Hi
        using kbd-1.5 (final) with test9-pre9 I have got 

Enter <q> to end, <cr> to continue:
NMI Watchdog detected LOCKUP on CPU1, regist: CPU:    1

That happened while playing with the debugger in an SMP system.  Could
be that you forgot to deactivate the NMI watchdog at kdb entry????

Just a guess.

THe message after the Oops is:

kdb: Debugger re-entered on cpu 1, new reason = 10
     Forced recursion is set
     Attempting recursive mode

Notice that if I went to kdb and return to normal mode in less that
one minute, I don't get that Oops.

Later, Juan.

The Ooops message (I have to use ksymoops to do that) is:

ksymoops 2.3.4 on i686 2.4.0-test9.  Options used
     -V (default)
     -K (specified)
     -L (specified)
     -O (specified)
     -m System.map (specified)

CPU:    1
EIP:    0010:[<c01ce2d2>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00000002
eax: c01ce260   ebx: c027141c   ecx: 000003f8   edx: 000003fd
esi: c12f9c9c   edi: 0000004e   ebp: c12f9c9c   esp: c12f9c20
ds: 0018   es: 0018   ss: 0018
Process swapper (pid: 0, stackpage=c12f9000)
Stack: c027141c c12f9c9c c01ce392 00000050 c12f9c9c c01f71c5 c12f9f7c c017035f 
       c12f9c9c 00000050 c017038a c12f9c9c 00000050 c01f7200 00000001 c12f9d38 
       c7e46000 c016f8e9 c12f9c9c 00000050 c01f7200 00000800 c02cfd80 c12f8000 
Call Trace: [<c01ce392>] [<c01f71c5>] [<c017035f>] [<c017038a>] [<c01f7200>] [< 
       [<c01af3aa>] [<c016dd9d>] [<c01f6ee6>] [<c01ce260>] [<c01ce260>] [<c01ce 
       [<c017035f>] [<c017038a>] [<c01f6519>] [<c016e0d3>] [<c01f6519>] [<c01f6 
       [<c01a09ba>] [<c01b83f6>] [<c01b8200>] [<c010de70>] [<c010ac51>] [<c0185 
       [<c01cf178>] [<c0211b9b>] [<c0211b9b>] [<c0211b9b>] [<c01cf5c0>] [<c0211 
       [<c0177a06>] [<c010ac51>] [<c010ae36>] [<c0107170>] [<c0107170>] [<c0109 
       [<c0100018>] [<c010719d>] [<c0107202>] [<c0119e1c>] [<c010ae75>] 
Code: a8 01 74 3a 89 ca ec 88 c3 80 fb 7f 75 02 b3 08 0f b6 f3 80 

>>EIP; c01ce2d2 <get_serial_char+16/5c>   <=====
Trace; c01ce392 <kdba_read+2e/8c>
Trace; c01f71c5 <__nenv+ca1/33bc>
Trace; c017035f <kdb_read+f/14>
Trace; c017038a <kdb_getstr+26/2c>
Trace; c01f7200 <__nenv+cdc/33bc>
Trace; c01af3aa <tcp_delete_keepalive_timer+1a/28>
Trace; c016dd9d <kdb_parse+191/238>
Trace; c01f6ee6 <__nenv+9c2/33bc>
Trace; c01ce260 <kdba_id_printinsn+0/20>
Trace; c01ce260 <kdba_id_printinsn+0/20>
Trace; c017035f <kdb_read+f/14>
Trace; c017038a <kdb_getstr+26/2c>
Trace; c01f6519 <__nkdb_err+81/8c>
Trace; c016e0d3 <kdb_local+28f/2d0>
Trace; c01f6519 <__nkdb_err+81/8c>
Trace; c01a09ba <ip_build_xmit+276/308>
Trace; c01b83f6 <icmp_reply+16e/18c>
Trace; c01b8200 <icmp_glue_bits+0/88>
Trace; c010de70 <timer_interrupt+a8/134>
Trace; c010ac51 <handle_IRQ_event+59/84>
Trace; c01cf178 <kdba_getregcontents+130/278>
Trace; c0211b9b <msstab+5e89/5ea6>
Trace; c0211b9b <msstab+5e89/5ea6>
Trace; c0211b9b <msstab+5e89/5ea6>
Trace; c01cf5c0 <kdba_save_thread+34/3c>
Trace; c0177a06 <rs_interrupt_single+42/88>
Trace; c010ac51 <handle_IRQ_event+59/84>
Trace; c010ae36 <do_IRQ+a6/f4>
Trace; c0107170 <default_idle+0/34>
Trace; c0107170 <default_idle+0/34>
Trace; c0100018 <startup_32+18/cc>
Trace; c010719d <default_idle+2d/34>
Trace; c0107202 <cpu_idle+3e/54>
Trace; c0119e1c <do_softirq+5c/8c>
Trace; c010ae75 <do_IRQ+e5/f4>
Code;  c01ce2d2 <get_serial_char+16/5c>
00000000 <_EIP>:
Code;  c01ce2d2 <get_serial_char+16/5c>   <=====
   0:   a8 01                     test   $0x1,%al   <=====
Code;  c01ce2d4 <get_serial_char+18/5c>
   2:   74 3a                     je     3e <_EIP+0x3e> c01ce310 
<get_serial_char+54/5c>
Code;  c01ce2d6 <get_serial_char+1a/5c>
   4:   89 ca                     mov    %ecx,%edx
Code;  c01ce2d8 <get_serial_char+1c/5c>
   6:   ec                        in     (%dx),%al
Code;  c01ce2d9 <get_serial_char+1d/5c>
   7:   88 c3                     mov    %al,%bl
Code;  c01ce2db <get_serial_char+1f/5c>
   9:   80 fb 7f                  cmp    $0x7f,%bl
Code;  c01ce2de <get_serial_char+22/5c>
   c:   75 02                     jne    10 <_EIP+0x10> c01ce2e2 
<get_serial_char+26/5c>
Code;  c01ce2e0 <get_serial_char+24/5c>
   e:   b3 08                     mov    $0x8,%bl
Code;  c01ce2e2 <get_serial_char+26/5c>
  10:   0f b6 f3                  movzbl %bl,%esi
Code;  c01ce2e5 <get_serial_char+29/5c>
  13:   80 00 00                  addb   $0x0,(%eax)



-- 
In theory, practice and theory are the same, but in practice they 
are different -- Larry McVoy

Reply via email to