Each one of these failures seems to be related to smbfs. kernel-enterprise-2.4.18-3mdk-1-1mdk
These prevent umounting of or access to the affected smbfs mounts. Only fix is to reboot (over and over and over and...). Module won't unload due to being in use. Please let me know if there's any other information you need, tests to run, or any other such helpful stuff. Believe me, I have no greater wish or priority right now than to help you or whomever to get this fixed. ---Begin trace 1--- Mar 5 21:55:21 nextgen kernel: Unable to handle kernel paging request at virtual address f8000000 Mar 5 21:55:21 nextgen kernel: printing eip: Mar 5 21:55:21 nextgen kernel: f8a1bda0 Mar 5 21:55:21 nextgen kernel: *pde = 00000000 Mar 5 21:55:21 nextgen kernel: Oops: 0000 Mar 5 21:55:21 nextgen kernel: CPU: 0 Mar 5 21:55:21 nextgen kernel: EIP: 0010:[<f8a1bda0>] Not tainted Mar 5 21:55:21 nextgen kernel: EFLAGS: 00010293 Mar 5 21:55:21 nextgen kernel: eax: 4ee9d51d ebx: 14026e73 ecx: f34c23fd edx: 762ec439 Mar 5 21:55:21 nextgen kernel: esi: f8000000 edi: c3cb7e2c ebp: c3cb7ec0 esp: c3cb7dec Mar 5 21:55:21 nextgen kernel: ds: 0018 es: 0018 ss: 0018 Mar 5 21:55:21 nextgen kernel: Process find (pid: 6403, stackpage=c3cb7000) Mar 5 21:55:21 nextgen kernel: Stack: 00000000 00000000 00000000 f1084520 d29117e0 0800013b 0082bda6 65756c61 Mar 5 21:55:21 nextgen kernel: 00000000 00000000 fe009000 00000007 00000000 00000000 00000001 00000009 Mar 5 21:55:21 nextgen kernel: c3cb7e90 00000001 f8a62382 c014b8b0 eb4c2000 f8a1a331 e5850320 c3cb7fa0 Mar 5 21:55:21 nextgen kernel: Call Trace: [filldir64+0/352] [<f8a1a331>] [filldir64+0/352] [<f8a1b3ba>] [filldir64+0/352] Mar 5 21:55:21 nextgen kernel: Call Trace: [<c014b8b0>] [<f8a1a331>] [<c014b8b0>] [<f8a1b3ba>] [<c014b8b0>] Mar 5 21:55:21 nextgen kernel: [<f8a1b752>] [filldir64+0/352] [vfs_readdir+132/224] [filldir64+0/352] [sys_getdents64+79/188] [filldir64+0/352] Mar 5 21:55:21 nextgen kernel: [<f8a1b752>] [<c014b8b0>] [<c014b334>] [<c014b8b0>] [<c014ba5f>] [<c014b8b0>] Mar 5 21:55:21 nextgen kernel: [grow_buffers+145/288] [system_call+51/56] Mar 5 21:55:21 nextgen kernel: [<c0140001>] [<c010725b>] Mar 5 21:55:21 nextgen kernel: Mar 5 21:55:21 nextgen kernel: Code: 0f b6 06 49 46 89 c2 c1 e8 04 c1 e2 04 8d 14 1a 01 c2 83 f9 ---End Trace 1--- ---Begin Trace 2--- Mar 6 04:25:30 nextgen kernel: Unable to handle kernel paging request at virtual address f8000000 Mar 6 04:25:30 nextgen kernel: printing eip: Mar 6 04:25:30 nextgen kernel: f8a1bda0 Mar 6 04:25:30 nextgen kernel: *pde = 00000000 Mar 6 04:25:30 nextgen kernel: Oops: 0000 Mar 6 04:25:30 nextgen kernel: CPU: 1 Mar 6 04:25:30 nextgen kernel: EIP: 0010:[<f8a1bda0>] Not tainted Mar 6 04:25:30 nextgen kernel: EFLAGS: 00010293 Mar 6 04:25:30 nextgen kernel: eax: 86a200bf ebx: c1cace71 ecx: fc8633fd edx: b486ccf3 Mar 6 04:25:30 nextgen kernel: esi: f8000000 edi: d1869e44 ebp: d1869ed8 esp: d1869e04 