[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#255175: kernel-image-2.4.26-1-686: oops under unknown circumstances (cron task?)



Package: kernel-image-2.4.26-1-686
Version: 2.4.26-2
Priority: normal

I really don't know what caused this (the computer in which this was found 
is turned on 24h a day and I didn't see the oops, I just found it 
unresponsive at that time). Digging in the logs (today, now that I had 
time) I found this at 06:56 two days ago I found this:

-------------------------------------------------------------------
Jun 18 06:46:38 xxxx -- MARK --
Jun 18 06:56:46 xxxx kernel:  printing eip:
Jun 18 06:56:46 xxxx kernel: c0153c3d
Jun 18 06:56:46 xxxx kernel: Oops: 0002
Jun 18 06:56:46 xxxx kernel: CPU:    0
Jun 18 06:56:46 xxxx kernel: EIP:    0010:[d_alloc+77/368]    Not tainted
Jun 18 06:56:46 xxxx kernel: EFLAGS: 00010217
Jun 18 06:56:46 xxxx kernel: eax: 0000000e   ebx: 2f7795a0   ecx: 00000003   
edx: 2f7795fc
Jun 18 06:56:46 xxxx kernel: esi: ce4e0000   edi: 2f7795fc   ebp: cfa48620   
esp: cd9fdeec
Jun 18 06:56:46 xxxx kernel: ds: 0018   es: 0018   ss: 0018
Jun 18 06:56:46 xxxx kernel: Process find (pid: 31710, stackpage=cd9fd000)
Jun 18 06:56:46 xxxx kernel: Stack: c1487f84 000001f0 0000000e fffffff4 
cef9986c cef99800 cfa48620 c014a657
Jun 18 06:56:46 xxxx kernel:        cfa48620 cd9fdf40 00000000 ce4e000e 
00000000 cd9fdf98 c014ad38 cfa48620
Jun 18 06:56:46 xxxx kernel:        cd9fdf40 00000000 00000008 cef99800 
00000000 ce4e0000 0000000e a6a94a0b
Jun 18 06:56:46 xxxx kernel: Call Trace:    [real_lookup+183/240] 
[link_path_walk+1400/1680] [path_lookup+57/64] [__user_walk+73/96] 
[sys_lstat64+31/144]
Jun 18 06:56:46 xxxx kernel:   [system_call+51/56]
Jun 18 06:56:46 xxxx kernel:
Jun 18 06:56:46 xxxx kernel: Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 
8b 4c 24 24 85 ed 8b
Jun 18 06:56:46 xxxx kernel:  <1>Unable to handle kernel paging request at 
virtual address 2f7795fc
Jun 18 06:56:46 xxxx kernel:  printing eip:
Jun 18 06:56:46 xxxx kernel: c0153c3d
Jun 18 06:56:46 xxxx kernel: Oops: 0002
Jun 18 06:56:46 xxxx kernel: CPU:    0
Jun 18 06:56:46 xxxx kernel: EIP:    0010:[d_alloc+77/368]    Not tainted
Jun 18 06:56:46 xxxx kernel: EFLAGS: 00010213
Jun 18 06:56:46 xxxx kernel: eax: 00000007   ebx: 2f7795a0   ecx: 00000001   
edx: 2f7795fc
-------------------------------------------------------------------

Followed by 5 other oops (ksymoops of all of them attached). Since the last
symoops named process 'cron' it seems that it might be related to it. I had
to manually reset the system after this oops at that time.

If there's anything I can do to try to catch this and reproduce it, 
please let me know.

Regards

Javier
ksymoops 2.4.9 on i686 2.4.26-1-686.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.26-1-686/ (default)
     -m /boot/System.map-2.4.26-1-686 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/fs/ext3/ext3.o for module ext3 has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/fs/jbd/jbd.o for module jbd has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-detect.o for module ide-detect has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/pci/via82cxxx.o for module via82cxxx has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-disk.o for module ide-disk has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/pci/pdc202xx_new.o for module pdc202xx_new has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/drivers/ide/ide-core.o for module ide-core has changed since load
Warning (expand_objects): object /lib/modules/2.4.26-1-686/kernel/net/unix/unix.o for module unix has changed since load
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010217
 eax: 0000000e   ebx: 2f7795a0   ecx: 00000003   edx: 2f7795fc
 esi: ce4e0000   edi: 2f7795fc   ebp: cfa48620   esp: cd9fdeec
 ds: 0018   es: 0018   ss: 0018
 Process find (pid: 31710, stackpage=cd9fd000)
 Stack: c1487f84 000001f0 0000000e fffffff4 cef9986c cef99800 cfa48620 c014a657 
        cfa48620 cd9fdf40 00000000 ce4e000e 00000000 cd9fdf98 c014ad38 cfa48620 
        cd9fdf40 00000000 00000008 cef99800 00000000 ce4e0000 0000000e a6a94a0b 
 Call Trace:    [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [__user_walk+73/96] [sys_lstat64+31/144]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 
Using defaults from ksymoops -t elf32-i386 -a i386


