel: ? sw_get_available_name_id_mappings_i+0x9f/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x572/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? vmap_pages_pud_range+0x224/0x3c0 Mar 16 10:46:43 srogers kernel: ? vmap_small_pages_range_noflush+0x1da/0x270 Mar 16 10:46:43 srogers kernel: ? __vmap_pages_range_noflush+0x11a/0x150 Mar 16 10:46:43 srogers kernel: ? alloc_pages_bulk_array_mempolicy+0xba/0x280 Mar 16 10:46:43 srogers kernel: ? free_unref_page_prepare+0x235/0x3e0 Mar 16 10:46:43 srogers kernel: ? free_unref_page+0x116/0x1c0 Mar 16 10:46:43 srogers kernel: ? vfree.part.0+0xf0/0x280 Mar 16 10:46:43 srogers kernel: ? vfree+0x34/0x60 Mar 16 10:46:43 srogers kernel: ? sw_get_available_name_id_mappings_i+0x9f/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x587/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? do_filp_open+0xaf/0x170 Mar 16 10:46:43 srogers kernel: ? rmqueue+0x824/0xf00 Mar 16 10:46:43 srogers kernel: sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: x64_sys_call+0x12a3/0x25a0 Mar 16 10:46:43 srogers kernel: do_syscall_64+0x7f/0x180 Mar 16 10:46:43 srogers kernel: ? __mod_lruvec_state+0x36/0x50 Mar 16 10:46:43 srogers kernel: ? xas_find+0x74/0x1e0 Mar 16 10:46:43 srogers kernel: ? next_uptodate_folio+0xa9/0x320 Mar 16 10:46:43 srogers kernel: ? filemap_map_pages+0x2fe/0x4c0 Mar 16 10:46:43 srogers kernel: ? __mod_memcg_lruvec_state+0xd6/0x1a0 Mar 16 10:46:43 srogers kernel: ? do_read_fault+0x112/0x200 Mar 16 10:46:43 srogers kernel: ? do_fault+0xf0/0x260 Mar 16 10:46:43 srogers kernel: ? handle_pte_fault+0x114/0x1d0 Mar 16 10:46:43 srogers kernel: ? __handle_mm_fault+0x654/0x800 Mar 16 10:46:43 srogers kernel: ? sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: ? syscall_exit_to_user_mode+0x86/0x260 Mar 16 10:46:43 srogers kernel: ? do_syscall_64+0x8c/0x180 Mar 16 10:46:43 srogers kernel: ? irqentry_exit+0x43/0x50 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: entry_SYSCALL_64_after_hwframe+0x78/0x80 Mar 16 10:46:43 srogers kernel: RIP: 0033:0x7ed1a0324ded Mar 16 10:46:43 srogers kernel: Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 Mar 16 10:46:43 srogers kernel: RSP: 002b:00007fff93e38ee0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 Mar 16 10:46:43 srogers kernel: RAX: ffffffffffffffda RBX: 00007ed19f854460 RCX: 00007ed1a0324ded Mar 16 10:46:43 srogers kernel: RDX: 00007fff93e38f60 RSI: ffffffff8008640a RDI: 0000000000000005 Mar 16 10:46:43 srogers kernel: RBP: 00007fff93e38f30 R08: 00005bba83ddfc70 R09: 0000000000010000 Mar 16 10:46:43 srogers kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 Mar 16 10:46:43 srogers kernel: R13: 0000000000000000 R14: 000000008008640a R15: 0000000000010000 Mar 16 10:46:43 srogers kernel: </TASK> Mar 16 10:46:43 srogers kernel: ---[ end trace 0000000000000000 ]--- Mar 16 10:46:43 srogers kernel: ------------[ cut here ]------------ Mar 16 10:46:43 srogers kernel: UBSAN: array-index-out-of-bounds in /opt/intel/oneapi/vtune/2025.0/sepdk/src/socwatch/socwatch_driver/./src/sw_driver.c:1054:36 Mar 16 10:46:43 srogers kernel: index 10 is out of range for type 'pw_u8_t [1]' Mar 16 10:46:43 srogers kernel: CPU: 53 PID: 91626 Comm: socwatch Tainted: G W