This is the mail archive of the systemtap@sourceware.org mailing list for the systemtap project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

BUG: sleeping function called from invalid context at kernel/rwsem.c:20


Hi,
	I am running a simple probe script which puts the 
probes on sys_open() and trying to read the function arguments on
RHEL5 Beat1(2.6.17-1.2519.4.21.el5) kernel and I see lots of stack 
dumps on the console. And with this many dumps on the console, the
system crawls :(

[root@csdor-tiger2 ~]# BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1

Call Trace:
 [<a000000100013e60>] show_stack+0x40/0xa0
                                sp=e00000002a33f760 bsp=e00000002a339390
 [<a000000100013ef0>] dump_stack+0x30/0x60
                                sp=e00000002a33f930 bsp=e00000002a339378
 [<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
                                sp=e00000002a33f930 bsp=e00000002a339350
 [<a0000001000b5080>] down_read+0x20/0x60
                                sp=e00000002a33f930 bsp=e00000002a339330
 [<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
                                sp=e00000002a33f930 bsp=e00000002a3392e0
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e00000002a33f9e0 bsp=e00000002a3392e0
 [<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a339288
 [<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a339268
 [<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a339208
 [<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
                                sp=e00000002a33fbb0 bsp=e00000002a339198
 [<a000000100620b70>] notifier_call_chain+0x50/0xc0
                                sp=e00000002a33fbb0 bsp=e00000002a339160
 [<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
                                sp=e00000002a33fbb0 bsp=e00000002a339130
 [<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
                                sp=e00000002a33fbb0 bsp=e00000002a339108
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e00000002a33fc60 bsp=e00000002a339108
 [<a0000001001527a0>] sys_open+0x0/0x80
                                sp=e00000002a33fe30 bsp=e00000002a3390c8
 [<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
                                sp=e00000002a33fe30 bsp=e00000002a3390c8
 [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
                                sp=e00000002a340000 bsp=e00000002a3390c8
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1

Call Trace:
 [<a000000100013e60>] show_stack+0x40/0xa0
                                sp=e00000002a33f760 bsp=e00000002a339518
 [<a000000100013ef0>] dump_stack+0x30/0x60
                                sp=e00000002a33f930 bsp=e00000002a339500
 [<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
                                sp=e00000002a33f930 bsp=e00000002a3394d8
 [<a0000001000b5080>] down_read+0x20/0x60
                                sp=e00000002a33f930 bsp=e00000002a3394b8
 [<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
                                sp=e00000002a33f930 bsp=e00000002a339468
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e00000002a33f9e0 bsp=e00000002a339468
 [<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a339410
 [<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a3393e8
 [<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
                                sp=e00000002a33fbb0 bsp=e00000002a339388
 [<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
                                sp=e00000002a33fbb0 bsp=e00000002a339320
 [<a000000100620b70>] notifier_call_chain+0x50/0xc0
                                sp=e00000002a33fbb0 bsp=e00000002a3392e8
 [<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
                                sp=e00000002a33fbb0 bsp=e00000002a3392b8
 [<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
                                sp=e00000002a33fbb0 bsp=e00000002a339290
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e00000002a33fc60 bsp=e00000002a339290
 [<a0000001001527a0>] sys_open+0x0/0x80
                                sp=e00000002a33fe30 bsp=e00000002a339250
 [<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
                                sp=e00000002a33fe30 bsp=e00000002a339250
 [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
                                sp=e00000002a340000 bsp=e00000002a339250
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1

Call Trace:
 [<a000000100013e60>] show_stack+0x40/0xa0
                                sp=e000000019c3f760 bsp=e000000019c39390
 [<a000000100013ef0>] dump_stack+0x30/0x60
                                sp=e000000019c3f930 bsp=e000000019c39378
 [<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
                                sp=e000000019c3f930 bsp=e000000019c39350
 [<a0000001000b5080>] down_read+0x20/0x60
                                sp=e000000019c3f930 bsp=e000000019c39330
 [<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
                                sp=e000000019c3f930 bsp=e000000019c392e0
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e000000019c3f9e0 bsp=e000000019c392e0
 [<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c39288
 [<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c39268
 [<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c39208
 [<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
                                sp=e000000019c3fbb0 bsp=e000000019c39198
 [<a000000100620b70>] notifier_call_chain+0x50/0xc0
                                sp=e000000019c3fbb0 bsp=e000000019c39160
 [<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
                                sp=e000000019c3fbb0 bsp=e000000019c39130
 [<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
                                sp=e000000019c3fbb0 bsp=e000000019c39108
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e000000019c3fc60 bsp=e000000019c39108
 [<a0000001001527a0>] sys_open+0x0/0x80
                                sp=e000000019c3fe30 bsp=e000000019c390c8
 [<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
                                sp=e000000019c3fe30 bsp=e000000019c390c8
 [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
                                sp=e000000019c40000 bsp=e000000019c390c8
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1

Call Trace:
 [<a000000100013e60>] show_stack+0x40/0xa0
                                sp=e000000019c3f760 bsp=e000000019c39518
 [<a000000100013ef0>] dump_stack+0x30/0x60
                                sp=e000000019c3f930 bsp=e000000019c39500
 [<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
                                sp=e000000019c3f930 bsp=e000000019c394d8
 [<a0000001000b5080>] down_read+0x20/0x60
                                sp=e000000019c3f930 bsp=e000000019c394b8
 [<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
                                sp=e000000019c3f930 bsp=e000000019c39468
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e000000019c3f9e0 bsp=e000000019c39468
 [<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c39410
 [<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c393e8
 [<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
                                sp=e000000019c3fbb0 bsp=e000000019c39388
 [<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
                                sp=e000000019c3fbb0 bsp=e000000019c39320
 [<a000000100620b70>] notifier_call_chain+0x50/0xc0
                                sp=e000000019c3fbb0 bsp=e000000019c392e8
 [<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
                                sp=e000000019c3fbb0 bsp=e000000019c392b8
 [<a00000010061e2a0>] ia64_bad_b
                                sp=e000000019c3fbb0 bsp=e000000019c39290
 [<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
                                sp=e000000019c3fc60 bsp=e000000019c39290
 [<a0000001001527a0>] sys_open+0x0/0x80
                                sp=e00000e000000019c39250
 [<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
                                sp=e000000019c3fe30 bsp=e000000019c39250
 [<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
                                sp=e000000019c40000 bsp=e000000019c39250 


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]