>>esi; ce4e0000 <_end+e1dc5a0/18509600>
>>ebp; cfa48620 <_end+f744bc0/18509600>
>>esp; cd9fdeec <_end+d6fa48c/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010213
 eax: 00000007   ebx: 2f7795a0   ecx: 00000001   edx: 2f7795fc
 esi: caec8024   edi: 2f7795fc   ebp: d65665a0   esp: cb8b3ebc
 ds: 0018   es: 0018   ss: 0018
 Process updatedb (pid: 31707, stackpage=cb8b3000)
 Stack: c1487f84 000001f0 00000007 fffffff4 c9b136ec c9b13680 d65665a0 c014a657 
        d65665a0 cb8b3f10 00000000 caec802b 00000000 cb8b3f84 c014ad38 d65665a0 
        cb8b3f10 00000000 00000001 c9b13680 00000000 caec8024 00000007 a0af7bee 
 Call Trace:    [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [open_namei+110/1488] [filp_open+62/112]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; caec8024 <_end+abc45c4/18509600>
>>ebp; d65665a0 <_end+16262b40/18509600>
>>esp; cb8b3ebc <_end+b5b045c/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel NULL pointer dereference at virtual address 000000a0
 d885baed
 Oops: 0000
 CPU:    0
 EIP:    0010:[ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1500435/96]    Not tainted
 EFLAGS: 00010246
 eax: 00000000   ebx: fffffff4   ecx: d4bcfef8   edx: cc08d0a0
 esi: cc08d0a0   edi: cb196600   ebp: 00000000   esp: d4bcfe60
 ds: 0018   es: 0018   ss: 0018
 Process samhain (pid: 1939, stackpage=d4bcf000)
 Stack: c176b9c0 c8589380 00000000 00000000 cc6d1720 cb196600 c15bc6e0 d885b44c 
        cc6d1720 cb196600 00000000 00000001 00000000 00000000 00000000 cb196600 
        40d2760e 00000000 cb196600 c01564cc cb196600 00000001 00001000 d8855e64 
 Call Trace:    [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1502132/96] [update_atime+108/112] [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1524124/96] [ipt_TOS:__insmod_ipt_TOS_O/lib/modules/2.4.26-1-686/kernel/net/ipv4+-1499567/96] [real_lookup+205/240]
 Code: 8b 98 a0 00 00 00 8b 7c 24 28 89 5c 24 48 8b 77 48 0f b6 4b 


>>ecx; d4bcfef8 <_end+148cc498/18509600>
>>edx; cc08d0a0 <_end+bd89640/18509600>
>>esi; cc08d0a0 <_end+bd89640/18509600>
>>edi; cb196600 <_end+ae92ba0/18509600>
>>esp; d4bcfe60 <_end+148cc400/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   8b 98 a0 00 00 00         mov    0xa0(%eax),%ebx
Code;  00000006 Before first symbol
   6:   8b 7c 24 28               mov    0x28(%esp,1),%edi
Code;  0000000a Before first symbol
   a:   89 5c 24 48               mov    %ebx,0x48(%esp,1)
Code;  0000000e Before first symbol
   e:   8b 77 48                  mov    0x48(%edi),%esi
Code;  00000011 Before first symbol
  11:   0f b6 4b 00               movzbl 0x0(%ebx),%ecx

