회원가입

로그인

아이디
비밀번호
ID/PW 찾기
아직 회원이 아니신가요? 회원가입 하기

커널 2.4.18 assertion failure in journal_commit_transaction

Profile
:맥노턴
http://www.cs.helsinki.fi/linux/linux-kernel/2002-22/0619.html2.4.18 assertion failure in journal_commit_transaction
Adam Kropelin (akropel1@rochester.rr.com)
Tue, 4 Jun 2002 15:12:57 -0400

Messages sorted by: [ date ][ thread ][ subject ][ author ]
Next message: Alan Cox: "Re: [OT] Re: please kindly get back to me"
Previous message: Alan Cox: "Re: Question regarding do_munmap"

--------------------------------------------------------------------------------
On Tue, Jun 04, 2002 at 02:30:07PM -0400, Brett Dikeman wrote:
> Greetings all.
>
> I'm helping a company which just installed Redhat 7.3 on several
> systems(Compaq dl380G2, dual proc systems.) They are running the smp
> kernel that came with the distro(versioned 2.4.18-3; -4 is out, but I
> reviewed the changelogs and it didn't look like they did anything
> that would affect this problem, but I really couldn't tell.) ext3
> for all filesystems, hardware raid 0+1 via the Compaq controller.

Uh, what changelog did you read?


Redhat seems pretty clear that 2.4.18-3 + ext3 + SMP = bad


The errata describing 2.4.18-4 is here:
http://rhn.redhat.com/errata/RHBA-2002-085.html


--Adam


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/





Kernel panic on SMP systems with ext3 file systems is now fixed.

Advisory: RHBA-2002:085-11
Last updated on: 2002-05-09
Affected Products: Red Hat Linux 7.3

back


   Bug Fix Advisory


Details:

A few bugs, including one in ext3 that could cause a kernel panic
on SMP systems, are fixed in this kernel errata.

In the 2.4.18-3 kernel, a timing change exposed a previously-unseen
race condition in ext3 which could occasionally cause the kernel
to panic on SMP systems. The 2.4.18-4 kernel corrects this problem.

In addition, under the 2.4.18-3 kernel it was not possible to build modules
for the bigmem kernel (used for machines with memory with
addresses higher than 4GB) due to a typo in its header file
(__module_bigmem should have been __module__bigmem in the file
linux-rhconfig.h). This is now fixed.

Finally, bugs in the vsnprintf implementation and in the way the kernel
reads the /proc/stat file are now fixed.



Updated packages:

Red Hat Linux 7.3

--------------------------------------------------------------------------------

SRPMS:
kernel-2.4.18-4.src.rpm
File outdated by:  RHBA-2003:263     9d479e5945a7a3f531d1214190531439
  
athlon:
kernel-2.4.18-4.athlon.rpm
File outdated by:  RHBA-2003:263     299f32852ffb307a44ff70f2120a4ce3
kernel-smp-2.4.18-4.athlon.rpm
File outdated by:  RHBA-2003:263     de7790069bcc3692b3c8327bd944f7ba
  
i386:
kernel-2.4.18-4.i386.rpm
File outdated by:  RHBA-2003:263     5238c7b686f49b22b0c8ab53f3ee171a
kernel-BOOT-2.4.18-4.i386.rpm
File outdated by:  RHBA-2003:263     3618011ce43a90a7d6f04eae0edb4e13
kernel-doc-2.4.18-4.i386.rpm
File outdated by:  RHBA-2003:263     3d3a2874a421211e0df83b985cbcc6a1
kernel-source-2.4.18-4.i386.rpm
File outdated by:  RHBA-2003:263     f2e15d328f25055c5e9ffc7c4ffd0de1
  
i586:
kernel-smp-2.4.18-4.i586.rpm
File outdated by:  RHBA-2003:263     031caf81dcb3866cdf934f55de900f39
  
i686:
kernel-2.4.18-4.i686.rpm
File outdated by:  RHBA-2003:263     09394cc1e3a2e9e5e930961084f33c1b
kernel-bigmem-2.4.18-4.i686.rpm
File outdated by:  RHBA-2003:263     0cab966d442483c69d99a2b9628beb03
kernel-debug-2.4.18-4.i686.rpm
File outdated by:  RHSA-2003:098     8668410c124f148fffd8b59f34f8b0ee
kernel-smp-2.4.18-4.i686.rpm
File outdated by:  RHBA-2003:263     2286e5307d2e2f8da474b0cc9e133e5c
  

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:
http://www.redhat.com/support/docs/howto/kernel-upgrade/
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.


If you experienced the filesystem panic, you are recommended to
check filesystem consistency. This bug will show up as one of
"kernel BUG at journal.c:406" or "kernel BUG at commit.c:535"
(The check is done in two places in the source code, and either
of them might show up.)

To force the filesystem check, log in as root, run
touch /forcefsck
and then reboot the system. It will check all the filesystems
after rebooting. This needs to be done only once after you
experience the panic.



Bugs fixed:  (see bugzilla for more information)

64107 - Kernel Panic when running sendmail test



Keywords:

ext3, filesystem, kernel, panic, SMP



--------------------------------------------------------------------------------
The listed packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/solutions/security/news/publickey/#key
You can verify each package and see who signed it with the following command:

rpm --checksig -v filename
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:

md5sum filename
The Red Hat security contact is security@redhat.com. More contact details at http://www.redhat.com/solutions/security/news/contact.html

Profile
:맥노턴
레벨 30
569410/686490
81%
McNorton & Education Lab.
Director
댓글
0
댓글 쓰기
권한이 없습니다.

로그인

아이디
비밀번호
ID/PW 찾기
아직 회원이 아니신가요? 회원가입 하기