Jailing net/skype

Tobias Rehbein tobias.rehbein at web.de
Thu Sep 18 18:20:41 UTC 2008


Am Sun, Sep 14, 2008 at 11:26:45PM +0400 schrieb Boris Samorodov:
> Tobias Rehbein <tobias.rehbein at web.de> writes:
> 
> > 	#kdump -f ktrace.out | head
> >  	84180 skype    CALL  access(0x292b2b61,R_OK)
> >  	84180 skype    NAMI  "/compat/linux/etc/ld.so.preload"
> >  	84180 skype    NAMI  "/etc/ld.so.preload"
> >  	84180 skype    RET   access JUSTRETURN
> >  	84180 skype    CALL  open(0x292b2d49,O_RDONLY,<unused>0)
> >  	84180 skype    NAMI  "/compat/linux/etc/ld.so.cache"
> >  	84180 skype    NAMI  "/compat/linux"
> >  	84180 skype    NAMI  "/compat/linux/etc/ld.so.cache"
> >  	84180 skype    RET   open 3
> >  	84180 skype    CALL  freebsd6_mmap(0x3,0xbfbfe324,<invalid>690704336,MAP_SHARED|MAP_PRIVATE|MAP_RENAME|MAP_NORESERVE|MAP_HASSEMAPHORE|MAP_STACK|MAP_NOSYNC,0x2e6f732e,0x68636163,0x646165,0,0,0,0,0,0,0,0,0,... (lots of '0,'s)
> >
> > The funny thing is kdump itself coredumps when dumping the whole thing out (I
> > guess that has something todo with this endless '...0,0,0,0,0...' sequence).
> 
> You should use devel/linux_kdump here instead of the native one.
> 
Thank you for the hint. I wasn't aware of this tool. Now the output looks
better:

	#linux_kdump -f ktrace.out | tail
 	84180 skype    RET   gettimeofday 0
 	84180 skype    CALL  gettimeofday(0xbfbfd810,0)
 	84180 skype    RET   gettimeofday 0
 	84180 skype    PSIG  SIGSEGV caught handler=0x82db000 mask=0x0 code=0x0
 	84180 skype    CALL  linux_rt_sigprocmask(0x1,0xbfbfd3d8,0,0x8)
 	84180 skype    RET   linux_rt_sigprocmask 0
 	84180 skype    CALL  linux_tgkill(0x148d4,0x148d4,0x6)
 	84180 skype    RET   linux_tgkill 0
 	84180 skype    PSIG  SIGIOT SIG_DFL
 	84180 skype    NAMI  "skype.core"

Nonetheless I have no clue why it coredumps. Could someone help me interpret
this trace? If needed I can provide the full trace or the core dump.

The problem can't be gettimeofday() I guess?

Thanks in advance

Tobias
-- 
Tobias Rehbein

PGP key:         4F2AE314
    server:      keys.gnupg.net
    fingerprint: ECDA F300 1B6E 9B87 8524  8663 E8B6 3138 4F2A E314


More information about the freebsd-questions mailing list