Hello Jan,

Am 20.09.22 um 10:24 schrieb Jan Korbel:
1.
(gdb) bt
#0  __kernel_vsyscall ()
     at 
/build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72
#1  0xf7695333 in fstab_init (opt_rewind=0) at fstab.c:121



2.
(gdb) bt
#0  __kernel_vsyscall ()
     at 
/build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72
#1  0xf756ee02 in mrand48 () at mrand48.c:24
#2  0xf3f2c118 in ?? ()

3.
(gdb) bt
#0  __kernel_vsyscall ()
     at 
/build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72
#1  0xf7564e02 in mrand48 () at mrand48.c:24
#2  0xf3efcd40 in ?? ()

4.
(gdb) bt
#0  __kernel_vsyscall ()
     at 
/build/linux-q1ABpl/linux-5.10.136/arch/x86/entry/vdso/vdso32/system_call.S:72
#1  0xf75a9e02 in mrand48 () at mrand48.c:24
#2  0x00000004 in ?? ()


Maybe you could backtraces with better/more information by having the
dbgsym packages installed, or calling gdb with the DEBUGINFOD_URLS from [10].

Is this some kind of virtualisation?
Does this also happen with a regular amd64- or i386-kernel?

Kind regards,
Bernhard

[10] 
https://wiki.debian.org/HowToGetABacktrace#Automatically_loading_debugging_symbol_from_the_Internet

Reply via email to