Problems with af_unix and ksymoops

J. S. Connell (ankh@canuck.gen.nz)
Fri, 5 Mar 1999 20:23:06 -0500 (EST)


Greetings,

It seems that the new and improved ksymoops doesn't understand versioned
symbol names. I got a couple panics in my log relating to UNIX-domain
sockets (I'm shortly going to grab 2.2.2ac7 and apply Andreas' patches and
see if that helps any), and ksymoops won't process them.

System details: 2.2.2ac5, SMP (2x PII/400), af_unix built into kernel.
Panics occured while using x11amp.

Here are the two panics, raw (other than klogd's processing):

Unable to handle kernel paging request at virtual address 00f955e4
current->tss.cr3 = 05011000, %cr3 = 05011000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[sock_wake_async+12/92]
EFLAGS: 00010206
eax: 00000002 ebx: c5ff8920 ecx: 0000ff5f edx: 00f955d4
esi: 00000008 edi: c4e87f38 ebp: c7122064 esp: c4e87eb8
ds: 0018 es: 0018 ss: 0018
Process x11amp (pid: 822, process nr: 72, stackpage=c4e87000)
Stack: 00000002 c1426220 c014cdca c5ff8920 c014d7b9 c1426220 c1426220 c4e87f38
c01702ac c1426220 c4f956e0 00000008 c4e87f38 c4e87f74 00000001 00000100
00000001 00000008 00000000 00000000 c7122020 c014ae52 c4f956e0 c4e87f74
Call Trace: [sock_wfree+26/32] [__kfree_skb+57/172] [unix_stream_recvmsg+788/924] [sock_recvmsg+58/172] [sock_read+150/160] [sys_read+210/260] [system_call+52/56] [startup_32+43/164]
Code: 83 7a 10 00 75 06 b8 ff ff ff ff c3 83 f8 01 74 13 7f 09 85

Unable to handle kernel paging request at virtual address 00f955e8
current->tss.cr3 = 00101000, %cr3 = 00101000
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[unix_gc+194/1084]
EFLAGS: 00010206
eax: 00f955d4 ebx: c5ff8920 ecx: c71d5c80 edx: 00000022
esi: c71d59c0 edi: 00000010 ebp: c60977c0 esp: c4e87d8c
ds: 0018 es: 0018 ss: 0018
Process x11amp (pid: 822, process nr: 72, stackpage=c4e87000)
Stack: c4eb8200 c60977c0 c016ec9e c71d59c0 c71d5cc0 c71d59c0 c4eb8200 c016ebc3
c71d59c0 c4f952b0 c4f95218 c016ee68 c71d59c0 c014ad37 c4f952b0 00000000
c4f95218 c014b131 c4f952b0 c672ac20 c0126c9b c4f95218 c672ac20 c672ac20
Call Trace: [unix_destroy_socket+210/220] [unix_release_sock+99/108] [unix_release+40/44] [sock_release+31/80] [sock_close+57/60] [__fput+31/72] [fput+23/72]
[close_fp+90/100] [do_exit+381/720] [die+83/84] [do_page_fault+722/804] [lk_lockmsg+4448/4583] [error_code+45/52] [sock_wake_async+12/92] [unix_stream_write_space+56/64]
[sock_wfree+26/32] [__kfree_skb+57/172] [unix_stream_recvmsg+788/924] [sock_recvmsg+58/172] [sock_read+150/160] [sys_read+210/260] [system_call+52/56] [startup_32+43/164]
Code: 8b 50 14 85 d2 74 45 8b 83 94 02 00 00 39 42 1c 76 3a 8b 83

--
Jeffrey Sean Connell __ | Networking/Telecommunications Engineer, GXC
ankh@canuck.gen.nz   \/ | PGP key: http://www.canuck.gen.nz/~ankh/pgpkey.html
------------------------+-----------------------------------------------------

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/