This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug runtime/22012] New: "BUG: scheduling while atomic" when probing syscall.open


https://sourceware.org/bugzilla/show_bug.cgi?id=22012

            Bug ID: 22012
           Summary: "BUG: scheduling while atomic" when probing
                    syscall.open
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: runtime
          Assignee: systemtap at sourceware dot org
          Reporter: dsmith at redhat dot com
  Target Milestone: ---

As pointed out on <https://sourceware.org/ml/systemtap/2017-q3/msg00138.html>,
systemtap is causing a "scheduling while atomic" kernel BUG. On
2.6.32-696.el6.x86_64, I see the following on the console:

====
BUG: scheduling while atomic: cat/9364/0x10000001
Modules linked in: stap_a7fed8dff239047398357464673d4de7_31235(U) ib_ipoib
rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core
ib_addr ipv6 microcode joydev virtio_balloon virtio_console virtio_net
i2c_piix4 i2c_core ext4 jbd2 mbcache virtio_blk virtio_pci virtio_ring virtio
pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last
unloaded: speedstep_lib]
Pid: 9364, comm: cat Not tainted 2.6.32-696.el6.x86_64 #1
Call Trace:
 <#DB>  [<ffffffff81068224>] ? __schedule_bug+0x44/0x50
 [<ffffffff8154acec>] ? schedule+0xa4c/0xb70
 [<ffffffff812a6126>] ? vsnprintf+0x336/0x5e0
 [<ffffffff81073fca>] ? __cond_resched+0x2a/0x40
 [<ffffffff8154b0e0>] ? _cond_resched+0x30/0x40
 [<ffffffff812a8aaa>] ? strncpy_from_user+0x4a/0x90
 [<ffffffffa02aa4aa>] ?
function___global_user_string_quoted__overload_0+0x4ea/0x930
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff812a378a>] ? strlcpy+0x4a/0x60
 [<ffffffffa02a95fc>] ? _stp_map_set_is+0x14c/0x1b0
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff81196b91>] ? sys_open+0x1/0x30
 [<ffffffffa02aaa1b>] ? probe_3674+0x12b/0x300
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffffa02ad79f>] ? enter_kprobe_probe+0x1df/0x390
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff8155119b>] ? aggr_pre_handler+0x5b/0xb0
 [<ffffffff81196b90>] ? sys_open+0x0/0x30
 [<ffffffff81196b91>] ? sys_open+0x1/0x30
 [<ffffffff81550bb5>] ? kprobe_exceptions_notify+0x3d5/0x430
 [<ffffffff81550e25>] ? notifier_call_chain+0x55/0x80
 [<ffffffff81550e8a>] ? atomic_notifier_call_chain+0x1a/0x20
 [<ffffffff810acc1e>] ? notify_die+0x2e/0x30
 [<ffffffff8154e6f5>] ? do_int3+0x35/0xb0
 [<ffffffff8154df63>] ? int3+0x33/0x40
 [<ffffffff81196b90>] ? sys_open+0x0/0x30
 <<EOE>>  [<ffffffff8100b0d2>] ? system_call_fastpath+0x16/0x1b
BUG: scheduling while atomic: cat/16003/0x10000001
Modules linked in: stap_a7fed8dff239047398357464673d4de7_31235(U) ib_ipoib
rdma_ucm ib_ucm ib_uverbs ib_umad rdma_cm ib_cm iw_cm ib_sa ib_mad ib_core
ib_addr ipv6 microcode joydev virtio_balloon virtio_console virtio_net
i2c_piix4 i2c_core ext4 jbd2 mbcache virtio_blk virtio_pci virtio_ring virtio
pata_acpi ata_generic ata_piix dm_mirror dm_region_hash dm_log dm_mod [last
unloaded: speedstep_lib]
Pid: 16003, comm: cat Not tainted 2.6.32-696.el6.x86_64 #1
Call Trace:
 <#DB>  [<ffffffff81068224>] ? __schedule_bug+0x44/0x50
 [<ffffffff8154acec>] ? schedule+0xa4c/0xb70
 [<ffffffff812a6126>] ? vsnprintf+0x336/0x5e0
 [<ffffffff81073fca>] ? __cond_resched+0x2a/0x40
 [<ffffffff8154b0e0>] ? _cond_resched+0x30/0x40
 [<ffffffff812a8aaa>] ? strncpy_from_user+0x4a/0x90
 [<ffffffffa02aa4aa>] ?
function___global_user_string_quoted__overload_0+0x4ea/0x930
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff812a378a>] ? strlcpy+0x4a/0x60
 [<ffffffffa02a95fc>] ? _stp_map_set_is+0x14c/0x1b0
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff81196b91>] ? sys_open+0x1/0x30
 [<ffffffffa02aaa1b>] ? probe_3674+0x12b/0x300
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffffa02ad79f>] ? enter_kprobe_probe+0x1df/0x390
[stap_a7fed8dff239047398357464673d4de7_31235]
 [<ffffffff8155119b>] ? aggr_pre_handler+0x5b/0xb0
 [<ffffffff81196b90>] ? sys_open+0x0/0x30
 [<ffffffff81196b91>] ? sys_open+0x1/0x30
 [<ffffffff81550bb5>] ? kprobe_exceptions_notify+0x3d5/0x430
 [<ffffffff81550e25>] ? notifier_call_chain+0x55/0x80
 [<ffffffff81550e8a>] ? atomic_notifier_call_chain+0x1a/0x20
 [<ffffffff810acc1e>] ? notify_die+0x2e/0x30
 [<ffffffff8154e6f5>] ? do_int3+0x35/0xb0
 [<ffffffff8154df63>] ? int3+0x33/0x40
 [<ffffffff81196b90>] ? sys_open+0x0/0x30
 <<EOE>>  [<ffffffff8100b0d2>] ? system_call_fastpath+0x16/0x1b
====

-- 
You are receiving this mail because:
You are the assignee for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]