Your message dated Mon, 13 Dec 2004 17:58:44 +0900
with message-id <[EMAIL PROTECTED]>
and subject line Bug#283115: kernel oops ins xfs_acl_get_attr with 
kernel-image-2.4.27-1-686-smp
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 26 Nov 2004 16:13:19 +0000
>From [EMAIL PROTECTED] Fri Nov 26 08:13:18 2004
Return-path: <[EMAIL PROTECTED]>
Received: from iterfw.rzg.mpg.de (virusw1.dmz.itereu.de) [130.183.3.2] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CXiik-0001US-00; Fri, 26 Nov 2004 08:13:18 -0800
Received: from merlin (virusw1 [127.0.0.1])
        by virusw1.dmz.itereu.de (8.11.6/8.11.6) with ESMTP id iAQAATf27308
        for <[EMAIL PROTECTED]>; Fri, 26 Nov 2004 11:10:29 +0100
Received: from [194.59.170.134] (pcbecks.itereu.de [::ffff:194.59.170.134])
  (AUTH: PLAIN becks, SSL: TLSv1/SSLv3,256bits,AES256-SHA)
  by merlin with esmtp; Fri, 26 Nov 2004 11:10:29 +0100
  id 0000F5CC.41A70115.00006075
Message-ID: <[EMAIL PROTECTED]>
Date: Fri, 26 Nov 2004 11:10:29 +0100
From: Stefan Beck <[EMAIL PROTECTED]>
Reply-To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED]
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.7.3) Gecko/20041007 
Debian/1.7.3-5
X-Accept-Language: en
MIME-Version: 1.0
To: [EMAIL PROTECTED]
Subject: kernel oops ins xfs_acl_get_attr with kernel-image-2.4.27-1-686-smp
Content-Type: text/plain; charset=us-ascii; format=flowed
Content-Transfer-Encoding: 7bit
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

Package: kernel-image-2.4.27-1-686-smp
Version: 2.4.27-2
Severity: important

Hello,

after somedays of uptime on our fileserver (nfs,samba,netatalk) we get an
kerneloops (see below). After rebooting, we have to repair the xfs filesystem to
get rid of the oops.
We had that problem with previous kernels 2.4.2[456]-1-686-smp, too.

thank you
Stefan




ksymoops 2.4.9 on i686 2.4.27-1-686-smp.  Options used
      -V (default)
      -k /proc/ksyms (default)
      -l /proc/modules (default)
      -o /lib/modules/2.4.27-1-686-smp/ (default)
      -m /boot/System.map-2.4.27-1-686-smp (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/fs/ext3/ext3.o for module ext3 has changed
since load
Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/fs/jbd/jbd.o for module jbd has changed
since load
Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/sd_mod.o for module sd_mod has
changed si
nce load
Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/aic7xxx/aic79xx.o for module
aic79xx has
changed since load
Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/drivers/scsi/scsi_mod.o for module scsi_mod
has change
d since load
Warning (expand_objects): object
/lib/modules/2.4.27-1-686-smp/kernel/net/unix/unix.o for module unix has changed
since load
  <1>Unable to handle kernel NULL pointer dereference at virtual address 
00000008
e1a20d39
*pde = 00000000
Oops: 0000
CPU:    1
EIP:    0010:[<e1a20d39>]    Not tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010246
eax: e1aa3070   ebx: 00002000   ecx: 00000000   edx: e1a98d1c
esi: 00002002   edi: 00000000   ebp: d4bc8060   esp: d4ff3d58
ds: 0018   es: 0018   ss: 0018
Process ls (pid: 28666, stackpage=d4ff3000)
Stack: d89a5a60 da2c7c00 e1aa2b20 c015f014 d89a5a8c c027cda0 00000130 00002000
        00000000 00002100 e1a20334 d4bc8060 00000000 00000001 00002000 d4ff3d98
        0000003d 0669fbf8 00000000 d4ff3e30 00000000 00000000 00000000 d6bad8d0
Call Trace:    [<e1aa2b20>] [<c015f014>] [<e1a20334>] [<e1aa1ee0>] [<e1a2ae76>]
   [<e1aa1f40>] [<e1a87c03>] [<c01640db>] [<c012c6b3>] [<e1a60d88>] [<e1a5bd3e>]
   [<e1a7b48f>] [<c015bbc1>] [<c0151fac>] [<c01527ec>] [<c01641d7>] [<c0108f67>]
Code: 8b 59 08 89 44 24 14 8d 44 24 18 89 44 24 0c b8 0c 8d a9 e1


