On Friday 11 May 2007 10:49, David Härdeman wrote: > Does dmesg show any interesting kernel messages after the installation > barfs? (like stack overflow warnings) Nothing. Dann suggested to try 'echo t > /proc/sysrq-trigger'. After that dmesg shows the attached dump.
tion+0x0/0xc
[<c0120b4c>] worker_thread+0x0/0x118
[<c0122b64>] kthread+0xaf/0xdb
[<c0122ab5>] kthread+0x0/0xdb
[<c0101005>] kernel_thread_helper+0x5/0xb
xfsdatad/0 S 00000009 0 9535 5 20766 9533 (L-TLB)
c8cc3f8c 00000046 00000001 00000009 c6695030 9af5ed47 00000044 00007280
c6695140 9af29e36 00000044 0000b10f 00000000 c84f17d0 c84f17c0 c84f17c8
00000000 c0120c0d 00000001 00000000 c8e0aab0 00010000 00000000 00000000
Call Trace:
[<c0120c0d>] worker_thread+0xc1/0x118
[<c0111cba>] default_wake_function+0x0/0xc
[<c0120b4c>] worker_thread+0x0/0x118
[<c0122b64>] kthread+0xaf/0xdb
[<c0122ab5>] kthread+0x0/0xdb
[<c0101005>] kernel_thread_helper+0x5/0xb
kjournald S 00000009 0 20766 5 9535 (L-TLB)
c6385fa4 00000046 00000000 00000009 c5c70ab0 171cd1a3 0000008e 002f5804
c5c70bc0 c61e77d0 c6385fa0 008bd234 00000000 c61e7780 c61e7844 c61e77d0
c61e77c0 ca9dfd35 00000000 c5c70ab0 c0122cc3 c61e77d0 c61e77d0 c61e7780
Call Trace:
[<ca9dfd35>] kjournald+0x126/0x184 [jbd]
[<c0122cc3>] autoremove_wake_function+0x0/0x2d
[<ca9dfc0f>] kjournald+0x0/0x184 [jbd]
[<c0122b64>] kthread+0xaf/0xdb
[<c0122ab5>] kthread+0x0/0xdb
[<c0101005>] kernel_thread_helper+0x5/0xb
udpkg S 00000001 0 23023 1066 23024 (NOTLB)
c5c83c08 00000086 ffffffff 00000001 c63d3ab0 8993edcc 00000076 0004c0c0
c63d3bc0 8993edcc 00000076 00d12025 00000000 7fffffff 00000000 ffffffff
00000000 c0275ebd c5c83c58 00000246 c5c83c58 c9c02800 c0151b7a 00000001
Call Trace:
[<c0275ebd>] schedule_timeout+0x13/0x96
[<c0151b7a>] pipe_poll+0x23/0x7e
[<c01574c5>] do_sys_poll+0x267/0x33e
[<c0157eb2>] __pollwait+0x0/0xb1
[<c0111cba>] default_wake_function+0x0/0xc
[<c0153018>] do_lookup+0x4f/0x135
[<c015b1cb>] dput+0x1a/0x10b
[<c0154e0d>] __link_path_walk+0xa5d/0xba8
[<c0136236>] get_page_from_freelist+0x6e/0x2bb
[<c01368af>] __alloc_pages+0x4e/0x260
[<c013c2f7>] __handle_mm_fault+0x13c/0x620
[<c0155007>] link_path_walk+0xaf/0xb9
[<c01108b7>] do_page_fault+0x18b/0x498
[<c015aeb3>] __d_lookup+0x8d/0xc1
[<c011b981>] do_timer+0x794/0x8bf
[<c02065ed>] i8042_timer_func+0x0/0xb
[<c0136236>] get_page_from_freelist+0x6e/0x2bb
[<c01368af>] __alloc_pages+0x4e/0x260
[<c0135186>] filemap_nopage+0x155/0x2ab
[<c013c4fc>] __handle_mm_fault+0x341/0x620
