On Mon, Aug 16, 2010 at 11:35:36PM +0400, Alexey Tarasov wrote:
> 
> On Aug 16, 2010, at 11:31 PM, Kostik Belousov wrote:
> 
> > On Mon, Aug 16, 2010 at 11:21:15PM +0400, Alexey Tarasov wrote:
> >> Hello Kostik!
> >> 
> >> On Aug 16, 2010, at 10:48 PM, Kostik Belousov wrote:
> >> 
> >>>> 
> >>> The backtrace make absolutely no sense. I would not trust kgdb anyway.
> >>> 
> >>> Compile ddb in and do backtrace in console on the panic. Also, disassemble
> >>> the kernel at the fault address. I am very curious which instruction 
> >>> causes
> >>> this. This is stock GENERIC on the bare metal booted, right ?
> >> 
> >> Yes, stock GENERIC.
> >> 
> >> Please, check this out:
> >> 
> >> Dump of assembler code from 0xffffff0060c0b700 to 0xffffff0060c0b780:
> > 
> > Would be nice if you keep all requested data in one place, so that
> > we do not need to search for the old mails to see the context.
> > 
> > According to your previous mail, the fault happen at the
> > address
> > instruction pointer     = 0x20:0xffffff8040d2cc83
> > Your disassembled the stack instead. Please just do
> > disass 0xffffff8040d2cc83,0xffffff8040d2cca0
> > in kgdb.
> > 
> > But also, I want to see the backtrace and disassembly output from ddb.
> 
> (kgdb) disass 0xffffff8040d2cc83,0xffffff8040d2cca0
> No function contains specified address.
Err, it seems that old gdb accepts only spaces. Please try
disass 0xffffff8040d2cc83 0xffffff8040d2cca0 instead.

> 
> I will build kernel with DDB tomorrow, install it on some servers and wait 
> for the panic occurs.

Ok. Did you checked for such things as rootkits ?

Attachment: pgpTly6pt0t7A.pgp
Description: PGP signature

Reply via email to