This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug runtime/22012] New: "BUG: scheduling while atomic" when probing syscall.open
- From: "dsmith at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Fri, 25 Aug 2017 14:21:05 +0000
- Subject: [Bug runtime/22012] New: "BUG: scheduling while atomic" when probing syscall.open
- Auto-submitted: auto-generated
https://sourceware.org/bugzilla/show_bug.cgi?id=22012
Bug ID: 22012
Summary: "BUG: scheduling while atomic" when probing
syscall.open
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: runtime
Assignee: systemtap at sourceware dot org
Reporter: dsmith at redhat dot com
Target Milestone: ---
As pointed out on <https://sourceware.org/ml/systemtap/2017-q3/msg00138.html>,
systemtap is causing a "scheduling while atomic" kernel BUG. On
2.6.32-696.el6.x86_64, I see the following on the console:
====
BUG: scheduling while atomic: cat/9364/0x10000001
Modules linked in: stap_a7fed8dff239047398357464673d4de7_31235(U) ib_ipoib
rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core
ib_addr ipv6 microcode joydev virtio_balloon virtio_console virtio_net
i2c_piix4 i2c_core ext4 jbd2 mbcache virtio_blk virtio_pci virtio_ring virtio
pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last
unloaded: speedstep_lib]
Pid: 9364, comm: cat Not tainted 2.6.32-696.el6.x86_64 #1
Call Trace:
<#DB> [<ffffffff81068224>] ? __schedule_bug+0x44/0x50
[<ffffffff8154acec>] ? schedule+0xa4c/0xb70
[<ffffffff812a6126>] ? vsnprintf+0x336/0x5e0
[<ffffffff81073fca>] ? __cond_resched+0x2a/0x40
[<ffffffff8154b0e0>] ? _cond_resched+0x30/0x40
[<ffffffff812a8aaa>] ? strncpy_from_user+0x4a/0x90
[<ffffffffa02aa4aa>] ?
function___global_user_string_quoted__overload_0+0x4ea/0x930
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff812a378a>] ? strlcpy+0x4a/0x60
[<ffffffffa02a95fc>] ? _stp_map_set_is+0x14c/0x1b0
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff81196b91>] ? sys_open+0x1/0x30
[<ffffffffa02aaa1b>] ? probe_3674+0x12b/0x300
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffffa02ad79f>] ? enter_kprobe_probe+0x1df/0x390
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff8155119b>] ? aggr_pre_handler+0x5b/0xb0
[<ffffffff81196b90>] ? sys_open+0x0/0x30
[<ffffffff81196b91>] ? sys_open+0x1/0x30
[<ffffffff81550bb5>] ? kprobe_exceptions_notify+0x3d5/0x430
[<ffffffff81550e25>] ? notifier_call_chain+0x55/0x80
[<ffffffff81550e8a>] ? atomic_notifier_call_chain+0x1a/0x20
[<ffffffff810acc1e>] ? notify_die+0x2e/0x30
[<ffffffff8154e6f5>] ? do_int3+0x35/0xb0
[<ffffffff8154df63>] ? int3+0x33/0x40
[<ffffffff81196b90>] ? sys_open+0x0/0x30
<<EOE>> [<ffffffff8100b0d2>] ? system_call_fastpath+0x16/0x1b
BUG: scheduling while atomic: cat/16003/0x10000001
Modules linked in: stap_a7fed8dff239047398357464673d4de7_31235(U) ib_ipoib
rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core
ib_addr ipv6 microcode joydev virtio_balloon virtio_console virtio_net
i2c_piix4 i2c_core ext4 jbd2 mbcache virtio_blk virtio_pci virtio_ring virtio
pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last
unloaded: speedstep_lib]
Pid: 16003, comm: cat Not tainted 2.6.32-696.el6.x86_64 #1
Call Trace:
<#DB> [<ffffffff81068224>] ? __schedule_bug+0x44/0x50
[<ffffffff8154acec>] ? schedule+0xa4c/0xb70
[<ffffffff812a6126>] ? vsnprintf+0x336/0x5e0
[<ffffffff81073fca>] ? __cond_resched+0x2a/0x40
[<ffffffff8154b0e0>] ? _cond_resched+0x30/0x40
[<ffffffff812a8aaa>] ? strncpy_from_user+0x4a/0x90
[<ffffffffa02aa4aa>] ?
function___global_user_string_quoted__overload_0+0x4ea/0x930
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff812a378a>] ? strlcpy+0x4a/0x60
[<ffffffffa02a95fc>] ? _stp_map_set_is+0x14c/0x1b0
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff81196b91>] ? sys_open+0x1/0x30
[<ffffffffa02aaa1b>] ? probe_3674+0x12b/0x300
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffffa02ad79f>] ? enter_kprobe_probe+0x1df/0x390
[stap_a7fed8dff239047398357464673d4de7_31235]
[<ffffffff8155119b>] ? aggr_pre_handler+0x5b/0xb0
[<ffffffff81196b90>] ? sys_open+0x0/0x30
[<ffffffff81196b91>] ? sys_open+0x1/0x30
[<ffffffff81550bb5>] ? kprobe_exceptions_notify+0x3d5/0x430
[<ffffffff81550e25>] ? notifier_call_chain+0x55/0x80
[<ffffffff81550e8a>] ? atomic_notifier_call_chain+0x1a/0x20
[<ffffffff810acc1e>] ? notify_die+0x2e/0x30
[<ffffffff8154e6f5>] ? do_int3+0x35/0xb0
[<ffffffff8154df63>] ? int3+0x33/0x40
[<ffffffff81196b90>] ? sys_open+0x0/0x30
<<EOE>> [<ffffffff8100b0d2>] ? system_call_fastpath+0x16/0x1b
====
--
You are receiving this mail because:
You are the assignee for the bug.