My last bug report did not seem to attract to much attention. But I'm back and I have a even longer oops list. Last night our system crashed (again). (Again) right after arkeia had started the nightly backup. But this time the kernel oopses went through syslog. Here they are ran through ksymoops (which issued many warnings). For now we have switched back to 2.2.18 which stays up for about a week before it crashes because of the VM too. (with trying to free unused pages..). The System is a Athlohn K7, 600Mhz with 512MB of RAM. aage, wrong page on list. aage, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: rec>VM: reclaim_page, wrong page on list. VM: rec>VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: reclaim_page, wrong page on list. VM: refill_inactive, wrong page on list. VM: refill_inactive, wrong page on list. VM: refill_inactive, wrong page on list. Unable to handle kernel paging request at virtual address 00002208 VM: refill_inactive, wrong page on list. Unable to handle kernel paging request at virtual address 00002208 printing eip: printing eip: ksymoops 2.3.7 on i686 2.2.18. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.2.18/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. -- missing error messages -- Unable to handle kernel paging request at virtual address 00002208 Unable to handle kernel paging request at virtual address 00002208 c0123b9f c0123b9f *pde = 00000000 *pde = 00000000 Oops: 0000 Oops: 0000 CPU: 0 CPU: 0 EIP: 0010:[__set_page_dirty+19/60] EIP: 0010:[__set_page_dirty+19/60] EFLAGS: 00010246 EFLAGS: 00010246 eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400 eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400 esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8 esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process kswapd (pid: 3, stackpage=dfffd000) Process kswapd (pid: 3, stackpage=dfffd000) Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000 000002f4 Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000 000002f4 05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4 c115ec74 05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4 c115ec74 40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0 c222a40c 40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0 c222a40c Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260] [swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180] [refill_inactive+146/180] [do_try_to_free_pages+73/128] Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260] [swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180] [refill_inactive+146/180] [do_try_to_free_pages+73/128] Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20 Using defaults from ksymoops -t elf32-i386 -a i386 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 51 08 mov 0x8(%ecx),%edx Code; 00000003 Before first symbol 3: 89 42 04 mov %eax,0x4(%edx) Code; 00000006 Before first symbol 6: 8d 71 08 lea 0x8(%ecx),%esi Code; 00000009 Before first symbol 9: 89 10 mov %edx,(%eax) Code; 0000000b Before first symbol b: 89 70 04 mov %esi,0x4(%eax) Code; 0000000e Before first symbol e: 89 41 08 mov %eax,0x8(%ecx) Code; 00000011 Before first symbol 11: 8b 41 20 mov 0x20(%ecx),%eax Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 8b 51 08 mov 0x8(%ecx),%edx Code; 00000003 Before first symbol 3: 89 42 04 mov %eax,0x4(%edx) Code; 00000006 Before first symbol 6: 8d 71 08 lea 0x8(%ecx),%esi Code; 00000009 Before first symbol 9: 89 10 mov %edx,(%eax) Code; 0000000b Before first symbol b: 89 70 04 mov %esi,0x4(%eax) Code; 0000000e Before first symbol e: 89 41 08 mov %eax,0x8(%ecx) Code; 00000011 Before first symbol 11: 8b 41 20 mov 0x20(%ecx),%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010096 EFLAGS: 00010096 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process kwm (pid: 1682, stackpage=d6a87000) Process kwm (pid: 1682, stackpage=d6a87000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000 00000bd5 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000 00000bd5 00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000 00000000 00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000 00000000 00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000 d6a87f58 00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000 d6a87f58 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628] [__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328] [__free_pages+26/28] [sock_poll+35/40] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628] [__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328] [__free_pages+26/28] [sock_poll+35/40] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 7751, stackpage=c54df000) Process bash (pid: 7751, stackpage=c54df000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c12c084c Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c12c084c 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 32365, stackpage=c22c3000) Process bash (pid: 32365, stackpage=c22c3000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c22c3e50 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c22c3e50 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 24217, stackpage=caf6b000) Process bash (pid: 24217, stackpage=caf6b000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 