My last bug report did not seem to attract to much attention. But I'm
back and I have a even longer oops list. Last night our system crashed
(again). (Again) right after arkeia had started the nightly backup. But
this time the kernel oopses went through syslog. Here they are ran
through ksymoops (which issued many warnings).
For now we have switched back to 2.2.18 which stays up for about a week
before it crashes because of the VM too. (with trying to free unused
pages..).
The System is a Athlohn K7, 600Mhz with 512MB of RAM.
aage, wrong page on list.
aage, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: rec>VM: reclaim_page, wrong page on list.
VM: rec>VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: reclaim_page, wrong page on list.
VM: refill_inactive, wrong page on list.
VM: refill_inactive, wrong page on list.
VM: refill_inactive, wrong page on list.
Unable to handle kernel paging request at virtual address 00002208
VM: refill_inactive, wrong page on list.
Unable to handle kernel paging request at virtual address 00002208
printing eip:
printing eip:
ksymoops 2.3.7 on i686 2.2.18. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.2.18/ (default)
-m /usr/src/linux/System.map (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
-- missing error messages --
Unable to handle kernel paging request at virtual address 00002208
Unable to handle kernel paging request at virtual address 00002208
c0123b9f
c0123b9f
*pde = 00000000
*pde = 00000000
Oops: 0000
Oops: 0000
CPU: 0
CPU: 0
EIP: 0010:[__set_page_dirty+19/60]
EIP: 0010:[__set_page_dirty+19/60]
EFLAGS: 00010246
EFLAGS: 00010246
eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400
eax: c115ec74 ebx: c02379e0 ecx: 00002200 edx: c13c0400
esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8
esi: c9f216d4 edi: 05289047 ebp: c9f216d4 esp: dfffded8
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 3, stackpage=dfffd000)
Process kswapd (pid: 3, stackpage=dfffd000)
Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000
000002f4
Stack: c115ec74 c9f216d4 c012a10c c115ec74 c115ec74 c9f216d4 40db5000
000002f4
05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4
c115ec74
05289047 00d5a900 c012a26d d0352ac0 d9deada0 40db5000 c9f216d4
c115ec74
40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0
c222a40c
40c1b000 41000000 c222a40c 40c1b000 c012a347 d0352ac0 d9deada0
c222a40c
Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260]
[swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180]
[refill_inactive+146/180] [do_try_to_free_pages+73/128]
Call Trace: [try_to_swap_out+316/436] [swap_out_pmd+233/260]
[swap_out_vma+191/228] [swap_out_mm+54/92] [swap_out+151/180]
[refill_inactive+146/180] [do_try_to_free_pages+73/128]
Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20
Using defaults from ksymoops -t elf32-i386 -a i386
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 8b 51 08 mov 0x8(%ecx),%edx
Code; 00000003 Before first symbol
3: 89 42 04 mov %eax,0x4(%edx)
Code; 00000006 Before first symbol
6: 8d 71 08 lea 0x8(%ecx),%esi
Code; 00000009 Before first symbol
9: 89 10 mov %edx,(%eax)
Code; 0000000b Before first symbol
b: 89 70 04 mov %esi,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 41 08 mov %eax,0x8(%ecx)
Code; 00000011 Before first symbol
11: 8b 41 20 mov 0x20(%ecx),%eax
Code: 8b 51 08 89 42 04 8d 71 08 89 10 89 70 04 89 41 08 8b 41 20
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 8b 51 08 mov 0x8(%ecx),%edx
Code; 00000003 Before first symbol
3: 89 42 04 mov %eax,0x4(%edx)
Code; 00000006 Before first symbol
6: 8d 71 08 lea 0x8(%ecx),%esi
Code; 00000009 Before first symbol
9: 89 10 mov %edx,(%eax)
Code; 0000000b Before first symbol
b: 89 70 04 mov %esi,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 41 08 mov %eax,0x8(%ecx)
Code; 00000011 Before first symbol
11: 8b 41 20 mov 0x20(%ecx),%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010096
EFLAGS: 00010096
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6a87e54
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process kwm (pid: 1682, stackpage=d6a87000)
Process kwm (pid: 1682, stackpage=d6a87000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000
00000bd5
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237bb8 00000001 00000000
00000bd5
00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000
00000000
00000282 00000000 c02379b8 c012c0b4 c0237bb4 c0237bc0 00000000
00000000
00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000
d6a87f58
00000113 c012c1bd c0237bb4 00000000 00000001 00000001 00000000
d6a87f58
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628]
[__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328]
[__free_pages+26/28] [sock_poll+35/40]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+229/628]
[__get_free_pages+20/32] [__pollwait+51/148] [tcp_poll+47/328]
[__free_pages+26/28] [sock_poll+35/40]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c54dfe08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 7751, stackpage=c54df000)
Process bash (pid: 7751, stackpage=c54df000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c12c084c
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c12c084c
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001a5 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c22c3e24
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 32365, stackpage=c22c3000)
Process bash (pid: 32365, stackpage=c22c3000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c22c3e50
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c22c3e50
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001a7 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: caf6be08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 24217, stackpage=caf6b000)
Process bash (pid: 24217, stackpage=caf6b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
fffffc18
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
fffffc18
