Hello,

the current git kernel gave a core dump. The 2nd try to start my user
mode linuc image was fine. Nevertheless it follows the output at the
command line and the back trace.

Hope this helps :-)


...
io scheduler noop registered
io scheduler cfq registered (default)
tun: Universal TUN/TAP device driver, 1.6
tun: (C) 1999-2004 Max Krasnyansky <m...@qualcomm.com>
TCP: cubic registered
NET: Registered protocol family 17
Key type dns_resolver registered
initlevel:7=late, 21 registered initcalls
Initialized stdio console driver
Console initialized on /dev/tty0
                                console [tty0] enabled, bootconsole disabled
console [tty0] enabled, bootconsole disabled
                                            Initializing software serial
port version 1
console [mc-1] enabled
 ubda: unknown partition table
 ubdb: unknown partition table
Netdevice 0 (7a:cf:14:11:67:01) :
TUN/TAP backend -
kjournald starting.  Commit interval 5 seconds
EXT3-fs (ubda): mounted filesystem with ordered data mode
VFS: Mounted root (ext3 filesystem) readonly on device 98:0.
Kernel panic - not syncing: Segfault with no mm
0838a4b4:  [<082fc7e8>] dump_stack+0x22/0x24
0838a4cc:  [<082fc866>] panic+0x7c/0x189
0838a4f4:  [<08061509>] segv+0x259/0x2c0
0838a5a4:  [<080615c3>] segv_handler+0x53/0x80
0838a5cc:  [<08072a4d>] sig_handler_common+0x4d/0xc0
0838a848:  [<08072be2>] sig_handler+0x42/0x50
0838a858:  [<0807271c>] hard_handler+0x6c/0xb0
0838a87c:  [<b779f40c>] 0xb779f40c
0838a998:  [<080c628e>] generic_handle_irq+0x2e/0x40
0838a9ac:  [<0805e015>] do_IRQ+0x25/0x40
0838a9bc:  [<08061709>] winch+0x19/0x20
0838a9cc:  [<08072a4d>] sig_handler_common+0x4d/0xc0
0838ac48:  [<08072be2>] sig_handler+0x42/0x50
0838ac58:  [<0807271c>] hard_handler+0x6c/0xb0
0838ac7c:  [<b779f40c>] 0xb779f40c


EIP: 0000:[<00000000>] CPU: 0 Not tainted EFLAGS: 00000000
    Not tainted
EAX: 00000000 EBX: 00000000 ECX: 00000000 EDX: 00000000
ESI: 00000000 EDI: 00000000 EBP: 00000000 DS: 0000 ES: 0000
0838a468:  [<0807926d>] show_regs+0xed/0x120
0838a484:  [<0806189c>] panic_exit+0x2c/0x50
0838a494:  [<0809d8fa>] notifier_call_chain+0x4a/0x70
0838a4bc:  [<0809da43>] atomic_notifier_call_chain+0x23/0x30
0838a4cc:  [<082fc88e>] panic+0xa4/0x189
0838a4f4:  [<08061509>] segv+0x259/0x2c0
0838a5a4:  [<080615c3>] segv_handler+0x53/0x80
0838a5cc:  [<08072a4d>] sig_handler_common+0x4d/0xc0
0838a848:  [<08072be2>] sig_handler+0x42/0x50
0838a858:  [<0807271c>] hard_handler+0x6c/0xb0
0838a87c:  [<b779f40c>] 0xb779f40c
0838a998:  [<080c628e>] generic_handle_irq+0x2e/0x40
0838a9ac:  [<0805e015>] do_IRQ+0x25/0x40
0838a9bc:  [<08061709>] winch+0x19/0x20
0838a9cc:  [<08072a4d>] sig_handler_common+0x4d/0xc0
0838ac48:  [<08072be2>] sig_handler+0x42/0x50
0838ac58:  [<0807271c>] hard_handler+0x6c/0xb0
0838ac7c:  [<b779f40c>] 0xb779f40c

Terminated



And here's the back trace:

(gdb) bt
#0  0xb779f424 in __kernel_vsyscall ()
#1  0xb76663c6 in kill () at ../sysdeps/unix/syscall-template.S:82
#2  0x080739c5 in uml_abort () at arch/um/os-Linux/util.c:93
#3  0x08073d05 in os_dump_core () at arch/um/os-Linux/util.c:138

