Hiya, Been having frequent (every 4-8 days) oopses with 2.4.19pre10aa4 on a moderately loaded server (100 users - 0.4 load avg). The server is a Intel STL2 with dual P3, 1GB RAM, Intel Pro1000T and Qlogic 2300 Fibre channel HBA. We are running qla2300, e1000 and lvm modules unmodified as present in 2.4.19pre10aa4. We also have quotas enabled on 1 of the ext3 fs. This is the first captive oops after setting up logging on the console ports (previously, our cluster software would shoot the machine with a remote power switch, and we'd loose the oops - oopsing to floppy or somesuch would be great!). We have also had similar lock-ups with 2.4.18pre2aa2 although have not been able to catch the oopses. I can't say i understand the oopses, but from what I can see it appears a bufferhead is being accessed that may have been freed. ~mc ksymoops 2.4.1 on i686 2.4.19-pre10. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.19-pre10/ (default) -m /boot/System.map-2.4.19-pre10 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Warning (compare_maps): ksyms_base symbol set_cpus_allowed_R__ver_set_cpus_allowed not found in System.map. Ignoring ksyms_base entry Warning (compare_maps): mismatch on symbol vg , lvm-mod says c4008720, /lib/modules/2.4.19-pre10/kernel/drivers/md/lvm-mod.o says c40085e0. Ignoring /lib/modules/2.4.19-pre10/kernel/drivers/md/lvm-mod.o entry Warning (compare_maps): mismatch on symbol md_size , md says c30a89e0, /lib/modules/2.4.19-pre10/kernel/drivers/md/md.o says c30a8800. Ignoring /lib/modules/2.4.19-pre10/kernel/drivers/md/md.o entry Warning (compare_maps): mismatch on symbol mddev_map , md says c30a81e0, /lib/modules/2.4.19-pre10/kernel/drivers/md/md.o says c30a8000. Ignoring /lib/modules/2.4.19-pre10/kernel/drivers/md/md.o entry Warning (compare_maps): mismatch on symbol usb_devfs_handle , usbcore says c2e6e694, /lib/modules/2.4.19-pre10/kernel/drivers/usb/usbcore.o says c2e6e0f4. Ignoring /lib/modules/2.4.19-pre10/kernel/drivers/usb/usbcore.o entry Reading Oops report from the terminal Unable to handle kernel paging request at virtual address 6d727567 c0140ca6 *pde = 00000000 Oops: 0000 CPU: 0 EIP: 0010:[] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010206 eax: c0284b40 ebx: 00000004 ecx: e1f8d540 edx: 6d727563 esi: 01569a5b edi: 00003a09 ebp: 00000010 esp: eed6de10 ds: 0018 es: 0018 ss: 0018 Process afpd (pid: 20529, stackpage=eed6d000) Stack: 0000e384 00000000 00001000 00001000 eed6de68 c0141a2b 00003a09 01569a5b 00001000 00001000 00001000 c0141d69 ebb2a440 00000000 c0141d8a ee9793e0 ee9793e0 f181c000 00001000 0000017a 00000000 ee9793e0 00001000 00000000 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 39 72 04 89 d1 75 f3 0f b7 42 08 3b 44 24 20 75 e9 66 39 7a >>EIP; c0140ca6 <===== Trace; c0141a2b Trace; c0141d69 <__block_prepare_write+f9/320> Trace; c0141d8a <__block_prepare_write+11a/320> Trace; c0142705 Trace; c016bab0 Trace; c0173577 Trace; c016c018 Trace; c016bab0 Trace; c01364b5 Trace; c0131992 Trace; c01f5788 Trace; c0169822 Trace; c013f206 Trace; c0108aeb Code; c0140ca6 00000000 <_EIP>: Code; c0140ca6 <===== 0: 39 72 04 cmp %esi,0x4(%edx) <===== Code; c0140ca9 3: 89 d1 mov %edx,%ecx Code; c0140cab 5: 75 f3 jne fffffffa <_EIP+0xfffffffa> c0140ca0 Code; c0140cad 7: 0f b7 42 08 movzwl 0x8(%edx),%eax Code; c0140cb1 b: 3b 44 24 20 cmp 0x20(%esp,1),%eax Code; c0140cb5 f: 75 e9 jne fffffffa <_EIP+0xfffffffa> c0140ca0 Code; c0140cb7 11: 66 39 7a 00 cmp %di,0x0(%edx) kernel BUG at transaction.c:227! invalid operand: 0000 CPU: 0 EIP: 0010:[] Not tainted EFLAGS: 00010282 eax: 0000006c ebx: c27af7e0 ecx: c2710000 edx: c2711f64 esi: eed6c000 edi: e11c1d80 ebp: c1e26600 esp: eed6db5c ds: 0018 es: 0018 ss: 0018 Process afpd (pid: 20529, stackpage=eed6d000) Stack: c024f3e0 c024c10a c024c839 000000e3 c0251320 c27af7e0 c27af7e0 ffffffe2 e11c1d80 ed4ab220 c016e38e c1e26600 00000001 00000000 00000000 33323130 c1e0f400 e11c1d80 c1e0f400 00000001 c0153f8e e11c1d80 000001ff e11c1d80 Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b e3 00 39 c8 24 c0 83 c4 14 ff 43 08 eb 6a 6a 01 68 f0 >>EIP; c0173518 <===== Trace; c016e38e Trace; c0153f8e <__mark_inode_dirty+2e/a0> Trace; c01317fa Trace; c013d568 Trace; c0169822 Trace; c01229ca Trace; c0122a3a Trace; c011eaee Trace; c01090dd Trace; c0140ca6 Trace; c01166a8 Trace; c0140ca6 Trace; c016b1f5 Trace; c016b9e7 Trace; c016b8dd Trace; c01162b0 Trace; c0108bdc Trace; c0140018 Trace; c0140ca6 Trace; c0141a2b Trace; c0141d69 <__block_prepare_write+f9/320> Trace; c0141d8a <__block_prepare_write+11a/320> Trace; c0142705 Trace; c016bab0 Trace; c0173577 Trace; c016c018 Trace; c016bab0 Trace; c01364b5 Trace; c0131992 Trace; c01f5788 Trace; c0169822 Trace; c013f206 Trace; c0108aeb Code; c0173518 00000000 <_EIP>: Code; c0173518 <===== 0: 0f 0b ud2a <===== Code; c017351a 2: e3 00 jecxz 4 <_EIP+0x4> c017351c Code; c017351c 4: 39 c8 cmp %ecx,%eax Code; c017351e 6: 24 c0 and $0xc0,%al Code; c0173520 8: 83 c4 14 add $0x14,%esp Code; c0173523 b: ff 43 08 incl 0x8(%ebx) Code; c0173526 e: eb 6a jmp 7a <_EIP+0x7a> c0173592 Code; c0173528 10: 6a 01 push $0x1 Code; c017352a 12: 68 f0 00 00 00 push $0xf0