Ticket #6760: input_server_st.txt

File input_server_st.txt, 10.8 KB (added by idefix, 13 years ago)

The stack traces of input_server.

Line 
1kdebug> teams
2team id parent name
30x84633390 125 0x82026c40 sh
40x82026e00 1 0x00000000 kernel_team
50x843e48c8 96 0x82026c40 Tracker
60x82026c40 34 0x82026e00 sh
70x843e4548 97 0x82026c40 Deskbar
80x843e4388 98 0x82026c40 media_server
90x843e41c8 99 0x82026c40 midi_server
100x843e4c48 68 0x82026c40 syslog_daemon
110x84633e10 100 0x82026c40 print_server
120x843e4008 133 0x843e4388 media_addon_server
130x84633710 102 0x82026c40 cddb_daemon
140x84633a90 103 0x82026c40 notification_server
150x846338d0 135 0x84633390 NetworkStatus
160x82026a80 44 0x82026c40 sh
170x82026700 46 0x82026c40 registrar
180x843e4708 78 0x820261c0 input_server
190x82026540 51 0x82026c40 debug_server
200x82026380 52 0x82026c40 net_server
210x820261c0 53 0x82026c40 app_server
220x843e4a88 87 0x82026c40 mount_server
230x84633c50 184 0x82026a80 kernel_debugger
24kdebug> threads 78
25thread id state wait for object cpu pri stack team name
260x844ebc10 78 waiting sem 516 - 20 0x81cb7000 78 input_server
270x844e98d0 84 waiting cvar 0x81c0d030 - 103 0x81cd2000 78 _input_server_event_loop_
280x844e92f0 85 waiting sem 511 - 10 0x81cd6000 78 add-on manager
290x844e8d10 86 waiting sem 511 - 10 0x81cda000 78 AddOnMonitor
300x844e8150 89 waiting cvar 0x81c0d15c - 10 0x81ce2000 78 PathMonitor looper
31kdebug> bt 78
32stack trace for thread 78 "input_server"
33 kernel stack: 0x81cb7000 to 0x81cbb000
34 user stack: 0x7efef000 to 0x7ffef000
35frame caller <image>:function + offset
36 0 81cbae24 (+ 48) 8006fd97 <kernel_x86> context_switch(thread*: 0x844ebc10, thread*: 0x844e8d10) + 0x003f
37 1 81cbae54 (+ 96) 800700b1 <kernel_x86> simple_reschedule() + 0x02d5
38 2 81cbaeb4 (+ 80) 8005a679 <kernel_x86>:switch_sem_etc + 0x0359
39 3 81cbaf04 (+ 64) 8005b315 <kernel_x86>:_user_acquire_sem_etc + 0x00a5
40 4 81cbaf44 (+ 100) 80108fa2 <kernel_x86>:handle_syscall + 0x00af
41user iframe at 0x81cbafa8 (end = 0x81cbb000)
42 eax 0xf ebx 0x5e930c ecx 0x7ffeea20 edx 0xffff0114
43 esi 0xffffffff edi 0x7fffffff ebp 0x7ffeea5c esp 0x81cbafdc
44 eip 0xffff0114 eflags 0x203 user esp 0x7ffeea20
45 vector: 0x63, error code: 0x0
46 5 81cbafa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
47 6 7ffeea5c (+ 64) 003007d6 <libbe.so> BLooper<0x18035120>::_LockComplete(BLooper*: 0x1, int32: 78, int32: 516, int32: -1, int64: 9223067388382019583) + 0x003e
48 7 7ffeea9c (+ 80) 00300737 <libbe.so> BLooper<0x18035120>::_Lock(BLooper*: 0xffffffff, int32: -1, int64: 9802732424658943) + 0x0177
49 8 7ffeeaec (+ 48) 002ffa74 <libbe.so> BLooper<0x18035120>::Lock(0x2) + 0x002c
