From: <ti...@fu...> - 2002-04-02 15:38:27
|
>Can we get a stack trace from that panic? As you may recall, the console output prior to the panic was: System Clock set. Local time: Tue Apr 2 07:30:51 PST 2002 Cleaning: /tmp /var/lock /var/run. Initializing random number generator... done. Recovering nvi editor sessions... done. INIT: Entering runlevel: 2 Starting system log daemon: syslogd Here's the stack trace and some subsequent GDB dialogue. It's dereferencing a null struct inode *. #0 panic (fmt=0xa01973e0 "Kernel mode fault at addr 0x%lx, ip 0x%lx") at panic.c:45 #1 0xa011104c in segv (address=40, ip=2685374407, is_write=0, is_user=0) at trap_kern.c:96 #2 0xa0111e0b in segv_handler (sig=11, sc=0xa27b7800, usermode=0) at trap_user.c:412 #3 0xa0111fd7 in sig_handler (sig=11, sc= {gs = 0, __gsh = 0, fs = 0, __fsh = 0, es = 43, __esh = 0, ds = 43, __dsh = 0, edi = 2724527360, esi = 0, ebp = 2726001436, esp = 2726001364, ebx = 269328 6700, edx = 0, ecx = 2726001484, eax = 0, trapno = 14, err = 4, eip = 2685374407 , cs = 35, __csh = 0, eflags = 66050, esp_at_signal = 2726001364, ss = 43, __ssh = 0, fpstate = 0x0, oldmask = 0, cr2 = 40}) at trap_user.c:478 #4 <signal handler called> #5 0xa00f8fc7 in unix_bind (sock=0xa26cd534, uaddr=0xa27b7b4c, addr_len=11) at af_unix.c:739 #6 0xa00b7479 in sys_bind (fd=0, umyaddr=0x9fffd864, addrlen=10) at socket.c:1015 #7 0xa00b81af in sys_socketcall (call=2, args=0x9fffd434) at socket.c:1567 #8 0xa010fd2f in execute_syscall (regs= {regs = {2, 2684343348, 2684344420, 0, 2684344431, 134531475, 4294967258 , 43, 43, 0, 0, 102, 1074738978, 35, 582, 2684343344, 43}}) at syscall_kern.c:409 #9 0xa010fecc in syscall_handler (sig=12, sc= ---Type <return> to continue, or q <return> to quit--- {gs = 0, __gsh = 0, fs = 0, __fsh = 0, es = 43, __esh = 0, ds = 43, __dsh = 0, edi = 2684344431, esi = 0, ebp = 134531475, esp = 2684343344, ebx = 2, edx = 2684344420, ecx = 2684343348, eax = 23820, trapno = 14, err = 6, eip = 1074738 978, cs = 35, __csh = 0, eflags = 582, esp_at_signal = 2684343344, ss = 43, __ss h = 0, fpstate = 0x0, oldmask = 0, cr2 = 134570028}) at syscall_user.c:74 #10 <signal handler called> #11 0x400f3722 in ?? () #12 0x676f6c2f in ?? () Cannot access memory at address 0x7665642f (gdb) up #1 0xa011104c in segv (address=40, ip=2685374407, is_write=0, is_user=0) at trap_kern.c:96 96 panic("Kernel mode fault at addr 0x%lx, ip 0x%lx", (gdb) up #2 0xa0111e0b in segv_handler (sig=11, sc=0xa27b7800, usermode=0) at trap_user.c:412 412 segv(SC_FAULT_ADDR(context), SC_IP(context), SC_FAULT_WRITE(context), (gdb) #3 0xa0111fd7 in sig_handler (sig=11, sc= {gs = 0, __gsh = 0, fs = 0, __fsh = 0, es = 43, __esh = 0, ds = 43, __dsh = 0, edi = 2724527360, esi = 0, ebp = 2726001436, esp = 2726001364, ebx = 2693286700, edx = 0, ecx = 2726001484, eax = 0, trapno = 14, err = 4, eip = 2685374407, cs = 35, __csh = 0, eflags = 66050, esp_at_signal = 2726001364, ss = 43, __ssh = 0, fpstate = 0x0, oldmask = 0, cr2 = 40}) at trap_user.c:478 478 (*handlers[sig])(sig, &sc, user); (gdb) #4 <signal handler called> (gdb) #5 0xa00f8fc7 in unix_bind (sock=0xa26cd534, uaddr=0xa27b7b4c, addr_len=11) at af_unix.c:739 739 list = &unix_socket_table[dentry->d_inode->i_ino & (UNIX_HASH_SIZE-1)]; (gdb) p unix_socket_table $1 = {0x0 <repeats 256 times>, 0xa08b0d40} (gdb) p dentry->d_inode->i_ino Cannot access memory at address 0x28 (gdb) p dentry $2 = (struct dentry *) 0xa264fd00 (gdb) p dentry->d_inode $3 = (struct inode *) 0x0 (gdb) -- Tim Freeman ti...@fu... |
From: Jeff D. <jd...@ka...> - 2002-04-02 16:25:13
|
ti...@fu... said: > #5 0xa00f8fc7 in unix_bind (sock=0xa26cd534, uaddr=0xa27b7b4c, > addr_len=11) at af_unix.c:739 Known bug. I've even got a fix for it sitting in my queue... Jeff |