fsck general protection and core dumps after ftp does
I've been trying to install hamm on a new disk, but I have twice
now had disk problems, or maybe network problems. The
installation went well in both cases. After a couple of days,
ftp crashed and dumped core, apparently leaving me with a
partition that causes fsck to core dump when it checks at boot
time. This has happened twice, with a repartitioning,
re-mke2fs-ing and re-installing in between. Can anyone help me
figure out what's going on here?
Mike
P.S. This is what fsck tells me
# fsck /dev/hda5
e2fsck 1.10m 24-Apr-1997 for EXT2 FS 0.5b, 95/08/09
/dev/hda5 was not cleanly unmounted, check forced.
Pass 1: Checking inodes, blocks and sizes
general protection: 0000
[...]
This is what ended up in my /var/log/kern.log:
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+48/180]
EFLAGS: 00010286
eax: ffffffff ebx: 00000305 ecx: 00000305 edx: 00003f0d
esi: 0000befa edi: 00000305 ebp: 0000bdff esp: 01e29cc8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process fsck.ext2 (pid: 29, process nr: 8, stackpage=01e29000)
Stack: 00000000 00000001 01e20305 00000400 01e29d04 001247ed 00000305 0000bdff
00000400 00000000 0000be00 01e29f74 00000001 01db8b6c 01db8b6c 00129439
00000305 0000bdff 00000400 00010a80 00000000 00000400 000126c8 0007d020
Call Trace: [getblk+49/1112] [block_read+957/1596] [timer_bh+184/328] [timer_bh+240/328] [make_request+1006/1020] [ll_rw_block+348/460] [unlock_buffer+23/316]
[merge_segments+1140/1220] [timer_bh+184/328] [timer_bh+240/328] [do_bottom_half+59/96] [handle_bottom_half+11/24] [do_no_page+436/776] [do_no_page+382/776] [do_no_page+0/776]
[sys_read+136/176] [<02f7fc00>] [system_call+85/124] [<02f7fc00>]
Code: 39 28 75 28 66 39 58 04 75 22 8b 4c 24 20 39 48 20 74 22 57
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+48/180]
EFLAGS: 00010286
eax: ffffffff ebx: 00000305 ecx: 00000305 edx: 00003f0d
esi: 0000befa edi: 00000305 ebp: 0000bdff esp: 01b3ccc8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process e2fsck (pid: 35, process nr: 8, stackpage=01b3c000)
Stack: 00000000 00000001 01b30305 00000400 0000006c 001247ed 00000305 0000bdff
00000400 00000000 0000be00 01b3cf74 00000001 01db8b6c 01db8b6c 00129439
00000305 0000bdff 00000400 00010780 00000000 00000400 000126c8 0007d020
Call Trace: [getblk+49/1112] [block_read+957/1596] [inode_getblk+67/404] [getblk+49/1112] [inode_getblk+67/404] [ext2_getblk+183/528] [clear_selection+13/72]
[merge_segments+1140/1220] [tty_default_put_char+30/40] [opost+440/456] [do_no_page+436/776] [do_no_page+382/776] [do_no_page+0/776] [timer_bh+240/328] [sys_read+136/176]
[<02f7fc00>] [system_call+85/124] [<02f7fc00>]
Code: 39 28 75 28 66 39 58 04 75 22 8b 4c 24 20 39 48 20 74 22 57
general protection: 0000
CPU: 0
EIP: 0010:[get_hash_table+48/180]
EFLAGS: 00010286
eax: ffffffff ebx: 00000305 ecx: 00000305 edx: 00003f0d
esi: 0000befa edi: 00000305 ebp: 0000bdff esp: 01b45cc8
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process fsck.ext2 (pid: 37, process nr: 9, stackpage=01b45000)
Stack: 00000000 00000001 01b40305 00000400 000000ec 001247ed 00000305 0000bdff
00000400 00000000 0000be00 01b45f74 00000001 01db8b6c 01db8b6c 00129439
00000305 0000bdff 00000400 00010380 00000000 00000400 000126c8 0007d020
Call Trace: [getblk+49/1112] [block_read+957/1596] [inode_getblk+67/404] [ide_do_request+1194/1664] [clear_selection+13/72] [merge_segments+1140/1220] [timer_bh+184/328]
[timer_bh+240/328] [do_bottom_half+59/96] [handle_bottom_half+11/24] [do_no_page+436/776] [do_no_page+382/776] [do_no_page+0/776] [timer_bh+240/328] [sys_read+136/176]
[<02f7fc00>] [system_call+85/124] [<02f7fc00>]
Code: 39 28 75 28 66 39 58 04 75 22 8b 4c 24 20 39 48 20 74 22 57
--
TO UNSUBSCRIBE FROM THIS MAILING LIST: e-mail the word "unsubscribe" to
debian-user-request@lists.debian.org .
Trouble? e-mail to templin@bucknell.edu .
Reply to: