2002-10-30 08:40:31

by svetljo

[permalink] [raw]
Subject: OOPSES:2.5.45ac5 -smbfs, cifs,ntfs

kernel BUG at fs/ntfs/mft.c:281!
invalid operand: 0000
CPU: 0
EIP: 0060:[<f0a0d648>] Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00013246
eax: d0dd7140 ebx: d0dd7140 ecx: 00000001 edx: 00000000
esi: ffffffff edi: efcf4e80 ebp: eed9d140 esp: d131fd14
ds: 0068 es: 0068 ss: 0068
Stack: d1097c30 f0a06247 d0dd7140 eefc0000 f0a12fe0 00000005 00000009 d0e3d424
01000400 d0e3d3c0 d10960a0 d10960c0 00000000 d10960ba d1096440 d1096000
efcf4e80 d0e3d3c0 d0dd7140 d0e3d3c0 eed9d140 d0e3d3c0 d0e3d458 f0a0b36a
Call Trace: [<f0a06247>] [<f0a12fe0>] [<f0a0b36a>] [<c015ea63>] [<c015f1d1>] [<f0a0aa98>] [<f0a0a860>] [<f0a0a8f0>] [<f0a0de92>] [<c015d9fb>] [<c0153614>] [<c015388a>] [<c0153cdd>] [<c0154529>] [<c014fb3c>] [<c015018b>] [<c01093fb>]
Code: 0f 0b 19 01 cf 28 a1 f0 85 d2 75 a8 0f 0b 01 01 cf 28 a1 f0


>>EIP; f0a0d648 <[ntfs]unmap_mft_record+58/70> <=====

>>eax; d0dd7140 <_end+1095874c/3049766c>
>>ebx; d0dd7140 <_end+1095874c/3049766c>
>>esi; ffffffff <END_OF_CODE+cf23e50/????>
>>edi; efcf4e80 <_end+2f87648c/3049766c>
>>ebp; eed9d140 <_end+2e91e74c/3049766c>
>>esp; d131fd14 <_end+10ea1320/3049766c>

Trace; f0a06247 <[ntfs]find_external_attr+347/560>
Trace; f0a12fe0 <[ntfs].rodata.end+a89/4169>
Trace; f0a0b36a <[ntfs]ntfs_read_locked_inode+4ba/fc0>
Trace; c015ea63 <alloc_inode+183/1b0>
Trace; c015f1d1 <get_new_inode+b1/130>
Trace; f0a0aa98 <[ntfs]ntfs_iget+98/b0>
Trace; f0a0a860 <[ntfs]ntfs_test_inode+0/90>
Trace; f0a0a8f0 <[ntfs]ntfs_init_locked_inode+0/110>
Trace; f0a0de92 <[ntfs]ntfs_lookup+f2/4f0>
Trace; c015d9fb <d_alloc+18b/1c0>
Trace; c0153614 <real_lookup+d4/110>
Trace; c015388a <do_lookup+11a/170>
Trace; c0153cdd <link_path_walk+3fd/7a0>
Trace; c0154529 <__user_walk+49/60>
Trace; c014fb3c <vfs_lstat+1c/60>
Trace; c015018b <sys_lstat64+1b/40>
Trace; c01093fb <syscall_call+7/b>

Code; f0a0d648 <[ntfs]unmap_mft_record+58/70>
00000000 <_EIP>:
Code; f0a0d648 <[ntfs]unmap_mft_record+58/70> <=====
0: 0f 0b ud2a <=====
Code; f0a0d64a <[ntfs]unmap_mft_record+5a/70>
2: 19 01 sbb %eax,(%ecx)
Code; f0a0d64c <[ntfs]unmap_mft_record+5c/70>
4: cf iret
Code; f0a0d64d <[ntfs]unmap_mft_record+5d/70>
5: 28 a1 f0 85 d2 75 sub %ah,0x75d285f0(%ecx)
Code; f0a0d653 <[ntfs]unmap_mft_record+63/70>
b: a8 0f test $0xf,%al
Code; f0a0d655 <[ntfs]unmap_mft_record+65/70>
d: 0b 01 or (%ecx),%eax
Code; f0a0d657 <[ntfs]unmap_mft_record+67/70>
f: 01 cf add %ecx,%edi
Code; f0a0d659 <[ntfs]unmap_mft_record+69/70>
11: 28 a1 f0 00 00 00 sub %ah,0xf0(%ecx)

