From owner-freebsd-hackers Mon Jun 5 19:10:57 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.10/8.6.6) id TAA20669 for hackers-outgoing; Mon, 5 Jun 1995 19:10:57 -0700 Received: from godzilla.zeta.org.au (godzilla.zeta.org.au [203.2.228.34]) by freefall.cdrom.com (8.6.10/8.6.6) with ESMTP id TAA20660 for ; Mon, 5 Jun 1995 19:10:51 -0700 Received: (from bde@localhost) by godzilla.zeta.org.au (8.6.9/8.6.9) id MAA19355; Tue, 6 Jun 1995 12:06:46 +1000 Date: Tue, 6 Jun 1995 12:06:46 +1000 From: Bruce Evans Message-Id: <199506060206.MAA19355@godzilla.zeta.org.au> To: rgrimes@gndrsh.aac.dev.com, steve2@genesis.tiac.net Subject: Re: kernel page fault while doing tar to /dev/rft0 Cc: hackers@freebsd.org Sender: hackers-owner@freebsd.org Precedence: bulk >> #endif >> + fdblk = 128 << (fd->ft->secsize); >> + >Still will crash some ones system if they get to here with out a >ft device since ft will be null!! Now maybe the open code stops >them from getting here, I am not sure :-(. >> if (!(bp->b_flags & B_FORMAT)) { >> if ((fdu >= NFD) || (bp->b_blkno < 0)) { >> printf( >> >How come fdblk size is coming from the ft structure, but is used in >non ft code??? See line 1108, 1118, and 1120. Perhaps the real bug ft is a pointer to the floppy t_y_pe structure. >Fails my visial, this patch has been rejected for inclusion at this >point in time :-(. Patches should be reviewed by someone (if any :-) who is familiar with the code. Bruce