50 9 7ffeeb1c (+ 544) 002215da <_APP_> BPrivate::Storage::AddOnMonitorHandler<0x1801aa50>::AddDirectory(node_ref*: 0x7ffeedec) + 0x003a
5110 7ffeed3c (+ 224) 00219946 <_APP_> AddOnManager<0x18022f20>::_RegisterAddOns(0x2ff8b6) + 0x028a
5211 7ffeee1c (+ 48) 0021968b <_APP_> AddOnManager<0x18022f20>::LoadState(0x212d9c) + 0x001f
5312 7ffeee4c (+ 224) 00212e2d <_APP_>:__11InputServer + 0x0411
5413 7ffeef2c (+ 64) 00217a09 <_APP_>:main + 0x0031
5514 7ffeef6c (+ 48) 002126ef <_APP_>:_start + 0x005b
5615 7ffeef9c (+ 64) 00105d32 </boot/system/runtime_loader@0x00100000>:unknown + 0x5d32
5716 7ffeefdc (+ 0) 7ffeefec 1781:input_server_main_stack@0x7efef000 + 0xffffec
58kdebug> bt 84
59stack trace for thread 84 "_input_server_event_loop_"
60 kernel stack: 0x81cd2000 to 0x81cd6000
61 user stack: 0x70000000 to 0x70040000
62frame caller <image>:function + offset
63 0 81cd5d94 (+ 48) 8006fd97 <kernel_x86> context_switch(thread*: 0x844e98d0, thread*: 0x844ebc10) + 0x003f
64 1 81cd5dc4 (+ 96) 800700b1 <kernel_x86> simple_reschedule() + 0x02d5
65 2 81cd5e24 (+ 64) 80046575 <kernel_x86> ConditionVariableEntry<0x81cd5ea8>::Wait(uint32: 0x1 (1), int64: 0) + 0x0199
66 3 81cd5e64 (+ 96) 800572aa <kernel_x86>:_get_port_message_info_etc + 0x0182
67 4 81cd5ec4 (+ 80) 80057119 <kernel_x86>:port_buffer_size_etc + 0x0025
68 5 81cd5f14 (+ 48) 80058370 <kernel_x86>:_user_port_buffer_size_etc + 0x009c
69 6 81cd5f44 (+ 100) 80108fa2 <kernel_x86>:handle_syscall + 0x00af
70user iframe at 0x81cd5fa8 (end = 0x81cd6000)
71 eax 0xca ebx 0x5e930c ecx 0x7003fef0 edx 0xffff0114
72 esi 0x216740 edi 0x1802da90 ebp 0x7003ff1c esp 0x81cd5fdc
73 eip 0xffff0114 eflags 0x206 user esp 0x7003fef0
74 vector: 0x63, error code: 0x0
75 7 81cd5fa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
76 8 7003ff1c (+ 96) 00216795 <_APP_> InputServer<0x18037240>::_EventLoop(0x0) + 0x002d
77 9 7003ff7c (+ 48) 0021675f <_APP_> InputServer<0x18037240>::_EventLooper(NULL) + 0x001f
7810 7003ffac (+ 48) 00542ab2 </boot/system/lib/libroot.so@0x00518000>:unknown + 0x2aab2
7911 7003ffdc (+ 0) 7003ffec 1816:_input_server_event_loop__84_st@0x70000000 + 0x3ffec
80kdebug> bt 85
81stack trace for thread 85 "add-on manager"
82 kernel stack: 0x81cd6000 to 0x81cda000
83 user stack: 0x70041000 to 0x70081000
84frame caller <image>:function + offset
85 0 81cd9e24 (+ 48) 8006fd97 <kernel_x86> context_switch(thread*: 0x844e92f0, thread*: 0x82165240) + 0x003f
86 1 81cd9e54 (+ 96) 800700b1 <kernel_x86> simple_reschedule() + 0x02d5
87 2 81cd9eb4 (+ 80) 8005a679 <kernel_x86>:switch_sem_etc + 0x0359
88 3 81cd9f04 (+ 64) 8005b315 <kernel_x86>:_user_acquire_sem_etc + 0x00a5
89 4 81cd9f44 (+ 100) 80108fa2 <kernel_x86>:handle_syscall + 0x00af
