Ticket #11032: kdl_log3.txt

File kdl_log3.txt, 11.5 KB (added by zhuowei, 10 years ago)

output of running, thread, sc, and spinlock commands in the kernel debugger

Line 
1devfs: reload driver "ice1712" (4, 11255)
2devfs: reload driver "emuxki" (4, 11257)
3emuxki: init_hardware()
4slab memory manager: created area 0xd1801000 (7330)
5slab memory manager: created area 0xd4001000 (7340)
6ps2: strange mouse data, x-delta -256, trying resync
7ps2: strange mouse data, x/y overflow, trying resync
8ps2: bad mouse data, trying resync
9ps2: strange mouse data, y-delta 116, trying resync
10ps2: bad mouse data, trying resync
11ps2: strange mouse data, y-delta 116, trying resync
12ps2: bad mouse data, trying resync
13slab memory manager: created area 0xd4801000 (7782)
14vm_soft_fault: va 0x0 not covered by area in address space
15vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0xc, ip 0x8951d6, write 0, user 1, thread 0x58d
16vm_page_fault: thread "pthread func" (1421) in team "template.test" (1418) tried to read address 0xc, ip 0x8951d6 ("template.test_seg0ro" +0xd61d6)
17debug_server: Thread 1421 entered the debugger: Segment violation
18stack trace, current PC 0x8951d6 html/template.(*Error).Error + 0x36:
19vm_soft_fault: va 0x0 not covered by area in address space
20vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x76, ip 0x801335c3, write 0, user 0, thread 0x58f
21register_domain(9, unix)
22debug_server: Killing team 1418 (/tmp/go-build715127384/html/template/_test/template.test -test.)
23debug_server: TeamDebugHandler::Init(): Failed to get info for team 1418: Operation on invalid team
24debug_server: KillTeam(): Error getting info for team 1418: Operation on invalid team
25debug_server: Killing team 1418 ()
26runtime_loader: Cannot open file /usr/bin/perl: No such file or directory
27vm_soft_fault: va 0x0 not covered by area in address space
28vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x7, ip 0x1e78384, write 0, user 1, thread 0x748
29vm_page_fault: thread "pthread func" (1864) in team "exec.test" (1864) tried to read address 0x7, ip 0x1e78384 ("exec.test_seg0ro" +0x109384)
30debug_server: Thread 1864 entered the debugger: Segment violation
31stack trace, current PC 0x1e78384 runtime.asmsysvicall6 + 0x34:
32 (0x7123239c) 0x128c3c (mmap area + 0xbc3c)
33 (0x1e77525) 0x8b000000
34slab memory manager: created area 0xd5001000 (64865)
35vm_soft_fault: va 0x0 not covered by area in address space
36vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x81f5c9, write 1, user 1, thread 0x7e0
37vm_page_fault: thread "main" (2016) in team "main" (2016) tried to write address 0x0, ip 0x81f5c9 ("main_seg0ro" +0x3c5c9)
38debug_server: Thread 2016 entered the debugger: Segment violation
39stack trace, current PC 0x81f5c9 main.test + 0x159:
40PANIC: acquire_spinlock(): Failed to acquire spinlock 0xd0b48bb8 for a long time!
41Welcome to Kernel Debugging Land...
42Thread 2044 "pthread func" running on CPU 1
43stack trace for thread 2044 "pthread func"
44 kernel stack: 0x8023e000 to 0x80242000
45 user stack: 0x7122d000 to 0x7126d000
46frame caller <image>:function + offset
47 0 80241d10 (+ 32) 80141942 <kernel_x86> arch_debug_stack_trace + 0x12
48 1 80241d30 (+ 16) 800a187f <kernel_x86> stack_trace_trampoline(NULL) + 0x0b
49 2 80241d40 (+ 12) 8013367e <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
50 3 80241d4c (+ 48) 800a33ea <kernel_x86> debug_call_with_fault_handler + 0x5a
51 4 80241d7c (+ 64) 800a1a9b <kernel_x86> kernel_debugger_loop(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x217
52 5 80241dbc (+ 48) 800a1e17 <kernel_x86> kernel_debugger_internal(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x53