[<c01487c1>] vfs_llseek+0x2c/0x30
[<c01495a0>] sys_llseek+0x4a/0x8d
[<c01575d1>] sys_poll+0x35/0x38
[<c0102a47>] syscall_call+0x7/0xb
base-installe S 00000001 0 23024 23023 23135 (NOTLB)
c6689f68 00000082 c0113d4b 00000001 c6695570 fdad69b4 00000076 0001bab2
c6695680 fdad69b4 00000076 039cc54c 00000000 ffffffff 00000001 c67beab0
00000000 c0116947 00000004 ffffffff c6695570 00000001 c6695628 c9c06074
Call Trace:
[<c0113d4b>] copy_process+0xdcc/0xf13
[<c0116947>] do_wait+0x7cf/0x8a1
[<c0111cba>] default_wake_function+0x0/0xc
[<c0116a41>] sys_wait4+0x28/0x2b
[<c0102a47>] syscall_call+0x7/0xb
log-output S 00000001 0 23135 23024 23136 (NOTLB)
c6eebc08 00000086 ffffffff 00000001 c67beab0 ff23657d 00000076 000519f0
c67bebc0 ff23657d 00000076 00500e7c 00000000 7fffffff 00000000 ffffffff
00000000 c0275ebd c6eebc58 00000246 c6eebc58 c8a54e00 c0151b7a 00000000
Call Trace:
[<c0275ebd>] schedule_timeout+0x13/0x96
[<c0151b7a>] pipe_poll+0x23/0x7e
[<c01574c5>] do_sys_poll+0x267/0x33e
[<c0157eb2>] __pollwait+0x0/0xb1
[<c0111cba>] default_wake_function+0x0/0xc
[<c0111cba>] default_wake_function+0x0/0xc
[<c0153018>] do_lookup+0x4f/0x135
[<c015b1cb>] dput+0x1a/0x10b
[<c0154e0d>] __link_path_walk+0xa5d/0xba8
[<c015aeb3>] __d_lookup+0x8d/0xc1
[<c0153018>] do_lookup+0x4f/0x135
[<c015b1cb>] dput+0x1a/0x10b
[<c0154e0d>] __link_path_walk+0xa5d/0xba8
[<c01336cd>] do_generic_mapping_read+0x3ab/0x3f2
[<c015e21c>] mntput_no_expire+0x11/0x59
[<c0155007>] link_path_walk+0xaf/0xb9
[<c015e21c>] mntput_no_expire+0x11/0x59
[<c0152ae6>] page_put_link+0x0/0xc
[<c01183ed>] current_fs_time+0x40/0x4b
[<c01336cd>] do_generic_mapping_read+0x3ab/0x3f2
[<c0136236>] get_page_from_freelist+0x6e/0x2bb
[<c01368af>] __alloc_pages+0x4e/0x260
[<c0135186>] filemap_nopage+0x155/0x2ab
[<c013c4fc>] __handle_mm_fault+0x341/0x620
[<c01108b7>] do_page_fault+0x18b/0x498
[<c01575d1>] sys_poll+0x35/0x38
[<c0102a47>] syscall_call+0x7/0xb
run-debootstr S 00000007 0 23136 23135 23137 (NOTLB)
c8e07f04 00000086 5c0e2076 00000007 c9eb2030 5c9a4390 00000090 00026499
c9eb2140 c0122cd0 c93ebd0c 0bdac6ca 00000000 c67bc800 c67bc800 c8e07f20
00001000 c0152067 00000000 c9eb2030 c0122cc3 c67bc800 c67bc800 00001000
Call Trace:
[<c0122cd0>] autoremove_wake_function+0xd/0x2d
[<c0152067>] pipe_wait+0x57/0x78
[<c0122cc3>] autoremove_wake_function+0x0/0x2d
[<c0152766>] pipe_readv+0x2d9/0x34b
[<c01527d8>] pipe_read+0x0/0x1e
[<c01527f2>] pipe_read+0x1a/0x1e
[<c01492c6>] vfs_read+0xa1/0x144
[<c0149621>] sys_read+0x3e/0x65
