Package: kernel-image-2.4.27-2-686-smp Version: 22.4.27-10sarge1 Severity: important
Hello, after somedays of uptime on our fileserver (nfs,samba) we get an kerneloops (see below). This happens when running a chmod on large filesystems (from cron). We had similar problems with previous kernels 2.4.2[4567]--686-smp, too. (e.g. bug #283115) thank you Stefan ------------------------------------------- ksymoops 2.4.9 on i686 2.4.27-2-686-smp. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.27-2-686-smp/ (default) -m /boot/System.map-2.4.27-2-686-smp (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/fs/ext3/ext3.o for module ext3 has changed since load Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/fs/jbd/jbd.o for module jbd has changed since load Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/drivers/scsi/sd_mod.o for module sd_mod has changed since load Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/drivers/scsi/aic7xxx/aic79xx.o for module aic79xx has changed since load Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/drivers/scsi/scsi_mod.o for module scsi_mod has changed since load Warning (expand_objects): object /lib/modules/2.4.27-2-686-smp/kernel/net/unix/unix.o for module unix has changed since load <1>Unable to handle kernel NULL pointer dereference at virtual address 00000008 e1b4eb01 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[<e1b4eb01>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010246 eax: 00000000 ebx: 00000000 ecx: cc483ebc edx: d3a331c0 esi: 00000000 edi: cc483f20 ebp: cc483f64 esp: cc483ea4 ds: 0018 es: 0018 ss: 0018 Process chmod (pid: 14228, stackpage=cc483000) Stack: 00000bb8 ce67a000 d13887c0 00000000 d3a331c0 d3a331e0 00000402 00000000 000081ff 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 43f1d47b 00000000 00000000 00000000 Call Trace: [<c0160103>] [<c0144989>] [<c0146a85>] [<c0145216>] [<c0108f3b>] Code: 8b 50 08 31 c0 89 4c 24 04 8b 4c 24 10 89 44 24 0c 89 74 24
EIP; e1b4eb01 <[xfs]linvfs_setattr+e1/180> <=====
ecx; cc483ebc <_end+c132144/204bb2e8> edx; d3a331c0 <_end+136e1448/204bb2e8> edi; cc483f20 <_end+c1321a8/204bb2e8> ebp; cc483f64 <_end+c1321ec/204bb2e8> esp; cc483ea4 <_end+c13212c/204bb2e8>
Trace; c0160103 <notify_change+2d3/2e5> Trace; c0144989 <sys_chmod+89/b0> Trace; c0146a85 <fput+e5/140> Trace; c0145216 <sys_close+66/80> Trace; c0108f3b <system_call+33/38> Code; e1b4eb01 <[xfs]linvfs_setattr+e1/180> 00000000 <_EIP>: Code; e1b4eb01 <[xfs]linvfs_setattr+e1/180> <===== 0: 8b 50 08 mov 0x8(%eax),%edx <===== Code; e1b4eb04 <[xfs]linvfs_setattr+e4/180> 3: 31 c0 xor %eax,%eax Code; e1b4eb06 <[xfs]linvfs_setattr+e6/180> 5: 89 4c 24 04 mov %ecx,0x4(%esp) Code; e1b4eb0a <[xfs]linvfs_setattr+ea/180> 9: 8b 4c 24 10 mov 0x10(%esp),%ecx Code; e1b4eb0e <[xfs]linvfs_setattr+ee/180> d: 89 44 24 0c mov %eax,0xc(%esp) Code; e1b4eb12 <[xfs]linvfs_setattr+f2/180> 11: 89 74 24 00 mov %esi,0x0(%esp) 7 warnings issued. Results may not be reliable. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]