2.4.1 crashes every two days, oopses included

From: Martin Rode (Martin.Rode@programmfabrik.de)
Date: Thu Feb 15 2001 - 10:19:50 EST


My last bug report did not seem to attract to much attention. But I'm
back and I have a even longer oops list. Last night our system crashed
(again). (Again) right after arkeia had started the nightly backup. But
this time the kernel oopses went through syslog. Here they are ran
through ksymoops (which issued many warnings).

For now we have switched back to 2.2.18 which stays up for about a week
before it crashes because of the VM too. (with trying to free unused
pages..).

The System is a Athlohn K7, 600Mhz with 512MB of RAM.

aage, wrong page on list.
aage, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: rec>VM: reclaim_page, wrong page on list.
VM: rec>VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: refill_inactive, wrong page on list.
VM: refill_inactive, wrong page on list.
VM: refill_inactive, wrong page on list.
Unable to handle kernel paging request at virtual address 00002208
VM: refill_inactive, wrong page on list.
Unable to handle kernel paging request at virtual address 00002208
 printing eip:
 printing eip:

ksymoops 2.3.7 on i686 2.2.18. Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.2.18/ (default)
     -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.

-- missing error messages --

Unable to handle kernel paging request at virtual address 00002208
Unable to handle kernel paging request at virtual address 00002208
c0123b9f
c0123b9f
*pde = 00000000
*pde = 00000000
Oops: 0000
Oops: 0000
CPU: 0
CPU: 0
EIP: 0010:[__set_page_dirty+19/60]
EIP: 0010:[__set_page_dirty+19/60]
EFLAGS: 00010246
EFLAGS: 00010246
eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400
eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400
esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8
esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 3, stackpage=dfffd000)
Process kswapd (pid: 3, stackpage=dfffd000)
Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000
000002f4
Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000
000002f4
       05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4
c115ec74
       05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4
c115ec74
       40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0
c222a40c
       40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0
c222a40c
Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260]
[swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180]
[refill_inactive+146/180] [do_try_to_free_pages+73/128]
Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260]
[swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180]
[refill_inactive+146/180] [do_try_to_free_pages+73/128]
Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20
Using defaults from ksymoops -t elf32-i386 -a i386

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 8b 51 08 mov 0x8(%ecx),%edx
Code; 00000003 Before first symbol
   3: 89 42 04 mov %eax,0x4(%edx)
Code; 00000006 Before first symbol
   6: 8d 71 08 lea 0x8(%ecx),%esi
Code; 00000009 Before first symbol
   9: 89 10 mov %edx,(%eax)
Code; 0000000b Before first symbol
   b: 89 70 04 mov %esi,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 41 08 mov %eax,0x8(%ecx)
Code; 00000011 Before first symbol
  11: 8b 41 20 mov 0x20(%ecx),%eax

Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 8b 51 08 mov 0x8(%ecx),%edx
Code; 00000003 Before first symbol
   3: 89 42 04 mov %eax,0x4(%edx)
Code; 00000006 Before first symbol
   6: 8d 71 08 lea 0x8(%ecx),%esi
Code; 00000009 Before first symbol
   9: 89 10 mov %edx,(%eax)
Code; 0000000b Before first symbol
   b: 89 70 04 mov %esi,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 41 08 mov %eax,0x8(%ecx)
Code; 00000011 Before first symbol
  11: 8b 41 20 mov 0x20(%ecx),%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010096
EFLAGS: 00010096
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process kwm (pid: 1682, stackpage=d6a87000)
Process kwm (pid: 1682, stackpage=d6a87000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000
00000bd5
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000
00000bd5
       00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000
00000000
       00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000
00000000
       00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000
d6a87f58
       00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000
d6a87f58
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628]
[__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328]
[__free_pages+26/28] [sock_poll+35/40]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628]
[__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328]
[__free_pages+26/28] [sock_poll+35/40]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 7751, stackpage=c54df000)
Process bash (pid: 7751, stackpage=c54df000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c12c084c
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c12c084c
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 32365, stackpage=c22c3000)
Process bash (pid: 32365, stackpage=c22c3000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c22c3e50
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c22c3e50
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]

Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 24217, stackpage=caf6b000)
Process bash (pid: 24217, stackpage=caf6b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
fffffc18
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
fffffc18
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 1901, stackpage=d3ce5000)
Process bash (pid: 1901, stackpage=d3ce5000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d3ce5e34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d3ce5e34
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process gdm (pid: 1676, stackpage=d6bd3000)
Process gdm (pid: 1676, stackpage=d6bd3000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d6bd3e34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d6bd3e34
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 8575, stackpage=def5b000)
Process bash (pid: 8575, stackpage=def5b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000b99
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000b99
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c
c0b03d40
       000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c
c0b03d40
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 16053, stackpage=c783b000)
Process bash (pid: 16053, stackpage=c783b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c783be50
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c783be50
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]

Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process rlogin (pid: 8594, stackpage=c37ff000)
Process rlogin (pid: 8594, stackpage=c37ff000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c37ffe34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c37ffe34
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
       000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 32499, stackpage=cc8e9000)
Process bash (pid: 32499, stackpage=cc8e9000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000000
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74
c0b03a20
       000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74
c0b03a20
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process o3flow (pid: 19626, stackpage=da64f000)
Process o3flow (pid: 19626, stackpage=da64f000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d5ac5000
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d5ac5000
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
       000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730
00000007
       000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730
00000007
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05

Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
   0: 0f 0b ud2a
Code; 00000002 Before first symbol
   2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
   5: 90 nop
Code; 00000006 Before first symbol
   6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
   8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
   b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
   e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
  10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
  12: 2b 05 00 00 00 00 sub 0x0,%eax

kernel BUG at page_alloc.c:73!
kernel BUG at page_alloc.c:73!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[__free_pages_ok+34/840]
EIP: 0010:[__free_pages_ok+34/840]
EFLAGS: 00010282
EFLAGS: 00010282
eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001
eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001
esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c
esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process xemacs (pid: 2322, stackpage=d81ef000)
Process xemacs (pid: 2322, stackpage=d81ef000)

699 warnings and 4 errors issued. Results may not be reliable.



-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Thu Feb 15 2001 - 21:00:26 EST