[<c0102a47>] syscall_call+0x7/0xb
debootstrap S 00000001 0 23137 23136 3829 (NOTLB)
c6eedf68 00000086 c0113d4b 00000001 c630e030 b1903ded 00000090 0000f57d
c630e140 c70ca080 c9d2f400 09ad1b4e 00000000 ffffffff 00000001 c63d3570
00000000 c0116947 00000004 ffffffff c630e030 00000001 c630e0e8 c9d2f3f4
Call Trace:
[<c0113d4b>] copy_process+0xdcc/0xf13
[<c0116947>] do_wait+0x7cf/0x8a1
[<c0111cba>] default_wake_function+0x0/0xc
[<c0116a41>] sys_wait4+0x28/0x2b
[<c0102a47>] syscall_call+0x7/0xb
debootstrap S 00000001 0 3829 23137 3830 (NOTLB)
c5a25f68 00000082 c0113d4b 00000001 c63d3570 b18f4870 00000090 00025960
c63d3680 c6a46b7c c9c06cc0 0020db0b 00000000 ffffffff 00000001 c6949030
00000000 c0116947 00000004 ffffffff c63d3570 00000001 c63d3628 c9c06cb4
Call Trace:
[<c0113d4b>] copy_process+0xdcc/0xf13
[<c0116947>] do_wait+0x7cf/0x8a1
[<c0111cba>] default_wake_function+0x0/0xc
[<c0116a41>] sys_wait4+0x28/0x2b
[<c0102a47>] syscall_call+0x7/0xb
zcat S 00000007 0 3830 3829 3831 (NOTLB)
c5a21f10 00000082 000200d2 00000007 c630e570 941a9814 00000091 000a8c2b
c630e680 c02c5a68 c635740c 04723f33 00000000 c9bfb800 00000000 c5a21f2c
00000000 c0152067 00000000 c630e570 c0122cc3 c9bfb800 c9bfb800 00008000
Call Trace:
[<c0152067>] pipe_wait+0x57/0x78
[<c0122cc3>] autoremove_wake_function+0x0/0x2d
[<c01523b4>] pipe_writev+0x32c/0x3e7
[<c015246f>] pipe_write+0x0/0x1e
[<c0152489>] pipe_write+0x1a/0x1e
[<c0149182>] vfs_write+0xa4/0x147
[<c0149686>] sys_write+0x3e/0x65
[<c0102a47>] syscall_call+0x7/0xb
tar D 00000007 0 3831 3829 3830 (NOTLB)
c6a9bcf8 00000082 00000247 00000007 c6949030 9426da36 00000091 000c4222
c6949140 c10bd3e0 00000000 2446cd77 00000000 00000000 00000286 c61e75b0
c61e7580 caa7b9ae 0000019d 00000000 c6949030 c0111cba c61e75b0 c61e75b0
Call Trace:
[<caa7b9ae>] lbmAllocate+0x62/0xd2 [jfs]
[<c0111cba>] default_wake_function+0x0/0xc
[<caa7c1bb>] lmNextPage+0x93/0xbf [jfs]
[<caa7c33c>] lmWriteRecord+0x155/0x2f6 [jfs]
[<caa7cf89>] lmLog+0xfa/0x133 [jfs]
[<caa7ec2d>] txCommit+0xcdd/0xecb [jfs]
[<caa772fd>] dtSearch+0x794/0x7ba [jfs]
[<caa679fe>] jfs_mknod+0x204/0x2e7 [jfs]
[<c0153264>] permission+0xa2/0xb5
[<c015afd6>] d_instantiate+0x63/0x66
[<c0155007>] link_path_walk+0xaf/0xb9
[<c015563c>] do_unlinkat+0xba/0x116
[<c015aeb3>] __d_lookup+0x8d/0xc1
[<c01536b5>] vfs_mknod+0xe3/0x128
[<c0155995>] sys_mknodat+0x129/0x162
[<c01559e1>] sys_mknod+0x13/0x17
[<c0102a47>] syscall_call+0x7/0xb
Attachment:
pgpTtRXRqk6iM.pgp
Description: PGP signature