Mar 6 04:25:30 nextgen kernel: ds: 0018 es: 0018 ss: 0018 Mar 6 04:25:30 nextgen kernel: Process find (pid: 8536, stackpage=d1869000) Mar 6 04:25:30 nextgen kernel: Stack: 00000000 00000000 00000000 d4d8b7a0 e13741c0 2a2a2a2f 00a676e6 2a2a2a2a Mar 6 04:25:30 nextgen kernel: 00000000 00000000 fe0b7000 00000007 00000000 00000000 00000001 00000009 Mar 6 04:25:30 nextgen kernel: d1869ea8 00000001 f8a983ac c014b680 f4863000 f8a1a331 ea219f60 d1869fa0 Mar 6 04:25:30 nextgen kernel: Call Trace: [filldir+0/320] [<f8a1a331>] [filldir+0/320] [<f8a1b3ba>] [filldir+0/320] Mar 6 04:25:30 nextgen kernel: Call Trace: [<c014b680>] [<f8a1a331>] [<c014b680>] [<f8a1b3ba>] [<c014b680>] Mar 6 04:25:30 nextgen kernel: [filldir+0/320] [vfs_readdir+132/224] [filldir+0/320] [sys_getdents+87/240] [filldir+0/320] [system_call+51/56] Mar 6 04:25:30 nextgen kernel: [<c014b680>] [<c014b334>] [<c014b680>] [<c014b817>] [<c014b680>] [<c010725b>] Mar 6 04:25:30 nextgen kernel: Mar 6 04:25:30 nextgen kernel: Code: 0f b6 06 49 46 89 c2 c1 e8 04 c1 e2 04 8d 14 1a 01 c2 83 f9 ---End Trace 2--- ---Begin Trace 3--- Mar 4 23:50:35 nextgen kernel: Unable to handle kernel paging request at virtual address f8000000 Mar 4 23:50:35 nextgen kernel: printing eip: Mar 4 23:50:35 nextgen kernel: f8a1bda0 Mar 4 23:50:35 nextgen kernel: *pde = 00000000 Mar 4 23:50:35 nextgen kernel: Oops: 0000 Mar 4 23:50:35 nextgen kernel: CPU: 0 Mar 4 23:50:35 nextgen kernel: EIP: 0010:[<f8a1bda0>] Not tainted Mar 4 23:50:35 nextgen kernel: EFLAGS: 00010293 Mar 4 23:50:35 nextgen kernel: eax: 9540420c ebx: 1526f7b4 ecx: e16423fd edx: eaa6739c Mar 4 23:50:35 nextgen kernel: esi: f8000000 edi: c9c11e2c ebp: c9c11ec0 esp: c9c11dec Mar 4 23:50:35 nextgen kernel: ds: 0018 es: 0018 ss: 0018 Mar 4 23:50:35 nextgen kernel: Process find (pid: 2699, stackpage=c9c11000) Mar 4 23:50:35 nextgen kernel: Stack: 00000000 00000000 00000000 ebc9d8c0 eb5a86e0 764e8045 0009714e d788d506 Mar 4 23:50:35 nextgen kernel: 00000000 00000000 eb32a000 0000003c 00000000 00000000 00000001 0000003e Mar 4 23:50:35 nextgen kernel: c9c11e90 00000001 f8a52a20 c014b8b0 d9642000 f8a1a331 d2abd0c0 c9c11fa0 Mar 4 23:50:35 nextgen kernel: Call Trace: [filldir64+0/352] [<f8a1a331>] [filldir64+0/352] [<f8a1b3ba>] [filldir64+0/352] Mar 4 23:50:35 nextgen kernel: Call Trace: [<c014b8b0>] [<f8a1a331>] [<c014b8b0>] [<f8a1b3ba>] [<c014b8b0>] Mar 4 23:50:35 nextgen kernel: [<f8a1b752>] [filldir64+0/352] [vfs_readdir+132/224] [filldir64+0/352] [sys_getdents64+79/188] [filldir64+0/352] Mar 4 23:50:35 nextgen kernel: [<f8a1b752>] [<c014b8b0>] [<c014b334>] [<c014b8b0>] [<c014ba5f>] [<c014b8b0>] Mar 4 23:50:35 nextgen kernel: [grow_buffers+145/288] [system_call+51/56] Mar 4 23:50:35 nextgen kernel: [<c0140001>] [<c010725b>] Mar 4 23:50:35 nextgen kernel: Mar 4 23:50:35 nextgen kernel: Code: 0f b6 06 49 46 89 c2 c1 e8 04 c1 e2 04 8d 14 1a 01 c2 83 f9 ---End Trace 3--- -- Brad Felmey