90user iframe at 0x81cd9fa8 (end = 0x81cda000)
91 eax 0xf ebx 0x5e930c ecx 0x70080e80 edx 0xffff0114
92 esi 0xffffffff edi 0x7fffffff ebp 0x70080ebc esp 0x81cd9fdc
93 eip 0xffff0114 eflags 0x203 user esp 0x70080e80
94 vector: 0x63, error code: 0x0
95 5 81cd9fa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
96 6 70080ebc (+ 64) 003007d6 <libbe.so> BLooper<0x18022f20>::_LockComplete(BLooper*: 0x1, int32: 85, int32: 511, int32: -1, int64: 2147483647) + 0x003e
97 7 70080efc (+ 80) 00300737 <libbe.so> BLooper<0x18022f20>::_Lock(BLooper*: 0xffffffff, int32: -1, int64: 21462022445072383) + 0x0177
98 8 70080f4c (+ 48) 002ffa74 <libbe.so> BLooper<0x18022f20>::Lock(0x0) + 0x002c
99 9 70080f7c (+ 48) 00300a7c <libbe.so> BLooper<0x18022f20>::_task0_(NULL) + 0x0020
10010 70080fac (+ 48) 00542ab2 </boot/system/lib/libroot.so@0x00518000>:unknown + 0x2aab2
10111 70080fdc (+ 0) 70080fec 1818:add-on manager_85_stack@0x70041000 + 0x3ffec
102kdebug> bt 86
103stack trace for thread 86 "AddOnMonitor"
104 kernel stack: 0x81cda000 to 0x81cde000
105 user stack: 0x70082000 to 0x700c2000
106frame caller <image>:function + offset
107 0 81cdde24 (+ 48) 8006fd97 <kernel_x86> context_switch(thread*: 0x844e8d10, thread*: 0x82166fa0) + 0x003f
108 1 81cdde54 (+ 96) 800700b1 <kernel_x86> simple_reschedule() + 0x02d5
109 2 81cddeb4 (+ 80) 8005a679 <kernel_x86>:switch_sem_etc + 0x0359
110 3 81cddf04 (+ 64) 8005b315 <kernel_x86>:_user_acquire_sem_etc + 0x00a5
111 4 81cddf44 (+ 100) 80108fa2 <kernel_x86>:handle_syscall + 0x00af
112user iframe at 0x81cddfa8 (end = 0x81cde000)
113 eax 0xf ebx 0x5e930c ecx 0x700c1a80 edx 0xffff0114
114 esi 0xffffffff edi 0x7fffffff ebp 0x700c1abc esp 0x81cddfdc
115 eip 0xffff0114 eflags 0x203 user esp 0x700c1a80
116 vector: 0x63, error code: 0x0
117 5 81cddfa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
118 6 700c1abc (+ 64) 003007d6 <libbe.so> BLooper<0x18022f20>::_LockComplete(BLooper*: 0x2, int32: 86, int32: 511, int32: -1, int64: 8073858316066881535) + 0x003e
119 7 700c1afc (+ 80) 00300737 <libbe.so> BLooper<0x18022f20>::_Lock(BLooper*: 0xffffffff, int32: -1, int64: 9802732424658943) + 0x0177
120 8 700c1b4c (+ 48) 002ffa74 <libbe.so> BLooper<0x18022f20>::Lock(0x22699d) + 0x002c
121 9 700c1b7c (+ 80) 0021a813 <_APP_> AddOnManager<0x18022f20>::_RegisterDevice(BInputServerDevice*: 0x18037188, entry_ref&: 0x700c1c00, int32: 637) + 0x002b
12210 700c1bcc (+ 96) 00219f2b <_APP_> AddOnManager<0x18022f20>::_RegisterAddOn(BEntry&: 0x700c1c6c) + 0x012f
12311 700c1c2c (+ 128) 0021dc8f <_APP_> AddOnManager::MonitorHandler<0x1801aa50>::AddOnEnabled(BPrivate::Storage::add_on_entry_info*: 0x700c1d68) + 0x006b
