Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 150868 Details for
Bug 233938
x86_64 crash session on RHEL5 fails with read error during initialization
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
crash -d7 ./usr/lib/debug/lib/modules/2.6.9-22.0.1.ELsmp/vmlinux vmcore
crash-d7.log (text/plain), 8.41 KB, created by
Eugene Teo (Security Response)
on 2007-03-26 04:06:35 UTC
(
hide
)
Description:
crash -d7 ./usr/lib/debug/lib/modules/2.6.9-22.0.1.ELsmp/vmlinux vmcore
Filename:
MIME Type:
Creator:
Eugene Teo (Security Response)
Created:
2007-03-26 04:06:35 UTC
Size:
8.41 KB
patch
obsolete
> >crash 4.0-3.14 >Copyright (C) 2002, 2003, 2004, 2005, 2006 Red Hat, Inc. >Copyright (C) 2004, 2005, 2006 IBM Corporation >Copyright (C) 1999-2006 Hewlett-Packard Co >Copyright (C) 2005 Fujitsu Limited >Copyright (C) 2005 NEC Corporation >Copyright (C) 1999, 2002 Silicon Graphics, Inc. >Copyright (C) 1999, 2000, 2001, 2002 Mission Critical Linux, Inc. >This program is free software, covered by the GNU General Public License, >and you are welcome to change it and/or distribute copies of it under >certain conditions. Enter "help copying" to see the conditions. >This program has absolutely no warranty. Enter "help warranty" for details. > >vmcore_data: > flags: 9 (NETDUMP_LOCAL|NETDUMP_ELF64) > ndfd: 3 > ofp: 3a6bd48760 > header_size: 4096 > num_pt_load_segments: 1 > pt_load_segment[0]: > file_offset: 1000 > phys_start: 0 > phys_end: fffff000 > zero_fill: 0 > elf_header: 12b4c70 > elf32: 0 > notes32: 0 > load32: 0 > elf64: 12b4c70 > notes64: 12b4cb0 > load64: 12b4ce8 > nt_prstatus: 12b4d20 > nt_prpsinfo: 12b4e7c > nt_taskstruct: 12b4f10 > task_struct: 10320903030 > page_size: 4096 > switch_stack: 0 > xen_kdump_data: (unused) > num_prstatus_notes: 1 > nt_prstatus_percpu: 00000000012b4d20 > > >Elf64_Ehdr: > e_ident: \177ELF > e_ident[EI_CLASS]: 2 (ELFCLASS64) > e_ident[EI_DATA]: 1 (ELFDATA2LSB) > e_ident[EI_VERSION]: 1 (EV_CURRENT) > e_ident[EI_OSABI]: 0 (ELFOSABI_SYSV) > e_ident[EI_ABIVERSION]: 0 > e_type: 4 (ET_CORE) > e_machine: 62 (EM_X86_64) > e_version: 1 (EV_CURRENT) > e_entry: 0 > e_phoff: 40 > e_shoff: 0 > e_flags: 0 > e_ehsize: 40 > e_phentsize: 38 > e_phnum: 2 > e_shentsize: 0 > e_shnum: 0 > e_shstrndx: 0 >Elf64_Phdr: > p_type: 4 (PT_NOTE) > p_offset: 176 (b0) > p_vaddr: 0 > p_paddr: 0 > p_filesz: 520 (208) > p_memsz: 0 (0) > p_flags: 0 () > p_align: 0 >Elf64_Phdr: > p_type: 1 (PT_LOAD) > p_offset: 4096 (1000) > p_vaddr: 10000000000 > p_paddr: 0 > p_filesz: 4294963200 (fffff000) > p_memsz: 4294963200 (fffff000) > p_flags: 7 (PF_X|PF_W|PF_R) > p_align: 4096 >Elf64_Nhdr: > n_namesz: 4 ("CORE") > n_descsz: 332 > n_type: 1 (NT_PRSTATUS) > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 00000102d3433bd8 00000102d3433b48 > 0000000000000000 0000000000000031 > 000001037ff09f58 ffffffff80316b8b > 0000000000000220 0000000000000000 > ffffffff80316b8b 0000000000000004 > 000000000000002c 0000000000000046 > 0000000000008617 0000000000000046 > ffffffff803d78e0 ffffffffffffffff > ffffffff8013688e 0000000000000010 > 0000000000010086 000001037ff09da0 > 0000000000000018 0000000000000000 > 0000000000000000 000000000000002b > 000000000000002b 0000000000000000 > 000000000000005b >Elf64_Nhdr: > n_namesz: 4 ("CORE") > n_descsz: 132 > n_type: 3 (NT_PRPSINFO) > 0000000000005200 0000000000000000 > 0000000000000000 0000000000000000 > 696c6d7600000000 000000000078756e > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 > 0000000000000000 0000000000000000 >Elf64_Nhdr: > n_namesz: 