--------------------------------------------------------------------- Red Hat, Inc. Red Hat Bug Fix Advisory Synopsis: Kernel panic on SMP systems with ext3 file systems is now fixed. Advisory ID: RHBA-2002:085-11 Issue date: 2002-05-07 Updated on: 2002-05-09 Product: Red Hat Linux Keywords: kernel panic filesystem ext3 SMP Cross references: Obsoletes: --------------------------------------------------------------------- 1. Topic: A few bugs, including one in ext3 that could cause a kernel panic on SMP systems, are fixed in this kernel errata. 2. Relevant releases/architectures: Red Hat Linux 7.3 - athlon, i386, i586, i686, noarch 3. Problem description: In the 2.4.18-3 kernel, a timing change exposed a previously-unseen race condition in ext3 which could occasionally cause the kernel to panic on SMP systems. The 2.4.18-4 kernel corrects this problem. In addition, under the 2.4.18-3 kernel it was not possible to build modules for the bigmem kernel (used for machines with memory with addresses higher than 4GB) due to a typo in its header file (__module_bigmem should have been __module__bigmem in the file linux-rhconfig.h). This is now fixed. Finally, bugs in the vsnprintf implementation and in the way the kernel reads the /proc/stat file are now fixed. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. The procedure for upgrading the kernel manually is documented at: http://www.redhat.com/support/docs/howto/kernel-upgrade/ Please read the directions for your architecture carefully before proceeding with the kernel upgrade. Please note that this update is also available via Red Hat Network. Many people find this to be an easier way to apply updates. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date This will start an interactive process that will result in the appropriate RPMs being upgraded on your system. Note that you need to select the kernel explicitly on default configurations of up2date. If you experienced the filesystem panic, you are recommended to check filesystem consistency. This bug will show up as one of "kernel BUG at journal.c:406" or "kernel BUG at commit.c:535" (The check is done in two places in the source code, and either of them might show up.) To force the filesystem check, log in as root, run touch /forcefsck and then reboot the system. It will check all the filesystems after rebooting. This needs to be done only once after you experience the panic. 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 64107 - Kernel Panic when running sendmail test 6. RPMs required: Red Hat Linux 7.3: SRPMS: ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-4.src.rpm athlon: ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-4.athlon.rpm ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-4.athlon.rpm i386: ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-4.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-4.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-4.i386.rpm ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-4.i386.rpm i586: ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-4.i586.rpm i686: ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-4.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-4.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-4.i686.rpm ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-4.i686.rpm 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- 9d479e5945a7a3f531d1214190531439 7.3/en/os/SRPMS/kernel-2.4.18-4.src.rpm 299f32852ffb307a44ff70f2120a4ce3 7.3/en/os/athlon/kernel-2.4.18-4.athlon.rpm de7790069bcc3692b3c8327bd944f7ba 7.3/en/os/athlon/kernel-smp-2.4.18-4.athlon.rpm 5238c7b686f49b22b0c8ab53f3ee171a 7.3/en/os/i386/kernel-2.4.18-4.i386.rpm 3618011ce43a90a7d6f04eae0edb4e13 7.3/en/os/i386/kernel-BOOT-2.4.18-4.i386.rpm 3d3a2874a421211e0df83b985cbcc6a1 7.3/en/os/i386/kernel-doc-2.4.18-4.i386.rpm f2e15d328f25055c5e9ffc7c4ffd0de1 7.3/en/os/i386/kernel-source-2.4.18-4.i386.rpm 031caf81dcb3866cdf934f55de900f39 7.3/en/os/i586/kernel-smp-2.4.18-4.i586.rpm 09394cc1e3a2e9e5e930961084f33c1b 7.3/en/os/i686/kernel-2.4.18-4.i686.rpm 0cab966d442483c69d99a2b9628beb03 7.3/en/os/i686/kernel-bigmem-2.4.18-4.i686.rpm 8668410c124f148fffd8b59f34f8b0ee 7.3/en/os/i686/kernel-debug-2.4.18-4.i686.rpm 2286e5307d2e2f8da474b0cc9e133e5c 7.3/en/os/i686/kernel-smp-2.4.18-4.i686.rpm These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list