[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHBA-2002:085-11] Kernel panic on SMP systems with ext3 file systems is now fixed.



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Kernel panic on SMP systems with ext3 file systems is now fixed.
Advisory ID:       RHBA-2002:085-11
Issue date:        2002-05-07
Updated on:        2002-05-09
Product:           Red Hat Linux
Keywords:          kernel panic filesystem ext3 SMP
Cross references:  
Obsoletes:         
---------------------------------------------------------------------

1. Topic:

A few bugs, including one in ext3 that could cause a kernel panic 
on SMP systems, are fixed in this kernel errata.

2. Relevant releases/architectures:

Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch

3. Problem description:

In the 2.4.18-3 kernel, a timing change exposed a previously-unseen
race condition in ext3 which could occasionally cause the kernel
to panic on SMP systems. The 2.4.18-4 kernel corrects this problem.

In addition, under the 2.4.18-3 kernel it was not possible to build modules
for the bigmem kernel (used for machines with memory with
addresses higher than 4GB) due to a typo in its header file
(__module_bigmem should have been __module__bigmem in the file
linux-rhconfig.h). This is now fixed.

Finally, bugs in the vsnprintf implementation and in the way the kernel
reads the /proc/stat file are now fixed.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:
http://www.redhat.com/support/docs/howto/kernel-upgrade/
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.


If you experienced the filesystem panic, you are recommended to
check filesystem consistency.  This bug will show up as one of
"kernel BUG at journal.c:406" or "kernel BUG at commit.c:535"
(The check is done in two places in the source code, and either
of them might show up.)

To force the filesystem check, log in as root, run
 touch /forcefsck
and then reboot the system.  It will check all the filesystems
after rebooting.  This needs to be done only once after you
experience the panic.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

64107 - Kernel Panic when running sendmail test

6. RPMs required:

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-4.src.rpm

athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-4.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-4.athlon.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-4.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-4.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-4.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-4.i386.rpm

i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-4.i586.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-4.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-4.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-4.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-4.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
9d479e5945a7a3f531d1214190531439 7.3/en/os/SRPMS/kernel-2.4.18-4.src.rpm
299f32852ffb307a44ff70f2120a4ce3 7.3/en/os/athlon/kernel-2.4.18-4.athlon.rpm
de7790069bcc3692b3c8327bd944f7ba 7.3/en/os/athlon/kernel-smp-2.4.18-4.athlon.rpm
5238c7b686f49b22b0c8ab53f3ee171a 7.3/en/os/i386/kernel-2.4.18-4.i386.rpm
3618011ce43a90a7d6f04eae0edb4e13 7.3/en/os/i386/kernel-BOOT-2.4.18-4.i386.rpm
3d3a2874a421211e0df83b985cbcc6a1 7.3/en/os/i386/kernel-doc-2.4.18-4.i386.rpm
f2e15d328f25055c5e9ffc7c4ffd0de1 7.3/en/os/i386/kernel-source-2.4.18-4.i386.rpm
031caf81dcb3866cdf934f55de900f39 7.3/en/os/i586/kernel-smp-2.4.18-4.i586.rpm
09394cc1e3a2e9e5e930961084f33c1b 7.3/en/os/i686/kernel-2.4.18-4.i686.rpm
0cab966d442483c69d99a2b9628beb03 7.3/en/os/i686/kernel-bigmem-2.4.18-4.i686.rpm
8668410c124f148fffd8b59f34f8b0ee 7.3/en/os/i686/kernel-debug-2.4.18-4.i686.rpm
2286e5307d2e2f8da474b0cc9e133e5c 7.3/en/os/i686/kernel-smp-2.4.18-4.i686.rpm
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
    http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    rpm --checksig  <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg <filename>

8. References:




Copyright(c) 2000, 2001, 2002 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list





[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]