This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
- From: Keshavamurthy Anil S <anil dot s dot keshavamurthy at intel dot com>
- To: Systemtap <systemtap at sources dot redhat dot com>
- Date: Fri, 8 Sep 2006 11:09:48 -0700
- Subject: BUG: sleeping function called from invalid context at kernel/rwsem.c:20
- Reply-to: Keshavamurthy Anil S <anil dot s dot keshavamurthy at intel dot com>
Hi,
I am running a simple probe script which puts the
probes on sys_open() and trying to read the function arguments on
RHEL5 Beat1(2.6.17-1.2519.4.21.el5) kernel and I see lots of stack
dumps on the console. And with this many dumps on the console, the
system crawls :(
[root@csdor-tiger2 ~]# BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
Call Trace:
[<a000000100013e60>] show_stack+0x40/0xa0
sp=e00000002a33f760 bsp=e00000002a339390
[<a000000100013ef0>] dump_stack+0x30/0x60
sp=e00000002a33f930 bsp=e00000002a339378
[<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
sp=e00000002a33f930 bsp=e00000002a339350
[<a0000001000b5080>] down_read+0x20/0x60
sp=e00000002a33f930 bsp=e00000002a339330
[<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
sp=e00000002a33f930 bsp=e00000002a3392e0
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e00000002a33f9e0 bsp=e00000002a3392e0
[<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a339288
[<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a339268
[<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a339208
[<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
sp=e00000002a33fbb0 bsp=e00000002a339198
[<a000000100620b70>] notifier_call_chain+0x50/0xc0
sp=e00000002a33fbb0 bsp=e00000002a339160
[<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
sp=e00000002a33fbb0 bsp=e00000002a339130
[<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
sp=e00000002a33fbb0 bsp=e00000002a339108
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e00000002a33fc60 bsp=e00000002a339108
[<a0000001001527a0>] sys_open+0x0/0x80
sp=e00000002a33fe30 bsp=e00000002a3390c8
[<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
sp=e00000002a33fe30 bsp=e00000002a3390c8
[<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
sp=e00000002a340000 bsp=e00000002a3390c8
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
Call Trace:
[<a000000100013e60>] show_stack+0x40/0xa0
sp=e00000002a33f760 bsp=e00000002a339518
[<a000000100013ef0>] dump_stack+0x30/0x60
sp=e00000002a33f930 bsp=e00000002a339500
[<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
sp=e00000002a33f930 bsp=e00000002a3394d8
[<a0000001000b5080>] down_read+0x20/0x60
sp=e00000002a33f930 bsp=e00000002a3394b8
[<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
sp=e00000002a33f930 bsp=e00000002a339468
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e00000002a33f9e0 bsp=e00000002a339468
[<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a339410
[<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a3393e8
[<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
sp=e00000002a33fbb0 bsp=e00000002a339388
[<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
sp=e00000002a33fbb0 bsp=e00000002a339320
[<a000000100620b70>] notifier_call_chain+0x50/0xc0
sp=e00000002a33fbb0 bsp=e00000002a3392e8
[<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
sp=e00000002a33fbb0 bsp=e00000002a3392b8
[<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
sp=e00000002a33fbb0 bsp=e00000002a339290
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e00000002a33fc60 bsp=e00000002a339290
[<a0000001001527a0>] sys_open+0x0/0x80
sp=e00000002a33fe30 bsp=e00000002a339250
[<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
sp=e00000002a33fe30 bsp=e00000002a339250
[<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
sp=e00000002a340000 bsp=e00000002a339250
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
Call Trace:
[<a000000100013e60>] show_stack+0x40/0xa0
sp=e000000019c3f760 bsp=e000000019c39390
[<a000000100013ef0>] dump_stack+0x30/0x60
sp=e000000019c3f930 bsp=e000000019c39378
[<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
sp=e000000019c3f930 bsp=e000000019c39350
[<a0000001000b5080>] down_read+0x20/0x60
sp=e000000019c3f930 bsp=e000000019c39330
[<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
sp=e000000019c3f930 bsp=e000000019c392e0
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e000000019c3f9e0 bsp=e000000019c392e0
[<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c39288
[<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c39268
[<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c39208
[<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
sp=e000000019c3fbb0 bsp=e000000019c39198
[<a000000100620b70>] notifier_call_chain+0x50/0xc0
sp=e000000019c3fbb0 bsp=e000000019c39160
[<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
sp=e000000019c3fbb0 bsp=e000000019c39130
[<a00000010061e2a0>] ia64_bad_break+0x400/0x4a0
sp=e000000019c3fbb0 bsp=e000000019c39108
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e000000019c3fc60 bsp=e000000019c39108
[<a0000001001527a0>] sys_open+0x0/0x80
sp=e000000019c3fe30 bsp=e000000019c390c8
[<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
sp=e000000019c3fe30 bsp=e000000019c390c8
[<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
sp=e000000019c40000 bsp=e000000019c390c8
BUG: sleeping function called from invalid context at kernel/rwsem.c:20
in_atomic():0, irqs_disabled():1
Call Trace:
[<a000000100013e60>] show_stack+0x40/0xa0
sp=e000000019c3f760 bsp=e000000019c39518
[<a000000100013ef0>] dump_stack+0x30/0x60
sp=e000000019c3f930 bsp=e000000019c39500
[<a0000001000655b0>] __might_sleep+0x1b0/0x1e0
sp=e000000019c3f930 bsp=e000000019c394d8
[<a0000001000b5080>] down_read+0x20/0x60
sp=e000000019c3f930 bsp=e000000019c394b8
[<a000000100620250>] ia64_do_page_fault+0x110/0x9e0
sp=e000000019c3f930 bsp=e000000019c39468
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e000000019c3f9e0 bsp=e000000019c39468
[<a00000020134e270>] _stp_text_str+0x4f0/0x560 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c39410
[<a00000020134e3c0>] function_user_string_quoted+0xe0/0x100 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c393e8
[<a0000002013521a0>] enter_probe_718+0x640/0x1660 [stap_9350]
sp=e000000019c3fbb0 bsp=e000000019c39388
[<a00000010061ebc0>] kprobe_exceptions_notify+0x3a0/0xa20
sp=e000000019c3fbb0 bsp=e000000019c39320
[<a000000100620b70>] notifier_call_chain+0x50/0xc0
sp=e000000019c3fbb0 bsp=e000000019c392e8
[<a00000010009cd50>] atomic_notifier_call_chain+0x30/0x60
sp=e000000019c3fbb0 bsp=e000000019c392b8
[<a00000010061e2a0>] ia64_bad_b
sp=e000000019c3fbb0 bsp=e000000019c39290
[<a00000010000c700>] __ia64_leave_kernel+0x0/0x280
sp=e000000019c3fc60 bsp=e000000019c39290
[<a0000001001527a0>] sys_open+0x0/0x80
sp=e00000e000000019c39250
[<a00000010000c490>] __ia64_trace_syscall+0xd0/0x110
sp=e000000019c3fe30 bsp=e000000019c39250
[<a000000000010620>] __start_ivt_text+0xffffffff00010620/0x400
sp=e000000019c40000 bsp=e000000019c39250