>>EIP; e1a20d39 <[xfs]xfs_acl_get_attr+39/90>   <=====

>>eax; e1aa3070 <[xfs]sys_cred_val+0/4>
>>edx; e1a98d1c <[xfs].rodata.end+11/15>
>>ebp; d4bc8060 <_end+14878388/204bd388>
>>esp; d4ff3d58 <_end+14ca4080/204bd388>

Trace; e1aa2b20 <[xfs]linvfs_sops+0/60>
Trace; c015f014 <iput+54/320>
Trace; e1a20334 <[xfs]xfs_acl_vget+54/170>
Trace; e1aa1ee0 <[xfs]posix_acl_access+0/0>
Trace; e1a2ae76 <[xfs]attr_system_get+56/60>
Trace; e1aa1f40 <[xfs]attr_system+0/20>
Trace; e1a87c03 <[xfs]linvfs_getxattr+93/b0>
Trace; c01640db <getxattr+eb/190>
Trace; c012c6b3 <in_group_p+23/30>
Trace; e1a60d88 <[xfs]xfs_iaccess+c8/1d0>
Trace; e1a5bd3e <[xfs]xfs_iunlock+3e/80>
Trace; e1a7b48f <[xfs]xfs_access+4f/60>
Trace; c015bbc1 <dput+31/190>
Trace; c0151fac <link_path_walk+72c/9f0>
Trace; c01527ec <__user_walk+5c/60>
Trace; c01641d7 <sys_getxattr+57/70>
Trace; c0108f67 <tracesys+1f/23>

Code;  e1a20d39 <[xfs]xfs_acl_get_attr+39/90>
00000000 <_EIP>:
Code;  e1a20d39 <[xfs]xfs_acl_get_attr+39/90>   <=====
    0:   8b 59 08                  mov    0x8(%ecx),%ebx   <=====
Code;  e1a20d3c <[xfs]xfs_acl_get_attr+3c/90>
    3:   89 44 24 14               mov    %eax,0x14(%esp)
Code;  e1a20d40 <[xfs]xfs_acl_get_attr+40/90>
    7:   8d 44 24 18               lea    0x18(%esp),%eax
Code;  e1a20d44 <[xfs]xfs_acl_get_attr+44/90>
    b:   89 44 24 0c               mov    %eax,0xc(%esp)
Code;  e1a20d48 <[xfs]xfs_acl_get_attr+48/90>
    f:   b8 0c 8d a9 e1            mov    $0xe1a98d0c,%eax


7 warnings issued.  Results may not be reliable.



---------------------------------------
Received: (at 283115-done) by bugs.debian.org; 13 Dec 2004 09:26:12 +0000
>From [EMAIL PROTECTED] Mon Dec 13 01:26:11 2004
Return-path: <[EMAIL PROTECTED]>
Received: from koto.vergenet.net [210.128.90.7] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CdmT5-0007k3-00; Mon, 13 Dec 2004 01:26:11 -0800
Received: by koto.vergenet.net (Postfix, from userid 7100)
        id D42A1345B3; Mon, 13 Dec 2004 18:09:30 +0900 (JST)
Date: Mon, 13 Dec 2004 17:58:44 +0900
From: Horms <[EMAIL PROTECTED]>
To: Stefan Beck <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#283115: kernel oops ins xfs_acl_get_attr with 
kernel-image-2.4.27-1-686-smp
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL PROTECTED]> <[EMAIL 
PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
X-Cluestick: seven
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2004_03_25 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2004_03_25
X-Spam-Level: 

On Mon, Dec 13, 2004 at 08:27:05AM +0100, Stefan Beck wrote:
> Horms wrote:
> >On Mon, Nov 29, 2004 at 08:48:09PM +0100, Stefan Beck wrote:
> >
> >>Horms wrote:
> >>
> >>>On Fri, Nov 26, 2004 at 11:10:29AM +0100, Stefan Beck wrote:
> >>>
> >>>
> >>>>Package: kernel-image-2.4.27-1-686-smp
> >>>>Version: 2.4.27-2
> >>>>Severity: important
> >>>
> >>>
> >>>Does this kernel exhibit the same behaviour?
> >>>
> >>>http://debian.vergenet.net/pending/kernel-image-2.4.27-i386-2.4.27/
> >>>
> >>
> >>Unfortunately I can't test this before friday 2004/12/03, since this will 
> >>take some downtime. I'll let you know on saturday.
> >
> >
> >Thanks, I am actually going to be on holidays next week,
> >so I will probably upload the new images to Debian.Org before that.
> >In any case, please let me know how you go.
> >
> 
> After increasing swapspace (which caused other problems) everything seems 
> to run perfectly stable so far. Thanks.

I am going to close the bug on the strength of that.
Please reopen if pain persists.

-- 
Horms


Reply via email to