OE 6.8.0-55-generic #57-Ubuntu Mar 16 10:46:43 srogers kernel: Hardware name: Supermicro SYS-420GP-TNR/X12DPG-OA6, BIOS 1.4b 02/02/2023 Mar 16 10:46:43 srogers kernel: Call Trace: Mar 16 10:46:43 srogers kernel: <TASK> Mar 16 10:46:43 srogers kernel: dump_stack_lvl+0x76/0xa0 Mar 16 10:46:43 srogers kernel: dump_stack+0x10/0x20 Mar 16 10:46:43 srogers kernel: __ubsan_handle_out_of_bounds+0xc6/0x110 Mar 16 10:46:43 srogers kernel: sw_gather_hw_op_i+0x11b/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __pfx_sw_gather_hw_op_i+0x10/0x10 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_for_each_hw_op+0x3f/0x80 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_get_available_name_id_mappings_i+0xd2/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: sw_unlocked_handle_ioctl_i+0x59c/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? vfree+0x34/0x60 Mar 16 10:46:43 srogers kernel: ? sw_get_available_name_id_mappings_i+0x9f/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x572/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? vmap_pages_pud_range+0x224/0x3c0 Mar 16 10:46:43 srogers kernel: ? vmap_small_pages_range_noflush+0x1da/0x270 Mar 16 10:46:43 srogers kernel: ? __vmap_pages_range_noflush+0x11a/0x150 Mar 16 10:46:43 srogers kernel: ? alloc_pages_bulk_array_mempolicy+0xba/0x280 Mar 16 10:46:43 srogers kernel: ? free_unref_page_prepare+0x235/0x3e0 Mar 16 10:46:43 srogers kernel: ? free_unref_page+0x116/0x1c0 Mar 16 10:46:43 srogers kernel: ? vfree.part.0+0xf0/0x280 Mar 16 10:46:43 srogers kernel: ? vfree+0x34/0x60 Mar 16 10:46:43 srogers kernel: ? sw_get_available_name_id_mappings_i+0x9f/0x120 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? sw_unlocked_handle_ioctl_i+0x587/0x9f0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? do_filp_open+0xaf/0x170 Mar 16 10:46:43 srogers kernel: ? rmqueue+0x824/0xf00 Mar 16 10:46:43 srogers kernel: sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: x64_sys_call+0x12a3/0x25a0 Mar 16 10:46:43 srogers kernel: do_syscall_64+0x7f/0x180 Mar 16 10:46:43 srogers kernel: ? __mod_lruvec_state+0x36/0x50 Mar 16 10:46:43 srogers kernel: ? xas_find+0x74/0x1e0 Mar 16 10:46:43 srogers kernel: ? next_uptodate_folio+0xa9/0x320 Mar 16 10:46:43 srogers kernel: ? filemap_map_pages+0x2fe/0x4c0 Mar 16 10:46:43 srogers kernel: ? __mod_memcg_lruvec_state+0xd6/0x1a0 Mar 16 10:46:43 srogers kernel: ? do_read_fault+0x112/0x200 Mar 16 10:46:43 srogers kernel: ? do_fault+0xf0/0x260 Mar 16 10:46:43 srogers kernel: ? handle_pte_fault+0x114/0x1d0 Mar 16 10:46:43 srogers kernel: ? __handle_mm_fault+0x654/0x800 Mar 16 10:46:43 srogers kernel: ? sw_device_unlocked_ioctl_i+0x5f/0xa0 [socwatch2_15] Mar 16 10:46:43 srogers kernel: ? __x64_sys_ioctl+0xa0/0xf0 Mar 16 10:46:43 srogers kernel: ? syscall_exit_to_user_mode+0x86/0x260 Mar 16 10:46:43 srogers kernel: ? do_syscall_64+0x8c/0x180 Mar 16 10:46:43 srogers kernel: ? irqentry_exit+0x43/0x50 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: ? clear_bhb_loop+0x15/0x70 Mar 16 10:46:43 srogers kernel: entry_SYSCALL_64_after_hwframe+0x78/0x80 Mar 16 10:46:43 srogers kernel: RIP: 0033:0x7ed1a0324ded Mar 16 10:46:43 srogers kernel: Code: 04 25 28 00 00 00 48 89 45 c8 31 c0 