53 6 80241dec (+ 48) 800a3772 <kernel_x86> panic + 0x3a
54 7 80241e1c (+ 48) 80073453 <kernel_x86> acquire_spinlock + 0x57
55 8 80241e4c (+ 224) 80093319 <kernel_x86> reschedule(int32: 2) + 0x129
56 9 80241f2c (+ 48) 800942a1 <kernel_x86> scheduler_reschedule + 0x61
5710 80241f5c (+ 64) 80142f6d <kernel_x86> x86_hardware_interrupt + 0xe1
5811 80241f9c (+ 12) 801360be <kernel_x86> int_bottom_user + 0x73
59user iframe at 0x80241fa8 (end = 0x80242000)
60 eax 0xb4d67bdb ebx 0x10b98400 ecx 0x10bc6350 edx 0x8350
61 esi 0x10b9876c edi 0x186a0 ebp 0x11010b5c esp 0x80241fdc
62 eip 0x1acbfe4 eflags 0x13206 user esp 0x18cda8
63 vector: 0xfb, error code: 0x0
6412 80241fa8 (+ 0) 01acbfe4 <pprof.test> main (nearest) + 0x75e94
6511010b5c -- read fault
66kdebug> running
67thread id state wait for object cpu pri stack team name
680xd0ab4320 2042 running - 0 10 0x82223000 2041 pthread func
690xd0ab0020 2044 running - 1 10 0x8023e000 2041 pthread func
70kdebug> thread 2042
71THREAD: 0xd0ab4320
72id: 2042 (0x7fa)
73serial_number: 2042
74name: "pthread func"
75hash_next: 0x00000000
76team_next: 0xd435f740
77priority: 10 (I/O: -1)
78state: running
79cpu: 0x801be5c0 (0)
80sig_pending: 0x0 (blocked: 0x0, before sigsuspend(): 0x0)
81in_kernel: 1
82fault_handler: 0x00000000
83team: 0xd0b48a08, "pprof.test"
84 exit.sem: 14441
85 exit.status: 0x0 (No error)
86 exit.waiters:
87kernel_stack_area: 72597
88kernel_stack_base: 0x82223000
89user_stack_area: 72598
90user_stack_base: 0x7128f000
91user_local_storage: 0x712cf000
92user_thread: 0x611e0040
93kernel_errno: 0x0 (No error)
94kernel_time: 516
95user_time: 91
96flags: 0x0
97architecture dependant section:
98 esp: 0x82226cb8
99 ss: 0x82870010
100 fpu_state at 0xd0ab4510
101scheduler data:
102 priority_penalty: 0
103 additional_penalty: 6 (44496)
104 effective_priority: 4
105 time_used: 404 us (quantum: 3800 us)
106 stolen_time: 0 us
107 quantum_start: 696343224 us
108 needed_load: 24%
109 went_sleep: 696343150
110 went_sleep_active: 154891140
111 core: 0
112kdebug> thread 2044
113THREAD: 0xd0ab0020
114id: 2044 (0x7fc)
115serial_number: 2044
116name: "pthread func"
117hash_next: 0x82a4eec0
118team_next: 0xd435fb70
119priority: 10 (I/O: -1)
120state: running
121cpu: 0x801be7e4 (1)
122sig_pending: 0x0 (blocked: 0x0, before sigsuspend(): 0x0)
123in_kernel: 1
124fault_handler: 0x00000000
125team: 0xd0b48a08, "pprof.test"
126 exit.sem: 14450
127 exit.status: 0x0 (No error)
128 exit.waiters:
129kernel_stack_area: 72602
130kernel_stack_base: 0x8023e000
131user_stack_area: 72603
132user_stack_base: 0x7122d000
133user_local_storage: 0x7126d000
134user_thread: 0x611e00c0
135kernel_errno: 0x0 (No error)
136kernel_time: 358
137user_time: 1884
138flags: 0x0
139architecture dependant section:
140 esp: 0x80241fa4
141 ss: 0x00000010
142 fpu_state at 0xd0ab0210
143scheduler data:
144 priority_penalty: 8
145 additional_penalty: 0 (44478)
146 effective_priority: 2
147 time_used: 2039 us (quantum: 4400 us)
148 stolen_time: 12 us
149 quantum_start: 696342067 us
150 needed_load: 99%
151 went_sleep: 0
152 went_sleep_active: 0
153 core: 1
154kdebug> spinlock 0xd0b48bb8
155spinlock 0xd0b48bb8:
156 locked from 0x00000000
157kdebug> sc 2042
158stack trace for thread 2042 "pthread func"
159 kernel stack: 0x82223000 to 0x82227000
160 user stack: 0x7128f000 to 0x712cf000
161frame caller <image>:function + offset
162 0 82226b84 (+ 48) 80073e22 <kernel_x86> process_pending_ici(int32: 0) + 0xd6
163 1 82226bb4 (+ 48) 80073461 <kernel_x86> acquire_spinlock + 0x65
164 2 82226be4 (+ 64) 8007855e <kernel_x86> BKernel::Team<0xd0b48a08>::CPUTime(BKernel::Team: 0x6c00, true) + 0x6e