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010212
 eax: 00000008   ebx: 2f7795a0   ecx: 00000002   edx: 2f7795fc
 esi: d05c5f24   edi: 2f7795fc   ebp: c1489220   esp: d05c5ef8
 ds: 0018   es: 0018   ss: 0018
 Process nmbd (pid: 2058, stackpage=d05c5000)
 Stack: c1487f84 000001f0 d05c5f24 00000000 d4e82760 d05c5f2d 0000000e c01c3355 
        c1489220 d05c5f44 00060fef 3739335b 5d353932 cb196500 00000000 00000000 
        00000286 d78cf680 00000000 d05c5f24 00000008 00060fef 00000000 00000000 
 Call Trace:    [sock_map_fd+133/368] [sys_socket+61/96] [sys_socketcall+104/608] [sys_rt_sigprocmask+337/416] [system_call+51/56]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; d05c5f24 <_end+102c24c4/18509600>
>>ebp; c1489220 <_end+11857c0/18509600>
>>esp; d05c5ef8 <_end+102c2498/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010212
 eax: 00000008   ebx: 2f7795a0   ecx: 00000002   edx: 2f7795fc
 esi: ce7fa012   edi: 2f7795fc   ebp: cee12aa0   esp: d2503f48
 ds: 0018   es: 0018   ss: 0018
 Process rm (pid: 31714, stackpage=d2503000)
 Stack: c1487f84 000001f0 d2503f98 fffffff4 d3865800 cee12aa0 d2503f98 c014b1b7 
        cee12aa0 d2503f98 00000000 ffffffeb ce7fa000 d2503f90 bffffc98 c014c59e 
        d2503f98 cee12aa0 cee12aa0 c148e360 ce7fa012 00000008 596686d1 00000010 
 Call Trace:    [lookup_hash+135/208] [sys_unlink+142/288] [system_call+51/56]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; ce7fa012 <_end+e4f65b2/18509600>
>>ebp; cee12aa0 <_end+eb0f040/18509600>
>>esp; d2503f48 <_end+122004e8/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010213
 eax: 0000000a   ebx: 2f7795a0   ecx: 00000002   edx: 2f7795fc
 esi: d4c08017   edi: 2f7795fc   ebp: d3c6b8a0   esp: d2503ebc
 ds: 0018   es: 0018   ss: 0018
 Process postmaster (pid: 31715, stackpage=d2503000)
 Stack: c1487f84 000001f0 0000000a fffffff4 d088fe0c d088fda0 d3c6b8a0 c014a657 
        d3c6b8a0 d2503f10 00000000 d4c08021 00000000 d2503f84 c014ad38 d3c6b8a0 
        d2503f10 00000000 00000001 d088fda0 00000000 d4c08017 0000000a e6dcd299 
 Call Trace:    [real_lookup+183/240] [link_path_walk+1400/1680] [path_lookup+57/64] [open_namei+110/1488] [filp_open+62/112]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; d4c08017 <_end+149045b7/18509600>
>>ebp; d3c6b8a0 <_end+13967e40/18509600>
>>esp; d2503ebc <_end+1220045c/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010212
 eax: 00000008   ebx: 2f7795a0   ecx: 00000002   edx: 2f7795fc
 esi: d2503f60   edi: 2f7795fc   ebp: c1489320   esp: d2503f28
 ds: 0018   es: 0018   ss: 0018
 Process cron (pid: 31716, stackpage=d2503000)
 Stack: c1487f84 000001f0 d2503f54 d0595c20 cbb4eb40 d2503f69 c4474520 c0149f72 
        c1489320 d2503f80 00060ff1 00000004 00000003 fffffff4 3739335b 5d373932 
        bffff000 d2503f74 00000014 0804a270 14000000 4005d658 d2503f60 00000008 
 Call Trace:    [do_pipe+194/576] [sys_pipe+23/96] [do_page_fault+0/1261] [system_call+51/56]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; d2503f60 <_end+12200500/18509600>
>>ebp; c1489320 <_end+11858c0/18509600>
>>esp; d2503f28 <_end+122004c8/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax

  <1>Unable to handle kernel paging request at virtual address 2f7795fc
 c0153c3d
 Oops: 0002
 CPU:    0
 EIP:    0010:[d_alloc+77/368]    Not tainted
 EFLAGS: 00010212
 eax: 00000008   ebx: 2f7795a0   ecx: 00000002   edx: 2f7795fc
 esi: c5c01f60   edi: 2f7795fc   ebp: c1489320   esp: c5c01f28
 ds: 0018   es: 0018   ss: 0018
 Process cron (pid: 31717, stackpage=c5c01000)
 Stack: c1487f84 000001f0 c5c01f54 d05c7de0 d20a5b60 c5c01f69 d7d41d20 c0149f72 
        c1489320 c5c01f80 00060ff3 00000006 00000005 fffffff4 3739335b 5d393932 
        bffff000 c5c01f74 00000014 0804a270 14000000 4005d658 c5c01f60 00000008 
 Call Trace:    [do_pipe+194/576] [sys_pipe+23/96] [system_call+51/56]
 Code: f3 a5 a8 02 74 02 66 a5 a8 01 74 01 a4 8b 4c 24 24 85 ed 8b 


>>esi; c5c01f60 <_end+58fe500/18509600>
>>ebp; c1489320 <_end+11858c0/18509600>
>>esp; c5c01f28 <_end+58fe4c8/18509600>

Code;  00000000 Before first symbol
00000000 <_EIP>:
Code;  00000000 Before first symbol
   0:   f3 a5                     repz movsl %ds:(%esi),%es:(%edi)
Code;  00000002 Before first symbol
   2:   a8 02                     test   $0x2,%al
Code;  00000004 Before first symbol
   4:   74 02                     je     8 <_EIP+0x8>
Code;  00000006 Before first symbol
   6:   66 a5                     movsw  %ds:(%esi),%es:(%edi)
Code;  00000008 Before first symbol
   8:   a8 01                     test   $0x1,%al
Code;  0000000a Before first symbol
   a:   74 01                     je     d <_EIP+0xd>
Code;  0000000c Before first symbol
   c:   a4                        movsb  %ds:(%esi),%es:(%edi)
Code;  0000000d Before first symbol
   d:   8b 4c 24 24               mov    0x24(%esp,1),%ecx
Code;  00000011 Before first symbol
  11:   85 ed                     test   %ebp,%ebp
Code;  00000013 Before first symbol
  13:   8b 00                     mov    (%eax),%eax


9 warnings issued.  Results may not be reliable.

Attachment: signature.asc
Description: Digital signature


Reply to: