Smbfs Crashing...

Kirk Bauer (kirk@r61h106.res.gatech.edu)
Mon, 24 Feb 1997 17:58:11 -0500 (EST)


I should first mention that the first time I tried this on Kernel 2.0.27,
I got a register dump (to syslog) and then a 'segmentation fault'. When
I tried to recreate this, I got just a 'segmentation fault'. When I try
to recreate this on Kernel 2.0.29, I just get 'Permission Denied' -- which
is probably what is supposed to happen. This probably means that this has
been fixed -- if so, please ignore this message. I wasn't sure if I should
still report it or not.

I did a 'smbmount //COMPNAME/SHARENAME tmp' where COMPNAME is a Win95
computer. Then, I did a 'chmod a+w tmp'. This is when I got a register
dump to the screen and syslog. The system is still running just fine,
however. The only problem is -- I can't use 'smbumount' to unmount the
share after I get the "segmentation fault". It says the drive is in use.

Like I said, this was in 2.0.27, so maybe it doesn't matter any more...

Feb 23 18:54:33 kaybee kernel: Unable to handle kernel NULL pointer dereference at virtual address c0000008
Feb 23 18:54:33 kaybee kernel: current->tss.cr3 = 0004f000, <r3 = 0004f000
Feb 23 18:54:33 kaybee kernel: *pde = 00102067
Feb 23 18:54:33 kaybee kernel: *pte = 00000027
Feb 23 18:54:33 kaybee kernel: Oops: 0000
Feb 23 18:54:33 kaybee kernel: CPU: 0
Feb 23 18:54:33 kaybee kernel: EIP: 0010:[smb_encode_parents+10/96]
Feb 23 18:54:33 kaybee kernel: EFLAGS: 00010202
Feb 23 18:54:33 kaybee kernel: eax: 00000000 ebx: 003b69ee ecx: 00a841ff edx: 00cd4adc
Feb 23 18:54:33 kaybee kernel: esi: 00000000 edi: 003b69ee ebp: 003b69ee esp: 003b6974
Feb 23 18:54:33 kaybee kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Feb 23 18:54:33 kaybee kernel: Process chmod (pid: 4895, process nr: 44, stackpage=003b6000)
Feb 23 18:54:33 kaybee kernel: Stack: 00000000 00cd4b28 001730bd 003b69ee 00000000 003b6e34 00cd4810 00a883e0
Feb 23 18:54:33 kaybee kernel: bffffcb8 0017524d 00cd4810 003b69ee 00000000 00cd4b28 00000000 00cd4810
Feb 23 18:54:33 kaybee kernel: 003b6e34 00a883e0 00000000 00000000 00000000 00000000 003b69bc 00000001
Feb 23 18:54:33 kaybee kernel: Call Trace: [smb_encode_path+29/80] [smb_proc_setattr_trans2+109/368] [smb_receive_raw+47/80] [smb_receive+147/240] [<01831004>] [smb_receive_trans2+47/704] [<01831000>]
Feb 23 18:54:33 kaybee kernel: [smb_trans2_request+163/288] [smb_trans2_request+198/288] [smb_trans2_request+241/288] [smb_proc_readdir_long+386/816] [smb_unlock_server+40/48] [smb_proc_readdir_long+783/816] [<01831000>] [<01831000>]
Feb 23 18:54:33 kaybee kernel: [filemap_nopage+255/704] [filemap_nopage+255/704] [do_no_page+267/864] [do_no_page+407/864] [do_no_page+0/864] [error_code+64/72] [do_page_fault+300/768] [do_page_fault+0/768]
Feb 23 18:54:33 kaybee kernel: [error_code+64/72] [unuse_process+114/128] [padzero+47/64] [load_elf_binary+2797/2960] [smb_proc_setattr+28/64] [smb_notify_change+329/432] [ext2_put_inode+11/112] [iput+217/416]
Feb 23 18:54:33 kaybee kernel: [ext2_lookup+141/416] [__iget+444/528] [ext2_lookup+204/416] [ext2_lookup+246/416] [lookup+238/272] [follow_link+84/112] [_namei+155/208] [putname+12/16]
Feb 23 18:54:33 kaybee kernel: [namei+60/80] [notify_change+69/128] [sys_chmod+174/224] [system_call+85/124]
Feb 23 18:54:33 kaybee kernel: Code: 8b 46 08 85 c0 75 0f 89 d8 5b 5e c3 8d 76 00 8d b4 26 00 00

-----------------------------------------------------------------
Kirk Bauer Georgia Tech gt5918a@prism.gatech.edu or
Finger for PGP Key --> kirk@kaybee.gt.ed.net
http://www.kaybee.gt.ed.net/~kirk/html/index.html