Bug Fix Advisory Kernel panic on SMP systems with ext3 file systems is now fixed.

Advisory: RHBA-2002:085-11
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2002-05-07
Last updated on: 2002-05-09
Affected Products: Red Hat Linux 7.3


A few bugs, including one in ext3 that could cause a kernel panic
on SMP systems, are fixed in this kernel errata.

In the 2.4.18-3 kernel, a timing change exposed a previously-unseen
race condition in ext3 which could occasionally cause the kernel
to panic on SMP systems. The 2.4.18-4 kernel corrects this problem.

In addition, under the 2.4.18-3 kernel it was not possible to build modules
for the bigmem kernel (used for machines with memory with
addresses higher than 4GB) due to a typo in its header file
(__module_bigmem should have been __module__bigmem in the file
linux-rhconfig.h). This is now fixed.

Finally, bugs in the vsnprintf implementation and in the way the kernel
reads the /proc/stat file are now fixed.


Before applying this update, make sure all previously released errata
relevant to your system have been applied.

The procedure for upgrading the kernel manually is documented at:
Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:


This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

If you experienced the filesystem panic, you are recommended to
check filesystem consistency. This bug will show up as one of
"kernel BUG at journal.c:406" or "kernel BUG at commit.c:535"
(The check is done in two places in the source code, and either
of them might show up.)

To force the filesystem check, log in as root, run
touch /forcefsck
and then reboot the system. It will check all the filesystems
after rebooting. This needs to be done only once after you
experience the panic.

Updated packages

Red Hat Linux 7.3

File outdated by:  RHSA-2003:417
    MD5: 9d479e5945a7a3f531d1214190531439
File outdated by:  RHSA-2003:417
    MD5: 299f32852ffb307a44ff70f2120a4ce3
File outdated by:  RHSA-2003:417
    MD5: 5238c7b686f49b22b0c8ab53f3ee171a
File outdated by:  RHSA-2003:417
    MD5: 09394cc1e3a2e9e5e930961084f33c1b
File outdated by:  RHSA-2003:417
    MD5: 3618011ce43a90a7d6f04eae0edb4e13
File outdated by:  RHSA-2003:417
    MD5: 0cab966d442483c69d99a2b9628beb03
File outdated by:  RHSA-2003:098
    MD5: 8668410c124f148fffd8b59f34f8b0ee
File outdated by:  RHSA-2003:417
    MD5: 3d3a2874a421211e0df83b985cbcc6a1
File outdated by:  RHSA-2003:417
    MD5: de7790069bcc3692b3c8327bd944f7ba
File outdated by:  RHSA-2003:417
    MD5: 031caf81dcb3866cdf934f55de900f39
File outdated by:  RHSA-2003:417
    MD5: 2286e5307d2e2f8da474b0cc9e133e5c
File outdated by:  RHSA-2003:417
    MD5: f2e15d328f25055c5e9ffc7c4ffd0de1

Bugs fixed (see bugzilla for more information)

64107 - Kernel Panic when running sendmail test


ext3, filesystem, kernel, panic, SMP

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/