Your message dated Mon, 13 Dec 2004 17:58:44 +0900 with message-id <[EMAIL PROTECTED]> and subject line Bug#283115: kernel oops ins xfs_acl_get_attr with kernel-image-2.4.27-1-686-smp has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 26 Nov 2004 16:13:19 +0000 >From [EMAIL PROTECTED] Fri Nov 26 08:13:18 2004 Return-path: <[EMAIL PROTECTED]> Received: from iterfw.rzg.mpg.de (virusw1.dmz.itereu.de) [130.183.3.2] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CXiik-0001US-00; Fri, 26 Nov 2004 08:13:18 -0800 Received: from merlin (virusw1 [127.0.0.1]) by virusw1.dmz.itereu.de (8.11.6/8.11.6) with ESMTP id iAQAATf27308 for <[EMAIL PROTECTED]>; Fri, 26 Nov 2004 11:10:29 +0100 Received: from [194.59.170.134] (pcbecks.itereu.de [::ffff:194.59.170.134]) (AUTH: PLAIN becks, SSL: TLSv1/SSLv3,256bits,AES256-SHA) by merlin with esmtp; Fri, 26 Nov 2004 11:10:29 +0100 id 0000F5CC.41A70115.00006075 Message-ID: <[EMAIL PROTECTED]> Date: Fri, 26 Nov 2004 11:10:29 +0100 From: Stefan Beck <[EMAIL PROTECTED]> Reply-To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.3) Gecko/20041007 Debian/1.7.3-5 X-Accept-Language: en MIME-Version: 1.0 To: [EMAIL PROTECTED] Subject: kernel oops ins xfs_acl_get_attr with kernel-image-2.4.27-1-686-smp Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: Package: kernel-image-2.4.27-1-686-smp Version: 2.4.27-2 Severity: important Hello, after somedays of uptime on our fileserver (nfs,samba,netatalk) we get an kerneloops (see below). After rebooting, we have to repair the xfs filesystem to get rid of the oops. We had that problem with previous kernels 2.4.2[456]-1-686-smp, too. thank you Stefan ksymoops 2.4.9 on i686 2.4.27-1-686-smp. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.27-1-686-smp/ (default) -m /boot/System.map-2.4.27-1-686-smp (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/fs/ext3/ext3.o for module ext3 has changed since load Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/fs/jbd/jbd.o for module jbd has changed since load Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/sd_mod.o for module sd_mod has changed si nce load Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/aic7xxx/aic79xx.o for module aic79xx has changed since load Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/scsi_mod.o for module scsi_mod has change d since load Warning (expand_objects): object /lib/modules/2.4.27-1-686-smp/kernel/net/unix/unix.o for module unix has changed since load <1>Unable to handle kernel NULL pointer dereference at virtual address 00000008 e1a20d39 *pde = 00000000 Oops: 0000 CPU: 1 EIP: 0010:[<e1a20d39>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010246 eax: e1aa3070 ebx: 00002000 ecx: 00000000 edx: e1a98d1c esi: 00002002 edi: 00000000 ebp: d4bc8060 esp: d4ff3d58 ds: 0018 es: 0018 ss: 0018 Process ls (pid: 28666, stackpage=d4ff3000) Stack: d89a5a60 da2c7c00 e1aa2b20 c015f014 d89a5a8c c027cda0 00000130 00002000 00000000 00002100 e1a20334 d4bc8060 00000000 00000001 00002000 d4ff3d98 0000003d 0669fbf8 00000000 d4ff3e30 00000000 00000000 00000000 d6bad8d0 Call Trace: [<e1aa2b20>] [<c015f014>] [<e1a20334>] [<e1aa1ee0>] [<e1a2ae76>] [<e1aa1f40>] [<e1a87c03>] [<c01640db>] [<c012c6b3>] [<e1a60d88>] [<e1a5bd3e>] [<e1a7b48f>] [<c015bbc1>] [<c0151fac>] [<c01527ec>] [<c01641d7>] [<c0108f67>] Code: 8b 59 08 89 44 24 14 8d 44 24 18 89 44 24 