48 8d 45 10 c7 45 b0 10 00 00 00 48 89 45 b8 48 8d 45 d0 48 89 45 c0 b8 10 00 00 00 0f 05 <89> c2 3d 00 f0 ff ff 77 1a 48 8b 45 c8 64 48 2b 04 25 28 00 00 00 Mar 16 10:46:43 srogers kernel: RSP: 002b:00007fff93e38ee0 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 Mar 16 10:46:43 srogers kernel: RAX: ffffffffffffffda RBX: 00007ed19f854460 RCX: 00007ed1a0324ded Mar 16 10:46:43 srogers kernel: RDX: 00007fff93e38f60 RSI: ffffffff8008640a RDI: 0000000000000005 Mar 16 10:46:43 srogers kernel: RBP: 00007fff93e38f30 R08: 00005bba83ddfc70 R09: 0000000000010000 Mar 16 10:46:43 srogers kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 Mar 16 10:46:43 srogers kernel: R13: 0000000000000000 R14: 000000008008640a R15: 0000000000010000 Mar 16 10:46:43 srogers kernel: </TASK> Mar 16 10:46:43 srogers kernel: ---[ end trace ]--- Mar 16 10:46:53 srogers kernel: BUG: kernel NULL pointer dereference, address: 0000000000000028 Mar 16 10:46:53 srogers kernel: #PF: supervisor read access in kernel mode
Here’s the result of lscpu:
Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Address sizes: 52 bits physical, 57 bits virtual Byte Order: Little Endian CPU(s): 64 On-line CPU(s) list: 0-63 Vendor ID: GenuineIntel Model name: Intel(R) Xeon(R) Gold 6326 CPU @ 2.90GHz CPU family: 6 Model: 106 Thread(s) per core: 2 Core(s) per socket: 16 Socket(s): 2 Stepping: 6 CPU(s) scaling MHz: 24% CPU max MHz: 3500.0000 CPU min MHz: 800.0000 BogoMIPS: 5800.00 Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 cl flush dts acpi mmx fxsr sse sse2 ss ht tm pbe syscall nx pdpe1gb rdtscp lm constant_tsc art arch_perfmon pebs bts rep_good nopl xtopology nonstop_ts c cpuid aperfmperf pni pclmulqdq dtes64 monitor ds_cpl vmx smx est tm2 sss e3 sdbg fma cx16 xtpr pdcm pcid dca sse4_1 sse4_2 x2apic movbe popcnt tsc_ deadline_timer aes xsave avx f16c rdrand lahf_lm abm 3dnowprefetch cpuid_f ault epb cat_l3 ssbd mba ibrs ibpb stibp ibrs_enhanced tpr_shadow flexprio rity ept vpid ept_ad fsgsbase tsc_adjust bmi1 avx2 smep bmi2 erms invpcid cqm rdt_a avx512f avx512dq rdseed adx smap avx512ifma clflushopt clwb inte l_pt avx512cd sha_ni avx512bw avx512vl xsaveopt xsavec xgetbv1 xsaves cqm_ llc cqm_occup_llc cqm_mbm_total cqm_mbm_local split_lock_detect wbnoinvd d therm ida arat pln pts vnmi avx512vbmi umip pku ospke avx512_vbmi2 gfni va es vpclmulqdq avx512_vnni avx512_bitalg tme avx512_vpopcntdq la57 rdpid fs rm md_clear pconfig flush_l1d arch_capabilities Virtualization features: Virtualization: VT-x Caches (sum of all): L1d: 1.5 MiB (32 instances) L1i: 1 MiB (32 instances) L2: 40 MiB (32 instances) L3: 48 MiB (2 instances) NUMA: NUMA node(s): 2 NUMA node0 CPU(s): 0-15,32-47 NUMA node1 CPU(s): 16-31,48-63 Vulnerabilities: Gather data sampling: Mitigation; Microcode Itlb multihit: Not affected L1tf: Not affected Mds: Not affected Meltdown: Not affected Mmio stale data: Mitigation; Clear CPU buffers; SMT vulnerable Reg file data sampling: Not affected Retbleed: Not affected Spec rstack overflow: Not affected Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization Spectre v2: Mitigation; Enhanced / Automatic IBRS; IBPB conditional; RSB filling; PBRS B-eIBRS SW sequence; BHI SW loop, KVM SW loop Srbds: Not affected Tsx async abort: Not affected
And here’s lsb_release -a:
Distributor ID: Ubuntu Description: Ubuntu 24.04.2 LTS Release: 24.04 Codename: noble
Link Copied
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This crash is always happening? or only observed in the memory-access? You can try another command line:
vtune -collect hotspots -knob sampling-mode=hw -- ls
You can run self-check utility first.
$ opt/intel/oneapi/vtune/latest/bin64/vtune-self-checker.sh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When I ran the vtune-self-checker.sh, it did some checking then crashed.
Following is the output:
Intel(R) VTune(TM) Profiler Self Check Utility
Copyright (C) 2009 Intel Corporation. All rights reserved.
Build Number: 629235
HW event-based analysis (counting mode) (Intel driver)
Example of analysis types: Performance Snapshot
Collection: Ok
Finalization: Ok...
Report: Ok
Instrumentation based analysis check
Example of analysis types: Hotspots and Threading with user-mode sampling
Collection: Ok
Finalization: Ok...
Report: Ok
HW event-based analysis check (Intel driver)
Example of analysis types: Hotspots with HW event-based sampling, HPC Performance Characterization, etc.
Collection: Ok
vtune: Warning: To enable hardware event-based sampling, VTune Profiler has disabled the NMI watchdog timer. The watchdog timer will be re-enabled after collection completes.
Finalization: Ok...
vtune: Warning: Cannot locate debugging information for the Linux kernel. Source-level analysis will not be possible. Function-level analysis will be limited to kernel symbol tables. See the Enabling Linux Kernel Analysis topic in the product online help for instructions.
Report: Ok
HW event-based analysis check (Intel driver)
Example of analysis types: Microarchitecture Exploration
Collection: Ok
vtune: Warning: To enable hardware event-based sampling, VTune Profiler has disabled the NMI watchdog timer. The watchdog timer will be re-enabled after collection completes.
Finalization: Ok...
vtune: Warning: Cannot locate debugging information for the Linux kernel. Source-level analysis will not be possible. Function-level analysis will be limited to kernel symbol tables. See the Enabling Linux Kernel Analysis topic in the product online help for instructions.
Report: Ok
HW event-based analysis with uncore events...
Afterwards, it crashed.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Which kernel did you use? Did you try VTune 2025.0.1 release?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Linux Kernel
uname -r
6.8.0-55-generic
Vtune release
vtune --version
Intel(R) VTune(TM) Profiler 2025.0.1 (build 629235) Command Line Tool
Copyright (C) 2009 Intel Corporation. All rights reserved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
When it crashes, please upload the full log files folder.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Do you mean the entire /var/log directory with all its contents ?
In the first post, I have provided the crash report.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yes, all the files in the /var/log directory, the crash log is only one file in the folder.

- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page