Repeatable MSDOS Fault

Andrew Mileski (dmtech@magi.com)
Sun, 22 Oct 1995 23:13:39 -0400 (EDT)


Kernel: V1.3.35
Problem: Segmentation Fault
Source: Copying or moving several files from an ext2 fs to a msdos fs.
Repeatable: Yes, but the EIP varies a little...still seems to be a MSDOS fs
problem. I verified the MSDOS fs is okay via 'scandisk'.
Note: EIP symbols came from System.map

/var/adm/messages follows. Holler for more info.

-- Andrew E. Mileski --

-------------------------------------------------------
Dark Matter Technologies Inc. - Ottawa Ontario, Canada!
mailto:dmtech@magi.com http://www.magi.com/~dmtech/

general protection: 0000
kernel: CPU: 0
EIP: 0010:001519b3 (_raw_scan_sector=00151830)
EFLAGS: 00010206
eax: 0025c890 ebx: 00000001 ecx: 005996cc edx: 007fe620
esi: ffffffff edi: 00a73200 ebp: 00000000 esp: 0077ddf4
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process mv (pid: 1154, process nr: 13, stackpage=0077d000)
Stack: 00000000 0000969c 001c1c38 0000969a 00a73200 00000000 00a73200 005996cc
00151afa 001c1c38 00025c89 00000000 00000000 ffffffff 0077dedc 0077ded8
00002814 00000000 00000000 001c1c38 00151b70 001c1c38 00002814 00000000
Call Trace: 00151afa 00151b70 00151d87 0014dbde 0014dd83 0014dddb 0012b8a5
0014e34c 001203a0 001204d2 0010a829
Code: 89 06 8b 7c 24 18 0f b7 5c 2f 1a 83 7c 24 38 00 75 1b 8b 4c

Oops: 0000
CPU: 0
EIP: 0010:0014d3a5 (_msdos_mark_buffer_dirty=0014d398)
EFLAGS: 00010246
eax: 00000000 ebx: 00ecdc6c ecx: 00ecc300 edx: 00000001
esi: 00ecdc6c edi: 00c2e000 ebp: 00000000 esp: 009f0ea8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process mv (pid: 91, process nr: 13, stackpage=009f0000)
Stack: 00000000 0014e9c7 00000000 00ecdc6c 00000001 00c2e000 00d962a0 00000000
009f0f48 009f0f54 00c2e0e0 00000001 00d962a0 00000000 00c2e000 00c2e0e0
00151d87 001c1c38 00000000 009f0f54 00000000 000a2695 008db8a0 008e13c0
Call Trace: 0014e9c7 00151d87 0014ec24 0012c7ce 0012c84c 0010a829
Code: 81 78 04 00 02 00 00 74 03 8b 5b 28 80 7b 11 00 75 1d c6 43

general protection: 0000
CPU: 0
EIP: 0010:001519b3 (_raw_scan_sector=00151830)
EFLAGS: 00010206
eax: 00334a50 ebx: 00000001 ecx: 009f59d8 edx: 00c2e460
esi: ffffffff edi: 00a00400 ebp: 00000000 esp: 00b1bdf4
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 1076, process nr: 13, stackpage=00b1b000)
Stack: 00000000 0000cca3 001c1c38 0000cca1 00a00400 00000000 00a00400 009f59d8
00151afa 001c1c38 000334a5 00000000 00000000 ffffffff 00b1bedc 00b1bed8
00001e49 00000000 00000000 001c1c38 00151b70 001c1c38 00001e49 00000000
Call Trace: 00151afa 00151b70 00151d87 0014dbde 0014dd83 0014dddb 0012b8a5
001203a0 001204d2 0010a829
Code: 89 06 8b 7c 24 18 0f b7 5c 2f 1a 83 7c 24 38 00 75 1b 8b 4c

general protection: 0000
CPU: 0
EIP: 0010:001519b3 (_raw_scan_sector=00151830)
EFLAGS: 00010206
eax: 00364e50 ebx: 00000001 ecx: 0040abf4 edx: 00c2e2a0
esi: ffffffff edi: 00408600 ebp: 00000000 esp: 00eaedf4
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process cp (pid: 73, process nr: 13, stackpage=00eae000)
Stack: 00000000 0000d8b3 001c1c38 0000d8b1 00408600 00000000 00408600 0040abf4
00151afa 001c1c38 000364e5 00000000 00000000 ffffffff 00eaeedc 00eaeed8
00001e49 00000000 00000000 001c1c38 00151b70 001c1c38 00001e49 00000000
Call Trace: 00151afa 00151b70 00151d87 0014dbde 0014dd83 0014dddb 0012b8a5
001203a0 001204d2 0010a829
Code: 89 06 8b 7c 24 18 0f b7 5c 2f 1a 83 7c 24 38 00 75 1b 8b 4c