165 3 82226c24 (+ 80) 8008aba8 <kernel_x86> BKernel::TeamTimeUserTimer<0xd0c2d468>::_Update(false) + 0x7c
166 4 82226c74 (+ 48) 8008a953 <kernel_x86> BKernel::TeamTimeUserTimer<0xd0c2d468>::Update(BKernel::Thread*: NULL) + 0x67
167 5 82226ca4 (+ 48) 8008cda6 <kernel_x86> user_timer_continue_cpu_timers + 0x52
168 6 82226cd4 (+ 64) 8009311e <kernel_x86> thread_resumes(BKernel::Thread*: 0xd0ab4320) + 0xa6
169 7 82226d14 (+ 240) 80094206 <kernel_x86> reschedule(int32: 6) + 0x1016
170 8 82226e04 (+ 48) 800942a1 <kernel_x86> scheduler_reschedule + 0x61
171 9 82226e34 (+ 96) 80086382 <kernel_x86> thread_block_with_timeout + 0x1ae
17210 82226e94 (+ 80) 80082ee6 <kernel_x86> common_snooze_etc(int64: 696343159, int32: 0, uint32: 0x15 (21), NULL) + 0x9e
17311 82226ee4 (+ 96) 80087480 <kernel_x86> _user_snooze_etc + 0xac
17412 82226f44 (+ 100) 8013623f <kernel_x86> handle_syscall + 0xdc
175user iframe at 0x82226fa8 (end = 0x82227000)
176 eax 0xb9 ebx 0xc13d6c ecx 0x712ce834 edx 0x6203a114
177 esi 0x14 edi 0x0 ebp 0x712ce860 esp 0x82226fdc
178 eip 0x6203a114 eflags 0x3202 user esp 0x712ce834
179 vector: 0x63, error code: 0x0
18013 82226fa8 (+ 0) 6203a114 <commpage> commpage_syscall + 0x04
18114 712ce860 (+ 48) 00bdbbab <libroot.so> usleep + 0x31
18215 712ce890 (+ 12) 01a561b8 <pprof.test> main (nearest) + 0x68
18316 712ce89c (+ 0) 10b78290 72591:mmap area@0x10b60000 + 0x18290
18417 01a55355 (+ 0) 8b000000
185fc0d8b64 -- read fault
186kdebug> sc 2044
187stack trace for thread 2044 "pthread func"
188 kernel stack: 0x8023e000 to 0x80242000
189 user stack: 0x7122d000 to 0x7126d000
190frame caller <image>:function + offset
191 0 80241b00 (+ 48) 800a44d0 <kernel_x86> invoke_command_trampoline(0x80241b98) + 0x1c
192 1 80241b30 (+ 12) 8013367e <kernel_x86> arch_debug_call_with_fault_handler + 0x1b
193 2 80241b3c (+ 48) 800a33ea <kernel_x86> debug_call_with_fault_handler + 0x5a
194 3 80241b6c (+ 64) 800a4729 <kernel_x86> invoke_debugger_command + 0xb9
195 4 80241bac (+ 64) 800a4555 <kernel_x86> invoke_pipe_segment(debugger_command_pipe*: 0xcce38030, int32: 0, 0x0 "<NULL>") + 0x79
196 5 80241bec (+ 64) 800a4894 <kernel_x86> invoke_debugger_command_pipe + 0x9c
197 6 80241c2c (+ 48) 800a67d4 <kernel_x86> ExpressionParser<0x80241cdc>::_ParseCommandPipe(0x80241cd8) + 0x234
198 7 80241c5c (+ 64) 800a59f4 <kernel_x86> ExpressionParser<0x80241cdc>::EvaluateCommand(0x801b76c0 "sc 2044", 0x80241cd8) + 0x2d0
199 8 80241c9c (+ 224) 800a7e20 <kernel_x86> evaluate_debug_command + 0x80
200 9 80241d7c (+ 64) 800a1baa <kernel_x86> kernel_debugger_loop(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x326
20110 80241dbc (+ 48) 800a1e17 <kernel_x86> kernel_debugger_internal(0x80184777 "PANIC: ", 0x80165e20 "acquire_spinlock(): Failed to acquire spinlock %p for a long time!", 0x80241e28 "▒▒▒▒L$▒04▒▒▒", int32: 1) + 0x53
20211 80241dec (+ 48) 800a3772 <kernel_x86> panic + 0x3a
20312 80241e1c (+ 48) 80073453 <kernel_x86> acquire_spinlock + 0x57
20413 80241e4c (+ 224) 80093319 <kernel_x86> reschedule(int32: 2) + 0x129
20514 80241f2c (+ 48) 800942a1 <kernel_x86> scheduler_reschedule + 0x61
20615 80241f5c (+ 64) 80142f6d <kernel_x86> x86_hardware_interrupt + 0xe1
20716 80241f9c (+ 12) 801360be <kernel_x86> int_bottom_user + 0x73
208user iframe at 0x80241fa8 (end = 0x80242000)
209 eax 0xb4d67bdb ebx 0x10b98400 ecx 0x10bc6350 edx 0x8350
210 esi 0x10b9876c edi 0x186a0 ebp 0x11010b5c esp 0x80241fdc
211 eip 0x1acbfe4 eflags 0x13206 user esp 0x18cda8
212 vector: 0xfb, error code: 0x0
21317 80241fa8 (+ 0) 01acbfe4 <pprof.test> main (nearest) + 0x75e94
21411010b5c -- read fault