0c b8 0c 8d a9 e1 >>EIP; e1a20d39 <[xfs]xfs_acl_get_attr+39/90> <===== >>eax; e1aa3070 <[xfs]sys_cred_val+0/4> >>edx; e1a98d1c <[xfs].rodata.end+11/15> >>ebp; d4bc8060 <_end+14878388/204bd388> >>esp; d4ff3d58 <_end+14ca4080/204bd388> Trace; e1aa2b20 <[xfs]linvfs_sops+0/60> Trace; c015f014 <iput+54/320> Trace; e1a20334 <[xfs]xfs_acl_vget+54/170> Trace; e1aa1ee0 <[xfs]posix_acl_access+0/0> Trace; e1a2ae76 <[xfs]attr_system_get+56/60> Trace; e1aa1f40 <[xfs]attr_system+0/20> Trace; e1a87c03 <[xfs]linvfs_getxattr+93/b0> Trace; c01640db <getxattr+eb/190> Trace; c012c6b3 <in_group_p+23/30> Trace; e1a60d88 <[xfs]xfs_iaccess+c8/1d0> Trace; e1a5bd3e <[xfs]xfs_iunlock+3e/80> Trace; e1a7b48f <[xfs]xfs_access+4f/60> Trace; c015bbc1 <dput+31/190> Trace; c0151fac <link_path_walk+72c/9f0> Trace; c01527ec <__user_walk+5c/60> Trace; c01641d7 <sys_getxattr+57/70> Trace; c0108f67 <tracesys+1f/23> Code; e1a20d39 <[xfs]xfs_acl_get_attr+39/90> 00000000 <_EIP>: Code; e1a20d39 <[xfs]xfs_acl_get_attr+39/90> <===== 0: 8b 59 08 mov 0x8(%ecx),%ebx <===== Code; e1a20d3c <[xfs]xfs_acl_get_attr+3c/90> 3: 89 44 24 14 mov %eax,0x14(%esp) Code; e1a20d40 <[xfs]xfs_acl_get_attr+40/90> 7: 8d 44 24 18 lea 0x18(%esp),%eax Code; e1a20d44 <[xfs]xfs_acl_get_attr+44/90> b: 89 44 24 0c mov %eax,0xc(%esp) Code; e1a20d48 <[xfs]xfs_acl_get_attr+48/90> f: b8 0c 8d a9 e1 mov $0xe1a98d0c,%eax 7 warnings issued. Results may not be reliable. --------------------------------------- Received: (at 283115-done) by bugs.debian.org; 13 Dec 2004 09:26:12 +0000 >From [EMAIL PROTECTED] Mon Dec 13 01:26:11 2004 Return-path: <[EMAIL PROTECTED]> Received: from koto.vergenet.net [210.128.90.7] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1CdmT5-0007k3-00; Mon, 13 Dec 2004 01:26:11 -0800 Received: by koto.vergenet.net (Postfix, from userid 7100) id D42A1345B3; Mon, 13 Dec 2004 18:09:30 +0900 (JST) Date: Mon, 13 Dec 2004 17:58:44 +0900 From: Horms <[EMAIL PROTECTED]> To: Stefan Beck <[EMAIL PROTECTED]> Cc: [EMAIL PROTECTED] Subject: Re: Bug#283115: kernel oops ins xfs_acl_get_attr with kernel-image-2.4.27-1-686-smp Message-ID: <[EMAIL PROTECTED]> References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[EMAIL PROTECTED]> X-Cluestick: seven User-Agent: Mutt/1.5.6+20040907i Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2004_03_25 X-Spam-Level: On Mon, Dec 13, 2004 at 08:27:05AM +0100, Stefan Beck wrote: > Horms wrote: > >On Mon, Nov 29, 2004 at 08:48:09PM +0100, Stefan Beck wrote: > > > >>Horms wrote: > >> > >>>On Fri, Nov 26, 2004 at 11:10:29AM +0100, Stefan Beck wrote: > >>> > >>> > >>>>Package: kernel-image-2.4.27-1-686-smp > >>>>Version: 2.4.27-2 > >>>>Severity: important > >>> > >>> > >>>Does this kernel exhibit the same behaviour? > >>> > >>>http://debian.vergenet.net/pending/kernel-image-2.4.27-i386-2.4.27/ > >>> > >> > >>Unfortunately I can't test this before friday 2004/12/03, since this will > >>take some downtime. I'll let you know on saturday. > > > > > >Thanks, I am actually going to be on holidays next week, > >so I will probably upload the new images to Debian.Org before that. > >In any case, please let me know how you go. > > > > After increasing swapspace (which caused other problems) everything seems > to run perfectly stable so far. Thanks. I am going to close the bug on the strength of that. Please reopen if pain persists. -- Horms