On Wed, Oct 14, 2009 at 5:59 PM, Helge Deller <deller@xxxxxx> wrote: > Program received signal SIGILL, Illegal instruction. > [Switching to Thread 0x8001 (LWP 22707)] > 0x405e06fc in poll () from /lib/libc.so.6 > (gdb) bt > #0 0x405e06fc in poll () from /lib/libc.so.6 > #1 0x41bb45a0 in __pthread_manager () from /lib/libpthread.so.0 > #2 0x41bb4e4c in __pthread_manager_event () from /lib/libpthread.so.0 > #3 0x405eb340 in clone () from /lib/libc.so.6 > #4 0x00000010 in ?? () > #5 0x00000010 in ?? () > Backtrace stopped: previous frame identical to this frame (corrupt stack?) > (gdb) If this happens again please provide the /proc/$PID/maps, it's invaluable to mapping that libc address to an instruction. > dmesg shows: > > [557116.676000] User Fault on Kernel Space pid=22910 command='konqueror' That's correct we tried to read kernel space. build-tools/disasm says the faulting instruction is: 0: 40 51 bc c8 ldb 1e64(sr2,rp),r17 I would have expect a SIGSEGV for that (trying to read from kernel space sr2) instruction, but perhaps we deliver SIGILL in that case. > [557116.676000] IASQ: 00001283 00001283 IAOQ: 0070a703 0070a707 > [557116.676000] IIR: 4051bcc8 ISR: 00000000 IOR: 405e2543 > [557116.676000] CPU: 1 CR30: 8fed4000 CR31: ffffffff > [557116.676000] ORIG_R28: 00000000 > [557116.676000] IAOQ[0]: 0070a703 > [557116.676000] IAOQ[1]: 0070a707 > [557116.676000] RP(r2): 405e06df > > Does this sound familiar to anybody here? > Does this backtrace help? No idea, but the instruction "4051bcc8" (see IIR in dump) doesn't exist in libc.so.6 for 2.9-27. Something corrupted memory, and it corrupted a read-only .text mapping. The only thing that can do that is the kernel. This is pretty much 100% a kernel bug? Cheers, Carlos. -- To unsubscribe from this list: send the line "unsubscribe linux-parisc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html