Hello Jan,
Am 20.09.22 um 10:24 schrieb Jan Korbel:
1. (gdb) bt #0 __kernel_vsyscall () at /build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72 #1 0xf7695333 in fstab_init (opt_rewind=0) at fstab.c:121
2. (gdb) bt #0 __kernel_vsyscall () at /build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72 #1 0xf756ee02 in mrand48 () at mrand48.c:24 #2 0xf3f2c118 in ?? ()
3. (gdb) bt #0 __kernel_vsyscall () at /build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72 #1 0xf7564e02 in mrand48 () at mrand48.c:24 #2 0xf3efcd40 in ?? ()
4. (gdb) bt #0 __kernel_vsyscall () at /build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72 #1 0xf75a9e02 in mrand48 () at mrand48.c:24 #2 0x00000004 in ?? ()
Maybe you could backtraces with better/more information by having the dbgsym packages installed, or calling gdb with the DEBUGINFOD_URLS from [10]. Is this some kind of virtualisation? Does this also happen with a regular amd64- or i386-kernel? Kind regards, Bernhard [10] https://wiki.debian.org/HowToGetABacktrace#Automatically_loading_debugging_symbol_from_the_Internet