Hello,

 While I was debugging 2.4.21 kernel with kdb v4.3, a cpu hit a
deadlock but the stack trace had some problems.

1. Some frame didn't show frame pointer
2. Some spurious frames (I guess this is because kdb scans the
   stack looking which look like a stack frame and once-used
   stack frames which are not yet destroyed showed up.
   This might be ok but when the kernel is compiled with frame
   pointer, it would be nice to mark spurious frames.)
3. Some frames were missing.  Below call_do_IRQ(), five frames
   were not shown.  Even though the frames could be hand traced
   by following frame pointers.

 Below is the stack trace with spurious frames marked ###.  I filled
in missing frame pointers with CAPITAL addresses.  Also, I've added
missing frames.  Missing frames starts with ***.

 Thanks a lot for your great work. :-)

P.S. As I'm not on the list, please don't forget to CC me.

----------- stack trace follows ------------

Stack traceback for pid 8172
0xefa7c000     8172     8166  1    0   R  0xefa7c370 *j3-engine
EBP        EIP        Function (args)
           0xc01b66b7 .text.lock.random+0x19
                               kernel .text 0xc0100000 0xc01b669e 0xc01b66c0
0xefa7d848 0xc01b62c1 __check_and_rekey+0x9 (0x3f496e3d, 0xe2f92780, 0x0, 0xe871
6580, 0x7499c000)
                               kernel .text 0xc0100000 0xc01b62b8 0xc01b6348
0xefa7d87c 0xc01b639c secure_tcp_sequence_number+0x54 (0x246510ac, 0x8f11650a, 0
x901f, 0x7499, 0xf409495c)
                               kernel .text 0xc0100000 0xc01b6348 0xc01b63f4
0xefa7da64 0xc033e5fc tcp_v4_conn_request+0x444 (0xf696ed80, 0xf697e400, 0x0, 0x
efa7c000)
                               kernel .text 0xc0100000 0xc033e1b8 0xc033e68c
###0xefa7d930 0xc0319dd5 qdisc_restart+0x15 (0xf697e400, 0xf687de00, 0xf696ec80, 0x
###202, 0xefa7d968)
###                               kernel .text 0xc0100000 0xc0319dc0 0xc0319f44
###0xefa7d948 0xc03117dd dev_queue_xmit+0x13d (0xdc79b180, 0xf76cd400, 0xdc79b180, 
###0xe87e5200, 0xf4094880)
###                               kernel .text 0xc0100000 0xc03116a0 0xc03119b8
###0xefa7d984 0xc0311887 dev_queue_xmit+0x1e7 (0xdc79b180, 0xf3ea2e94, 0xdc79b180, 
###0xf4094880, 0xf76cd400)
###                               kernel .text 0xc0100000 0xc03116a0 0xc03119b8
###0xefa7d9a0 0xc0327488 ip_output+0x254 (0x282, 0x246, 0xf76cdcb8, 0x8, 0x282)
###                               kernel .text 0xc0100000 0xc0327234 0xc0327504
###0xefa7d9fc 0xc02442a8 scsi_queue_next_request+0x4c (0xf76f0018, 0x1ee, 0xf697e16
###0, 0x2238b28e, 0x0)
###                               kernel .text 0xc0100000 0xc024425c 0xc0244370
###0xefa7da1c 0xc02444ad __scsi_end_request+0x13d (0xf4094880, 0xe8716580, 0xe87165
###80, 0x0, 0xf4094880)
###                               kernel .text 0xc0100000 0xc0244370 0xc02444bc
0xefa7da9c 0xc0337807 tcp_rcv_state_process+0x73 (0xf4094880, 0xe8716580, 0xd74d
bbb4, 0x28, 0xf4094880)
                               kernel .text 0xc0100000 0xc0337794 0xc0338324
0xefa7dac0 0xc033ec51 tcp_v4_do_rcv+0xc9 (0xf4094880, 0xe8716580, 0xe8716580, 0x
0, 0x18)
                               kernel .text 0xc0100000 0xc033eb88 0xc033ecac
0xefa7dafc 0xc033f0bb tcp_v4_rcv+0x40f (0xe8716580, 0x0, 0xd74dbba0, 0xe8716580,
 0x6)
                               kernel .text 0xc0100000 0xc033ecac 0xc033f330
0xefa7db18 0xc032433c ip_local_deliver+0xf4 (0xe8716580, 0x0, 0xe8716580, 0x8, 0
x20)
                               kernel .text 0xc0100000 0xc0324248 0xc03243d4
0xefa7db38 0xc0324751 ip_rcv+0x37d (0xe8716580, 0xf76cd400, 0xc05388d0, 0xe87165
80, 0xe8716580)
                               kernel .text 0xc0100000 0xc03243d4 0xc03247f4
0xefa7db58 0xc0311f03 netif_receive_skb+0x163 (0xe8716580, 0xe8716580, 0xf697e40
0, 0x40, 0xf697e560)
                               kernel .text 0xc0100000 0xc0311da0 0xc0311f30
0xefa7db98 0xf89074ae [tg3]tg3_rx+0x242 (0xf697e560, 0x40, 0xf697e4c0, 0xf697e40
0, 0xc058cd00)
                               tg3 .text 0xf8905060 0xf890726c 0xf890757c
0xefa7dbb8 0xf8907607 [tg3]tg3_poll+0x8b (0xf697e400, 0xefa7dbe0, 0xc058bb10, 0x
1, 0xfffffffb)
                               tg3 .text 0xf8905060 0xf890757c 0xf8907698
0xefa7dbe4 0xc03120eb net_rx_action+0x8f (0xc058bb10, 0xc05b7a00, 0xc0579000, 0x
10, 0x0)
                               kernel .text 0xc0100000 0xc031205c 0xc03121a4
0xEFA7DC04 0xc012050d do_softirq+0x7d (0x10, 0x543aaa19, 0x239dde93, 0x0, 0xf69d
3940)
                               kernel .text 0xc0100000 0xc0120490 0xc0120570
0xefa7dc24 0xc010a77e do_IRQ+0xda (0x10, 0x6f224e4d, 0x4de5e19d, 0x543aaa19, 0x2
39dde93)
                               kernel .text 0xc0100000 0xc010a6a4 0xc010a790
0xEFA7DC80 0xc03755e4 call_do_IRQ+0x5 (0xf3a82400, 0xefa7df0c, 0x10, 0xd0e02aa0,
 0xefa7df0c)
                               kernel .rodata 0xc03733c0 0xc03755df 0xc03755ec
***0xefa7ddfc 0xc01b5540 extract_entropy+432
***0xefa7de14 0xc01b56b3 get_random_bytes+43
***0xefa7de30 0xc01b6316 __check_and_rekey+94
***0xefa7de64 0xc01b639c secure_tcp_sequence_number+84
***0xefa7dec0 0xc033d328 tcp_v4_connect+724
0xEFA7DEE4 0xc034aedb inet_stream_connect+0x10f (0xd0e02aa0, 0xefa7df0c, 0x10, 0
x802, 0x2)
                               kernel .text 0xc0100000 0xc034adcc 0xc034b040
0xefa7df8c 0xc030b145 sys_connect+


-- 
tejun

Reply via email to