4 ("CORE") > n_descsz: 8 > n_type: 4 (NT_TASKSTRUCT) > 0000010320903030 >gdb ./usr/lib/debug/lib/modules/2.6.9-22.0.1.ELsmp/vmlinux >GNU gdb 6.1 >Copyright 2004 Free Software Foundation, Inc. >GDB is free software, covered by the GNU General Public License, and you are >welcome to change it and/or distribute copies of it under certain conditions. >Type "show copying" to see the conditions. >There is absolutely no warranty for GDB. Type "show warranty" for details. >This GDB was configured as "x86_64-unknown-linux-gnu"...WARNING: Because this kernel was compiled with gcc version 3.4.4, certain > commands or command options may fail unless crash is invoked with > the "--readnow" command line option. > >GNU_GET_DATATYPE[irq_cpustat_t]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[irq_cpustat_t]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[irq_cpustat_t]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[timer_vec_root]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[timer_vec]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[softirq_state]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[kallsyms_header]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) >GNU_GET_DATATYPE[user_regs_struct]: returned via gdb_error_hook (1 buffer in use) > > ><readmem: ffffffff804d51d0, KVADDR, "xtime", 16, (FOE), 9ef570> ><readmem: ffffffff803cc1a0, KVADDR, "system_utsname", 390, (ROE), 9efb5c> ><readmem: ffffffff803cc180, KVADDR, "linux_banner", 8, (FOE), 7fff58fe6c48> ><readmem: ffffffff80315dc2, KVADDR, "accessible check", 8, (ROE|Q), 7fff58fe68c8> ><readmem: ffffffff80315dc2, KVADDR, "readstring characters", 574, (ROE|Q), 7fff58fe58b0> >verify_namelist: >/proc/version: >Linux version 2.6.9-22.0.1.ELsmp (bhcompile@hs20-bc1-2.build.redhat.com) (gcc version 3.4.4 20050721 (Red Hat 3.4.4-2)) #1 SMP Tue Oct 18 18:39:02 EDT 2005 >utsname version: #1 SMP Tue Oct 18 18:39:02 EDT 2005 >./usr/lib/debug/lib/modules/2.6.9-22.0.1.ELsmp/vmlinux: >Linux version 2.6.9-22.0.1.ELsmp (bhcompile@hs20-bc1-2.build.redhat.com) (gcc version 3.4.4 20050721 (Red Hat 3.4.4-2)) #1 SMP Tue Oct 18 18:39:02 EDT 2005 > ><readmem: ffffffff804d3080, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU0: level4_pgt: ffffffff80101000 data_offset: 1008fafdf60 ><readmem: ffffffff804d3100, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU1: level4_pgt: 10384c70000 data_offset: 10283357ee0 ><readmem: ffffffff804d3180, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU2: level4_pgt: 103fffb0000 data_offset: 1038172bf60 ><readmem: ffffffff804d3200, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU3: level4_pgt: 1001002a000 data_offset: 10401730660 ><readmem: ffffffff804d3280, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU4: level4_pgt: 10301c48000 data_offset: 1008fb05f60 ><readmem: ffffffff804d3300, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU5: level4_pgt: 101fff8a000 data_offset: 1028335fee0 ><readmem: ffffffff804d3380, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU6: level4_pgt: 1037ff08000 data_offset: 10381733f60 ><readmem: ffffffff804d3400, KVADDR, "cpu_pda entry", 128, (FOE), a20540> >CPU7: level4_pgt: 103fff5e000 data_offset: 10401738660 ><readmem: 10010000084, KVADDR, "tss_struct ist array", 56, (FOE), 9fb090> ><readmem: 1020385a004, KVADDR, "tss_struct ist array", 56, (FOE), 9fb0c8> >crash: read error: kernel virtual address: 1020385a004 type: "tss_struct ist array"
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 233938
: 150868