Unable to handle kernel paging request at virtual address f5bcc000
f30d39ef
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0060:[<f30d39ef>] Not tainted
EFLAGS: 00010216
eax: 35bcc000 ebx: c7a39f18 ecx: db985258 edx: f5bcc000
esi: e9698a40 edi: c1138710 ebp: dcfbe6c0 esp: c7a39eec
ds: 0068 es: 0068 ss: 0068
Stack: db985258 00000000 000001d2 00000001 00000000 00000002 00000004 db985258
00000000 f5bcc000 ee185680 000041ed 00000001 00000000 00000000 00000000
f5bcc000 00000000 00001000 00000000 00001000 00000008 00000000 e9698a40
Call Trace: [<c0158830>] [<c0158b40>] [<c0158cab>] [<c0158b40>] [<c0157aa4>] [<c0157c83>] [<c01093fb>]
Code: 8b 80 00 00 00 c0 89 44 24 2c 8b 72 04 89 74 24 30 8b 42 08


>>EIP; f30d39ef <[smbfs]smb_readdir+ef/580> <=====

>>eax; 35bcc000 Before first symbol
>>ebx; c7a39f18 <_end+75bb524/3049766c>
>>ecx; db985258 <_end+1b506864/3049766c>
>>edx; f5bcc000 <END_OF_CODE+2aefe51/????>
>>esi; e9698a40 <_end+2921a04c/3049766c>
>>edi; c1138710 <_end+cb9d1c/3049766c>
>>ebp; dcfbe6c0 <_end+1cb3fccc/3049766c>
>>esp; c7a39eec <_end+75bb4f8/3049766c>

Trace; c0158830 <vfs_readdir+b0/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c0158cab <sys_getdents64+5b/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c0157aa4 <do_fcntl+b4/190>
Trace; c0157c83 <sys_fcntl64+73/c0>
Trace; c01093fb <syscall_call+7/b>

Code; f30d39ef <[smbfs]smb_readdir+ef/580>
00000000 <_EIP>:
Code; f30d39ef <[smbfs]smb_readdir+ef/580> <=====
0: 8b 80 00 00 00 c0 mov 0xc0000000(%eax),%eax <=====
Code; f30d39f5 <[smbfs]smb_readdir+f5/580>
6: 89 44 24 2c mov %eax,0x2c(%esp,1)
Code; f30d39f9 <[smbfs]smb_readdir+f9/580>
a: 8b 72 04 mov 0x4(%edx),%esi
Code; f30d39fc <[smbfs]smb_readdir+fc/580>
d: 89 74 24 30 mov %esi,0x30(%esp,1)
Code; f30d3a00 <[smbfs]smb_readdir+100/580>
11: 8b 42 08 mov 0x8(%edx),%eax

<1>Unable to handle kernel paging request at virtual address 23c68000
f30d39ef
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0060:[<f30d39ef>] Not tainted
EFLAGS: 00010216
eax: 63c68000 ebx: e0389f18 ecx: db985398 edx: 23c68000
esi: d01d1340 edi: c11221e0 ebp: dcfbe240 esp: e0389eec
ds: 0068 es: 0068 ss: 0068
Stack: db985398 00000000 000001d2 00000001 00000000 00000002 00000004 db985398
00000000 23c68000 ee185680 000041ed 00000001 00000000 00000000 00000000
23c68000 00000000 00001000 00000000 00001000 00000008 00000000 d01d1340
Call Trace: [<c0158830>] [<c0158b40>] [<c0158cab>] [<c0158b40>] [<c0157aa4>] [<c0157c83>] [<c01093fb>]
Code: 8b 80 00 00 00 c0 89 44 24 2c 8b 72 04 89 74 24 30 8b 42 08


