Your message dated Fri, 20 Jun 2008 17:13:09 +0200
with message-id <[EMAIL PROTECTED]>
and subject line Kernel from Debian 3.1 no longer supported
has caused the Debian Bug report #419247,
regarding Oops: 0002 [#1], log provided, not sure If I choosed right package 
for this possible bug
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
419247: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419247
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: kernel-image-2.6.8-3-686
Severity: normal


kern.log:

pr 13 21:57:04 tenpostadsl kernel: Unable to handle kernel NULL pointer
dereference at virtual address 000000e2
Apr 13 21:57:04 tenpostadsl kernel:  printing eip:
Apr 13 21:57:04 tenpostadsl kernel: c021734b
Apr 13 21:57:04 tenpostadsl kernel: *pde = 00000000
Apr 13 21:57:04 tenpostadsl kernel: Oops: 0002 [#1]
Apr 13 21:57:04 tenpostadsl kernel: PREEMPT 
Apr 13 21:57:04 tenpostadsl kernel: Modules linked in: nfsd exportfs
lockd sunrpc lp ipv6 ipt_MASQUERADE ipt_REDIRECT ipt_REJECT ipt_LOG
ipt_state ipt_pkttyp
e ipt_recent ipt_iprange ipt_physdev ipt_multiport ipt_conntrack
iptable_mangle ip_nat_irc ip_nat_tftp ip_nat_ftp iptable_nat
ip_conntrack_irc ip_conntrack_t
ftp ip_conntrack_ftp ip_conntrack iptable_filter ip_tables af_packet
analog parport_pc parport floppy pcspkr rtc 8139cp snd_intel8x0
snd_ac97_codec snd_pcm s
nd_timer snd_page_alloc gameport snd_mpu401_uart snd_rawmidi
snd_seq_device snd shpchp pciehp pci_hotplug intel_agp agpgart ehci_hcd
usbhid uhci_hcd usbcore 
i810_audio ac97_codec soundcore 8139too mii quota_v2 tsdev mousedev
evdev capability commoncap tun psmouse ide_cd cdrom ext3 jbd mbcache
dm_mod ide_generic p
iix ide_disk ide_core unix font vesafb cfbcopyarea cfbimgblt cfbfillrect
Apr 13 21:57:04 tenpostadsl kernel: CPU:    0
Apr 13 21:57:04 tenpostadsl kernel: EIP:    0060:[sock_recvmsg+187/208]
Not tainted
Apr 13 21:57:04 tenpostadsl kernel: EFLAGS: 00010286   (2.6.8-3-686) 
Apr 13 21:57:04 tenpostadsl kernel: EIP is at sock_recvmsg+0xbb/0xd0
Apr 13 21:57:04 tenpostadsl kernel: eax: 000000e2   ebx: 00000020   ecx:
000005e2   edx: cf7cc580
Apr 13 21:57:04 tenpostadsl kernel: esi: 000005ea   edi: c34e1f50   ebp:
c34e1e50   esp: c34e1dec
Apr 13 21:57:04 tenpostadsl kernel: ds: 007b   es: 007b   ss: 0068
Apr 13 21:57:04 tenpostadsl kernel: Process snort (pid: 30129,
threadinfo=c34e0000 task=c49a2740)
Apr 13 21:57:04 tenpostadsl kernel: Stack: c34e1e50 c54f3800 c34e1f50
000005ea 00000020 c023be10 c9ee7a80 00000020 
Apr 13 21:57:04 tenpostadsl kernel:        000005ea c54f3800 00000001
00000000 c34e1f50 00000000 c023be10 80000000 
Apr 13 21:57:04 tenpostadsl kernel:        00000000 c9ee7a80 cf1875a0
c023c1f9 c9ee7a80 c434dd3e 0a00a8c0 00000000 
Apr 13 21:57:04 tenpostadsl kernel: Call Trace:
Apr 13 21:57:04 tenpostadsl kernel:  [ip_local_deliver_finish+0/480]
ip_local_deliver_finish+0x0/0x1e0
Apr 13 21:57:04 tenpostadsl kernel:  [ip_local_deliver_finish+0/480]
ip_local_deliver_finish+0x0/0x1e0
Apr 13 21:57:04 tenpostadsl kernel:  [ip_rcv_finish+521/640]
ip_rcv_finish+0x209/0x280
Apr 13 21:57:04 tenpostadsl kernel:  [nf_hook_slow+241/304]
nf_hook_slow+0xf1/0x130
Apr 13 21:57:04 tenpostadsl kernel:  [sockfd_lookup+28/128]
sockfd_lookup+0x1c/0x80
Apr 13 21:57:04 tenpostadsl kernel:  [sys_recvfrom+178/288]
sys_recvfrom+0xb2/0x120
Apr 13 21:57:04 tenpostadsl kernel:  [activate_task+98/128]
activate_task+0x62/0x80
Apr 13 21:57:04 tenpostadsl kernel:  [process_timeout+0/16]
process_timeout+0x0/0x10
Apr 13 21:57:04 tenpostadsl kernel:  [wake_up_process+29/48]
wake_up_process+0x1d/0x30
Apr 13 21:57:04 tenpostadsl kernel:  [copy_to_user+62/80]
copy_to_user+0x3e/0x50
Apr 13 21:57:04 tenpostadsl kernel:  [sys_socketcall+454/608]
sys_socketcall+0x1c6/0x260
Apr 13 21:57:04 tenpostadsl kernel:  [syscall_call+7/11]
syscall_call+0x7/0xb
Apr 13 21:57:04 tenpostadsl kernel: Code: 00 00 5b 5e 5f 5d c3 89 e8 e8
37 35 f6 ff eb ec 90 8d 74 26 


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-3-686
Locale: LANG=uk_UA, LC_CTYPE=uk_UA (charmap=KOI8-U)


--- End Message ---
--- Begin Message ---
Version: 2.6.8-99+rm

You reported a bug against the Linux kernel (version 2.6.8) that was
shipped with Debian 3.1 (sarge).  Since Debian 3.1 is no longer
supported and the kernel has changed so much that it would be very
difficult to verify every outstanding bug from 2.6.8, I'm hereby
closing your bug report.

If you still see this issue with the kernel from the upcoming release
of Debian (lenny, version 5.0), then please me know and I'll be happy
to reopen this bug report.

Thanks.

-- 
Martin Michlmayr
http://www.cyrius.com/


--- End Message ---

Reply via email to