12412 700c1cac (+ 560) 002238c9 <_APP_> BPrivate::Storage::AddOnMonitorHandler<0x1801aa50>::_HandlePulse(0x0) + 0x0591
12513 700c1edc (+ 48) 00221588 <_APP_> BPrivate::Storage::AddOnMonitorHandler<0x1801aa50>::MessageReceived(BMessage*: 0x1801ab90) + 0x002c
12614 700c1f0c (+ 48) 002ff57f <libbe.so> BLooper<0x18035120>::DispatchMessage(BMessage*: 0x1801ab90, BHandler*: 0x1801aa50) + 0x005b
12715 700c1f3c (+ 64) 00300ea9 <libbe.so> BLooper<0x18035120>::task_looper(0x0) + 0x0205
12816 700c1f7c (+ 48) 00300a9b <libbe.so> BLooper<0x18035120>::_task0_(NULL) + 0x003f
12917 700c1fac (+ 48) 00542ab2 </boot/system/lib/libroot.so@0x00518000>:unknown + 0x2aab2
13018 700c1fdc (+ 0) 700c1fec 1820:AddOnMonitor_86_stack@0x70082000 + 0x3ffec
131kdebug> bt 89
132stack trace for thread 89 "PathMonitor looper"
133 kernel stack: 0x81ce2000 to 0x81ce6000
134 user stack: 0x700c3000 to 0x70103000
135frame caller <image>:function + offset
136 0 81ce5d54 (+ 48) 8006fd97 <kernel_x86> context_switch(thread*: 0x844e8150, thread*: 0x8216eb00) + 0x003f
137 1 81ce5d84 (+ 96) 800700b1 <kernel_x86> simple_reschedule() + 0x02d5
138 2 81ce5de4 (+ 48) 80068de9 <kernel_x86>:thread_block_with_timeout_locked + 0x00e1
139 3 81ce5e14 (+ 80) 80046516 <kernel_x86> ConditionVariableEntry<0x81ce5ea8>::Wait(uint32: 0x11 (17), int64: 9223372036854775807) + 0x013a
140 4 81ce5e64 (+ 96) 800572aa <kernel_x86>:_get_port_message_info_etc + 0x0182
141 5 81ce5ec4 (+ 80) 80057119 <kernel_x86>:port_buffer_size_etc + 0x0025
142 6 81ce5f14 (+ 48) 80058370 <kernel_x86>:_user_port_buffer_size_etc + 0x009c
143 7 81ce5f44 (+ 100) 80108fa2 <kernel_x86>:handle_syscall + 0x00af
144user iframe at 0x81ce5fa8 (end = 0x81ce6000)
145 eax 0xca ebx 0x5e930c ecx 0x70102e80 edx 0xffff0114
146 esi 0xffffffff edi 0x7fffffff ebp 0x70102eac esp 0x81ce5fdc
147 eip 0xffff0114 eflags 0x216 user esp 0x70102e80
148 vector: 0x63, error code: 0x0
149 8 81ce5fa8 (+ 0) ffff0114 <commpage>:commpage_syscall + 0x0004
150 9 70102eac (+ 48) 00300af2 <libbe.so> BLooper<0x18035050>::ReadRawFromPort(0x70102f08, int64: 9223372036854775807) + 0x002e
15110 70102edc (+ 48) 00300b7e <libbe.so> BLooper<0x18035050>::ReadMessageFromPort(int64: 9223372036854775807) + 0x002a
15211 70102f0c (+ 48) 0030024f <libbe.so> BLooper<0x18035050>::MessageFromPort(int64: 9223372036854775807) + 0x0027
15312 70102f3c (+ 64) 00300d17 <libbe.so> BLooper<0x18035050>::task_looper(0x0) + 0x0073
15413 70102f7c (+ 48) 00300a9b <libbe.so> BLooper<0x18035050>::_task0_(NULL) + 0x003f
15514 70102fac (+ 48) 00542ab2 </boot/system/lib/libroot.so@0x00518000>:unknown + 0x2aab2
15615 70102fdc (+ 0) 70102fec 1895:PathMonitor looper_89_stack@0x700c3000 + 0x3ffec
157