[asterisk-users] puzzle

Jeff LaCoursiere jeff at jeff.net
Wed Nov 19 15:06:47 CST 2008



On Wed, 19 Nov 2008, Tzafrir Cohen wrote:

> On Wed, Nov 19, 2008 at 07:57:33PM +0000, Jeff LaCoursiere wrote:
>>
>> ast% ps auxw | grep modprobe
>> root     17744 99.9  0.0  2688  412 ?        RN   Nov03 23223:01 modprobe
>> -r ipt_state
>
> modprobe -r is basically rmmod . rmmod and insmod and nowdays mostly
> wrappers to kernel code.
>
> So while an strace of that process might give some more information
> about it, I believe that the kernel-level backtrace would be more
> interesting.
>
> For that, try either the 'p' or 't' sysrq commands. 'p' gives a stack
> trace of the current process. 't': of all the processes. You can give a
> sysrq command either through the console (on x86: alt-sysrq-<key>) or:
>
>  echo <key> >/proc/sysrq-trigger

No access to the console, sadly, so I tried the trigger method:

[root at ast init.d]# echo p > /proc/sysrq-trigger

which resulted in a single line in /var/log/messages:

Nov 19 14:51:10 ast kernel: SysRq : Show Regs

I waited a few minutes, then tried the 't':

[root at ast init.d]# echo t > /proc/sysrq-trigger

which seemed to hang, so I killed it about thirty seconds later, and now 
my /var/log/messages has 20,000 extra lines :):)

I grepped for the PID and found this:

Nov 19 14:52:40 ast kernel: modprobe      R running  2988 17744      1 
31140 28078 (NOTLB)

The next line started with 'sshd', so I guess there was no trace with 
this?


> BTW: what kernel? What ditsribution?

Keep in mind it has been running almost 1000 days ;)

[root at ast init.d]# uname -a
Linux ast.jbtelenet.com 2.6.9-22.0.2.ELsmp #1 SMP Thu Jan 5 17:13:01 EST 
2006 i686 i686 i386 GNU/Linux

I believe it is Redhat 9.  Its a colo...

Thanks for the interesting debug pointers!

j



More information about the asterisk-users mailing list