First off, a big thanks to you guys for getting the 2.6.38 patch out!
I'm getting this when the ACL system is enabled (if not enabled, it's fine). See this on both i386 (the trace below) and x86-64. The trace obviously looks different for x86-64 but the "kernel BUG" is at the same spot, gracl.c:1878. Once going, sometimes it'll go for a bit and other times will just spew and spew.
kernel: [ 347.152217] kernel BUG at grsecurity/gracl.c:1878!
kernel: [ 347.152217] invalid opcode: 0000 [#57] SMP
kernel: [ 347.152217] last sysfs file: /sys/devices/system/cpu/cpu7/cache/index2/shared_cpu_map
kernel: [ 347.152217] Modules linked in: dm_snapshot dm_mirror dm_region_hash dm_log dm_mod reiserfs joydev intel_agp intel_gtt i2c_i801 i2c_core agpgart evdev dcdbas i5000_edac i5k_amb hwmon button ide_cd_mod cdrom [last unloaded: scsi_wait_scan]
kernel: [ 347.152217]
kernel: [ 347.152217] Pid: 16491, comm: exim Tainted: G D 2.6.38.1-nx #1
kernel: [ 347.152217] Dell Inc. PowerEdge 1950/0DT097
kernel: [ 347.152217] EIP: 0060:[<0029c83d>] EFLAGS: 00010246 CPU: 3
kernel: [ 347.501343] EIP is at __chk_obj_label+0x47d/0x4f0
kernel: [ 347.501343] EAX: f4cc2888 EBX: 00000000 ECX: db18fa00 EDX: 00000003
kernel: [ 347.501343] ESI: 00000000 EDI: 00000001 EBP: e0bc7a78 ESP: e0bc7a30
kernel: [ 347.501343] DS: 0068 ES: 0068 FS: 00d8 GS: 007b SS: 0068
kernel: [ 347.501343] Process exim (pid: 16491, ti=e0bc6000 task=f1180cf0 task.ti=e0bc6000)
kernel: [ 347.501343] Stack:
kernel: [ 347.501343] db18c600 f2c2a840 f2b65680 00000000 00000067 00000014 000001b3 00000001
kernel: [ 347.501343] 01002000 f18f5b80 f2c2a840 00000000 00000000 00000000 00000001 f1180cf0
kernel: [ 347.501343] f2b65680 db18c600 e0bc7aa8 0029d2af 00000000 00000001 00000000 f2c2a840
kernel: [ 347.501343] Call Trace:
kernel: [ 347.501343] [<01002000>] ? 0x1002000
kernel: [ 347.501343] [<0029d2af>] gr_search_file+0x4f/0x180
kernel: [ 347.501343] [<00404010>] ? e1000_io_error_detected+0x60/0x70
kernel: [ 347.501343] [<002a238b>] gr_acl_handle_hidden_file+0x2b/0xb0
kernel: [ 347.501343] [<00124357>] link_path_walk+0x567/0xb20
kernel: [ 347.501343] [<005867e8>] ? xs_send_kvec+0xa8/0xb0
kernel: [ 347.501343] [<00273365>] ? skcipher_geniv_alloc+0x375/0x420
kernel: [ 347.501343] [<00124a17>] path_walk+0x47/0xa0
kernel: [ 347.501343] [<00124ad2>] vfs_path_lookup+0x62/0xc0
kernel: [ 347.501343] [<005833a1>] rpc_setup_pipedir+0x91/0x1a0
kernel: [ 347.501343] [<000e9208>] ? pcpu_alloc+0x6c8/0x840
kernel: [ 347.501343] [<0010935e>] ? __kmalloc+0xae/0x1b0
kernel: [ 347.501343] [<005834cf>] ? rpc_clone_client+0x1f/0x160
kernel: [ 347.501343] [<005998d1>] ? rpc_alloc_iostats+0x21/0x30
kernel: [ 347.501343] [<000080d0>] ? vector_used_by_percpu_irq+0x20/0x60
kernel: [ 347.501343] [<00583551>] rpc_clone_client+0xa1/0x160
kernel: [ 347.501343] [<001ee5d8>] nfs_init_server_rpcclient+0x28/0x110
kernel: [ 347.501343] [<001efb72>] nfs_clone_server+0xf2/0x270
kernel: [ 347.501343] [<00133a7c>] ? alloc_vfsmnt+0x8c/0x130
kernel: [ 347.501343] [<001fb120>] ? nfs_xdev_mount+0x0/0x240
kernel: [ 347.501343] [<001fb161>] nfs_xdev_mount+0x41/0x240
kernel: [ 347.501343] [<000e93af>] ? __alloc_percpu+0xf/0x20
kernel: [ 347.501343] [<001fb120>] ? nfs_xdev_mount+0x0/0x240
kernel: [ 347.501343] [<00118c8c>] vfs_kern_mount+0x5c/0x180
kernel: [ 347.501343] [<0020468b>] ? nfs_path+0xfb/0x130
kernel: [ 347.501343] [<0020498e>] nfs_d_automount+0x2ce/0x340
kernel: [ 347.501343] [<0012dc0a>] ? dput+0x8a/0x260
kernel: [ 347.501343] [<00020000>] ? mask_IO_APIC_setup+0x0/0xa0
kernel: [ 347.501343] [<001218f5>] follow_managed+0x155/0x1f0
kernel: [ 347.501343] [<008f4980>] ? 0x8f4980
kernel: [ 347.501343] [<00123044>] do_lookup+0x64/0x2a0
kernel: [ 347.501343] [<0012dc0a>] ? dput+0x8a/0x260
kernel: [ 347.501343] [<000705ea>] ? in_group_p+0x2a/0x30
kernel: [ 347.501343] [<00123f19>] link_path_walk+0x129/0xb20
kernel: [ 347.501343] [<000200da>] ? ioapic_resume+0x3a/0xd0
kernel: [ 347.501343] [<00124559>] link_path_walk+0x769/0xb20
kernel: [ 347.501343] [<00124b75>] do_path_lookup+0x45/0x140
kernel: [ 347.501343] [<0012599a>] user_path_at+0x4a/0x80
kernel: [ 347.501343] [<0011b3bf>] vfs_fstatat+0x4f/0x90
kernel: [ 347.501343] [<0011b480>] vfs_stat+0x20/0x30
kernel: [ 347.501343] [<0011b9e9>] sys_stat64+0x19/0x30
kernel: [ 347.501343] [<001216da>] ? path_put+0x1a/0x20
kernel: [ 347.501343] [<002aed6c>] ? trace_hardirqs_on_thunk+0xc/0x10
kernel: [ 347.501343] [<005ce260>] ? do_page_fault+0x0/0x720
kernel: [ 347.501343] [<002aed6c>] ? trace_hardirqs_on_thunk+0xc/0x10
kernel: [ 347.501343] [<005cad2d>] syscall_call+0x7/0xb
kernel: [ 347.501343] Code: c0 e8 38 d3 ff ff 89 45 08 90 8d 74 26 00 e9 23 ff ff ff 80 7d db 00 c7 45 f0 00 00 00 00 0f 85 e5 fc ff ff 66 90 e9 d8 fc ff ff <0f> 0b 90 eb fd 8b 45 0c 85 c0 90 0f 84 9a fd ff ff 8b 5e 14 85
kernel: [ 347.501343] EIP: [<0029c83d>] __chk_obj_label+0x47d/0x4f0 SS:ESP 0068:e0bc7a30
kernel: [ 349.363364] ---[ end trace 69f14e2b38391d0c ]---