This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug tapsets/20040] New: the task_exe_file function getting "BUG: sleeping function called from invalid context"


https://sourceware.org/bugzilla/show_bug.cgi?id=20040

            Bug ID: 20040
           Summary: the task_exe_file function getting "BUG: sleeping
                    function called from invalid context"
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: tapsets
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com
  Target Milestone: ---

During a full testsuite run on 3.10.0-327.el7.ppc64.debug, I see the following
kernel bug:

====
May 02 17:51:01 <test machine> kernel: BUG: sleeping function called from
invalid context at kernel/fork.c:619
May 02 17:51:01 <test machine> kernel: in_atomic(): 1, irqs_disabled(): 0, pid:
5906, name: stapio
May 02 17:51:01 <test machine> kernel: INFO: lockdep is turned off.
May 02 17:51:01 <test machine> kernel: CPU: 13 PID: 5906 Comm: stapio Tainted:
G        W  OE  ------------   3.10.0-327.el7.ppc64.debug #1
May 02 17:51:01 <test machine> kernel: Call Trace:
May 02 17:51:01 <test machine> kernel: [c0000000a91e3780] [c000000000019690]
.show_stack+0x80/0x380 (unreliable)
May 02 17:51:01 <test machine> kernel: [c0000000a91e3850] [c000000000a36980]
.dump_stack+0x28/0x3c
May 02 17:51:01 <test machine> kernel: [c0000000a91e38c0] [c000000000136364]
.__might_sleep+0x1b4/0x2c0
May 02 17:51:01 <test machine> kernel: [c0000000a91e3950] [c0000000000cce80]
.mmput+0x30/0x190
May 02 17:51:01 <test machine> kernel: [c0000000a91e39e0] [d000000005b2aa54]
.function___global_task_exe_file__overload_0+0x2a4/0x2f0
[stap_22a43f1fda384d92571698daae551535__5906]
May 02 17:51:01 <test machine> kernel: [c0000000a91e3aa0] [d000000005b2cc7c]
.probe_4977+0x1ac/0x1140 [stap_22a43f1fda384d92571698daae551535__5906]
May 02 17:51:01 <test machine> kernel: [c0000000a91e3b50] [d000000005b2f0b0]
.enter_be_probe+0x1c0/0x360 [stap_22a43f1fda384d92571698daae551535__5906]
May 02 17:51:01 <test machine> kernel: [c0000000a91e3bf0] [d000000005b2fdf8]
.systemtap_module_init+0x578/0x660
[stap_22a43f1fda384d92571698daae551535__5906]
May 02 17:51:01 <test machine> kernel: [c0000000a91e3cc0] [d000000005b301cc]
._stp_ctl_write_cmd+0x2ec/0x800 [stap_22a43f1fda384d92571698daae551535__5906]
May 02 17:51:01 <test machine> kernel: [c0000000a91e3d80] [c00000000034cf6c]
.SyS_write+0x14c/0x400
May 02 17:51:01 <test machine> kernel: [c0000000a91e3e30] [c00000000000a188]
system_call+0x38/0xb4
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]