>>EIP; f30d39ef <[smbfs]smb_readdir+ef/580> <=====

>>eax; 63c68000 Before first symbol
>>ebx; e0389f18 <_end+1ff0b524/3049766c>
>>ecx; db985398 <_end+1b5069a4/3049766c>
>>edx; 23c68000 Before first symbol
>>esi; d01d1340 <_end+fd5294c/3049766c>
>>edi; c11221e0 <_end+ca37ec/3049766c>
>>ebp; dcfbe240 <_end+1cb3f84c/3049766c>
>>esp; e0389eec <_end+1ff0b4f8/3049766c>

Trace; c0158830 <vfs_readdir+b0/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c0158cab <sys_getdents64+5b/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c0157aa4 <do_fcntl+b4/190>
Trace; c0157c83 <sys_fcntl64+73/c0>
Trace; c01093fb <syscall_call+7/b>

Code; f30d39ef <[smbfs]smb_readdir+ef/580>
00000000 <_EIP>:
Code; f30d39ef <[smbfs]smb_readdir+ef/580> <=====
0: 8b 80 00 00 00 c0 mov 0xc0000000(%eax),%eax <=====
Code; f30d39f5 <[smbfs]smb_readdir+f5/580>
6: 89 44 24 2c mov %eax,0x2c(%esp,1)
Code; f30d39f9 <[smbfs]smb_readdir+f9/580>
a: 8b 72 04 mov 0x4(%edx),%esi
Code; f30d39fc <[smbfs]smb_readdir+fc/580>
d: 89 74 24 30 mov %esi,0x30(%esp,1)
Code; f30d3a00 <[smbfs]smb_readdir+100/580>
11: 8b 42 08 mov 0x8(%edx),%eax

<1>Unable to handle kernel paging request at virtual address f0342000
f30d39ef
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0060:[<f30d39ef>] Not tainted
EFLAGS: 00010a17
eax: 30342000 ebx: c3d03f18 ecx: c822c518 edx: f0342000
esi: e4cfa640 edi: c1444f58 ebp: c08f28c0 esp: c3d03eec
ds: 0068 es: 0068 ss: 0068
Stack: c822c518 00000000 000001d2 00000001 00000000 0000000a 00000004 c822c518
00000000 f0342000 ee185680 400e52e0 00000000 00000000 cee140c0 00000000
f0342000 00030002 00001000 00000000 00001000 00000008 00000000 e4cfa640
Call Trace: [<c0158830>] [<c0158b40>] [<c0158cab>] [<c0158b40>] [<c013c021>] [<c01093fb>]
Code: 8b 80 00 00 00 c0 89 44 24 2c 8b 72 04 89 74 24 30 8b 42 08


>>EIP; f30d39ef <[smbfs]smb_readdir+ef/580> <=====

>>eax; 30342000 Before first symbol
>>ebx; c3d03f18 <_end+3885524/3049766c>
>>ecx; c822c518 <_end+7dadb24/3049766c>
>>edx; f0342000 <_end+2fec360c/3049766c>
>>esi; e4cfa640 <_end+2487bc4c/3049766c>
>>edi; c1444f58 <_end+fc6564/3049766c>
>>ebp; c08f28c0 <_end+473ecc/3049766c>
>>esp; c3d03eec <_end+38854f8/3049766c>

Trace; c0158830 <vfs_readdir+b0/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c0158cab <sys_getdents64+5b/c0>
Trace; c0158b40 <filldir64+0/110>
Trace; c013c021 <sys_brk+101/130>
Trace; c01093fb <syscall_call+7/b>

Code; f30d39ef <[smbfs]smb_readdir+ef/580>
00000000 <_EIP>:
Code; f30d39ef <[smbfs]smb_readdir+ef/580> <=====
0: 8b 80 00 00 00 c0 mov 0xc0000000(%eax),%eax <=====
Code; f30d39f5 <[smbfs]smb_readdir+f5/580>
6: 89 44 24 2c mov %eax,0x2c(%esp,1)
Code; f30d39f9 <[smbfs]smb_readdir+f9/580>
a: 8b 72 04 mov 0x4(%edx),%esi
Code; f30d39fc <[smbfs]smb_readdir+fc/580>
d: 89 74 24 30 mov %esi,0x30(%esp,1)
Code; f30d3a00 <[smbfs]smb_readdir+100/580>
11: 8b 42 08 mov 0x8(%edx),%eax