fffffc18 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 fffffc18 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 1901, stackpage=d3ce5000) Process bash (pid: 1901, stackpage=d3ce5000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d3ce5e34 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d3ce5e34 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process gdm (pid: 1676, stackpage=d6bd3000) Process gdm (pid: 1676, stackpage=d6bd3000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d6bd3e34 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d6bd3e34 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010086 EFLAGS: 00010086 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 8575, stackpage=def5b000) Process bash (pid: 8575, stackpage=def5b000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 00000b99 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 00000b99 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c c0b03d40 000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c c0b03d40 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052] [do_page_fault+0/1052] [dput+81/324] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052] [do_page_fault+0/1052] [dput+81/324] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 16053, stackpage=c783b000) Process bash (pid: 16053, stackpage=c783b000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c783be50 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c783be50 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010092 EFLAGS: 00010092 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process rlogin (pid: 8594, stackpage=c37ff000) Process rlogin (pid: 8594, stackpage=c37ff000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c37ffe34 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 c37ffe34 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000 00000000 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [__get_free_pages+20/32] [read_swap_cache_async+49/156] [swapin_readahead+141/196] [do_swap_page+32/264] [handle_mm_fault+285/388] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010086 EFLAGS: 00010086 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process bash (pid: 32499, stackpage=cc8e9000) Process bash (pid: 32499, stackpage=cc8e9000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 00000000 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74 c0b03a20 000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74 c0b03a20 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052] [do_page_fault+0/1052] [dput+81/324] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052] [do_page_fault+0/1052] [dput+81/324] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:191! kernel BUG at page_alloc.c:191! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[rmqueue+130/664] EIP: 0010:[rmqueue+130/664] EFLAGS: 00010086 EFLAGS: 00010086 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0 esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0 ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process o3flow (pid: 19626, stackpage=da64f000) Process o3flow (pid: 19626, stackpage=da64f000) Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d5ac5000 Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000 d5ac5000 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000 00000000 000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730 00000007 000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730 00000007 Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64] Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628] [generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64] Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05 Code; 00000000 Before first symbol 00000000 <_EIP>: Code; 00000000 Before first symbol 0: 0f 0b ud2a Code; 00000002 Before first symbol 2: 83 c4 0c add $0xc,%esp Code; 00000005 Before first symbol 5: 90 nop Code; 00000006 Before first symbol 6: 8b 03 mov (%ebx),%eax Code; 00000008 Before first symbol 8: 8b 53 04 mov 0x4(%ebx),%edx Code; 0000000b Before first symbol b: 89 50 04 mov %edx,0x4(%eax) Code; 0000000e Before first symbol e: 89 02 mov %eax,(%edx) Code; 00000010 Before first symbol 10: 89 d8 mov %ebx,%eax Code; 00000012 Before first symbol 12: 2b 05 00 00 00 00 sub 0x0,%eax kernel BUG at page_alloc.c:73! kernel BUG at page_alloc.c:73! invalid operand: 0000 invalid operand: 0000 CPU: 0 CPU: 0 EIP: 0010:[__free_pages_ok+34/840] EIP: 0010:[__free_pages_ok+34/840] EFLAGS: 00010282 EFLAGS: 00010282 eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001 eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001 esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c ds: 0018 es: 0018 ss: 0018 ds: 0018 es: 0018 ss: 0018 Process xemacs (pid: 2322, stackpage=d81ef000) Process xemacs (pid: 2322, stackpage=d81ef000) 699 warnings and 4 errors issued. Results may not be reliable.
begin:vcard n:Rode;Martin tel;cell:+49-171-1259525 tel;fax:+49-30-4281-8008 tel;work:+49-30-4281-8001 x-mozilla-html:TRUE url:www.programmfabrik.de/~martin org:Programmfabrik GmbH;Entwicklung adr:;;Frankfurter Allee 73d;10247 Berlin;;;Germany version:2.1 email;internet:[EMAIL PROTECTED] title:Dipl.-Kfm. x-mozilla-cpt:;-28960 fn:Martin Rode end:vcard