#4  0x080618b7 in panic_exit (self=0x838c518, unused1=0,
unused2=0x83af3e0) at arch/um/kernel/um_arch.c:240
#5  0x0809d8fa in notifier_call_chain (nl=<optimized out>, val=0,
v=0x83af3e0, nr_to_call=-2, nr_calls=0x0)
    at kernel/notifier.c:93

#6  0x0809da43 in __atomic_notifier_call_chain (nr_calls=0x0,
nr_to_call=-1, v=0x83af3e0, val=0, nh=0x83af380)
    at kernel/notifier.c:182

#7  atomic_notifier_call_chain (nh=0x83af380, val=0, v=0x83af3e0) at
kernel/notifier.c:191
#8  0x082fc88e in panic (fmt=0x8351566 "Segfault with no mm") at
kernel/panic.c:120
#9  0x08061509 in segv (fi=<incomplete type>, ip=0, is_user=0,
regs=0x838a5e0) at arch/um/kernel/trap.c:194
#10 0x080615c3 in segv_handler (sig=11, regs=0x838a5e0) at
arch/um/kernel/trap.c:170
#11 0x08072a4d in sig_handler_common (sig=11, mc=0x838a920) at
arch/um/os-Linux/signal.c:43
#12 0x08072be2 in sig_handler (sig=11, mc=0x838a920) at
arch/um/os-Linux/signal.c:230
#13 0x0807271c in hard_handler (sig=<optimized out>, info=0x838a88c,
p=0x838a90c)
    at arch/um/os-Linux/signal.c:164
#14 <signal handler called>
#15 0x00000000 in ?? ()
#16 0x080c8c8f in mask_ack_irq (desc=0x8395200) at kernel/irq/chip.c:234
#17 handle_edge_irq (irq=10, desc=0x8395200) at kernel/irq/chip.c:489
#18 0x080c628e in generic_handle_irq_desc (desc=0x8395200, irq=10) at
include/linux/irqdesc.h:114
#19 generic_handle_irq (irq=10) at kernel/irq/irqdesc.c:314
#20 0x0805e015 in do_IRQ (irq=10, regs=0x838a9e0) at
arch/um/kernel/irq.c:294
#21 0x08061709 in winch (sig=28, regs=0x838a9e0) at
arch/um/kernel/trap.c:271
#22 0x08072a4d in sig_handler_common (sig=28, mc=0x838ad20) at
arch/um/os-Linux/signal.c:43
#23 0x08072be2 in sig_handler (sig=28, mc=0x838ad20) at
arch/um/os-Linux/signal.c:230
#24 0x0807271c in hard_handler (sig=<optimized out>, info=0x838ac8c,
p=0x838ad0c)
    at arch/um/os-Linux/signal.c:164
#25 <signal handler called>
#26 0xb779f424 in __kernel_vsyscall ()
#27 0xb76d41e0 in __nanosleep_nocancel () at
../sysdeps/unix/syscall-template.S:82
#28 0x08073341 in idle_sleep (nsecs=<optimized out>) at
arch/um/os-Linux/time.c:183
#29 0x0805efab in default_idle () at arch/um/kernel/process.c:254
#30 0x0805eff6 in cpu_idle () at arch/um/kernel/process.c:263
#31 0x082fba8e in rest_init () at init/main.c:384
#32 0x0804969f in start_kernel () at init/main.c:636
#33 0x0804ac66 in start_kernel_proc (unused=0x0) at
arch/um/kernel/skas/process.c:46
#34 0x08071a3e in run_kernel_thread (fn=0x804ac3a <start_kernel_proc>,
arg=0x0, jmp_ptr=0x838ba40)
    at arch/um/os-Linux/process.c:257
#35 0x0805ed25 in new_thread_handler () at arch/um/kernel/process.c:156
#36 0x00000000 in ?? ()


-- 
MfG/Sincerely
Toralf Förster
pgp finger print: 7B1A 07F4 EC82 0F90 D4C2 8936 872A E508 7DB6 9DA3

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
User-mode-linux-user mailing list
User-mode-linux-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user

Reply via email to