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001a9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d3ce5e08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 1901, stackpage=d3ce5000)
Process bash (pid: 1901, stackpage=d3ce5000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d3ce5e34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d3ce5e34
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001ab c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: d6bd3e08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process gdm (pid: 1676, stackpage=d6bd3000)
Process gdm (pid: 1676, stackpage=d6bd3000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d6bd3e34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d6bd3e34
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001af c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: def5be40
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 8575, stackpage=def5b000)
Process bash (pid: 8575, stackpage=def5b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000b99
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000b99
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c
c0b03d40
000001c7 c012c1a0 c0237b8c 00000000 00000002 00000001 c1771b6c
c0b03d40
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c783be24
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 16053, stackpage=c783b000)
Process bash (pid: 16053, stackpage=c783b000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c783be50
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c783be50
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001c9 c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[do_swap_page+40/264] [handle_mm_fault+285/388] [do_page_fault+347/1052]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010092
EFLAGS: 00010092
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: c37ffe08
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process rlogin (pid: 8594, stackpage=c37ff000)
Process rlogin (pid: 8594, stackpage=c37ff000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c37ffe34
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
c37ffe34
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
000001cd c012c1a0 c0237b8c 00000000 00000002 00000001 00000000
00000000
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[__get_free_pages+20/32] [read_swap_cache_async+49/156]
[swapin_readahead+141/196] [do_swap_page+32/264]
[handle_mm_fault+285/388]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: cc8e9e40
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process bash (pid: 32499, stackpage=cc8e9000)
Process bash (pid: 32499, stackpage=cc8e9000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000000
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000286 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74
c0b03a20
000001cf c012c1a0 c0237b8c 00000000 00000002 00000001 c15d2d74
c0b03a20
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[do_wp_page+444/732] [handle_mm_fault+327/388] [do_page_fault+347/1052]
[do_page_fault+0/1052] [dput+81/324]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:191!
kernel BUG at page_alloc.c:191!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[rmqueue+130/664]
EIP: 0010:[rmqueue+130/664]
EFLAGS: 00010086
EFLAGS: 00010086
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
eax: 00000020 ebx: c13c0400 ecx: 00000001 edx: 00000001
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0
esi: c02379e0 edi: 00000000 ebp: 00000000 esp: da64fed0
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process o3flow (pid: 19626, stackpage=da64f000)
Process o3flow (pid: 19626, stackpage=da64f000)
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d5ac5000
Stack: c01f74b3 c01f7661 000000bf c02379b8 c0237b90 00000002 00000000
d5ac5000
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
00000282 00000000 c02379b8 c012c0b4 c0237b8c c0237b98 00000000
00000000
000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730
00000007
000001d1 c012c1a0 c0237b8c 00000000 00000002 00000001 c42f1730
00000007
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64]
Call Trace: [__alloc_pages_limit+148/184] [__alloc_pages+200/628]
[generic_file_write+866/1592] [sys_write+142/196] [system_call+51/64]
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
Code: 0f 0b 83 c4 0c 90 8b 03 8b 53 04 89 50 04 89 02 89 d8 2b 05
Code; 00000000 Before first symbol
00000000 <_EIP>:
Code; 00000000 Before first symbol
0: 0f 0b ud2a
Code; 00000002 Before first symbol
2: 83 c4 0c add $0xc,%esp
Code; 00000005 Before first symbol
5: 90 nop
Code; 00000006 Before first symbol
6: 8b 03 mov (%ebx),%eax
Code; 00000008 Before first symbol
8: 8b 53 04 mov 0x4(%ebx),%edx
Code; 0000000b Before first symbol
b: 89 50 04 mov %edx,0x4(%eax)
Code; 0000000e Before first symbol
e: 89 02 mov %eax,(%edx)
Code; 00000010 Before first symbol
10: 89 d8 mov %ebx,%eax
Code; 00000012 Before first symbol
12: 2b 05 00 00 00 00 sub 0x0,%eax
kernel BUG at page_alloc.c:73!
kernel BUG at page_alloc.c:73!
invalid operand: 0000
invalid operand: 0000
CPU: 0
CPU: 0
EIP: 0010:[__free_pages_ok+34/840]
EIP: 0010:[__free_pages_ok+34/840]
EFLAGS: 00010282
EFLAGS: 00010282
eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001
eax: 0000001f ebx: c115f35c ecx: 00000001 edx: 00000001
esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c
esi: c115f384 edi: 00000000 ebp: d81ef6d4 esp: d81ef63c
ds: 0018 es: 0018 ss: 0018
ds: 0018 es: 0018 ss: 0018
Process xemacs (pid: 2322, stackpage=d81ef000)
Process xemacs (pid: 2322, stackpage=d81ef000)
699 warnings and 4 errors issued. Results may not be reliable.
On Thu, 15 Feb 2001, Martin Rode wrote:
> My last bug report did not seem to attract to much attention.
> For now we have switched back to 2.2.18 which stays up for about
> a week before it crashes because of the VM too.
[snip]
> VM: reclaim_page, wrong page on list.
> VM: refill_inactive, wrong page on list.
> Unable to handle kernel paging request at virtual address 00002208
Since:
1. you see this kind of bug with both 2.2 and the completely
changed 2.4 VM code and
2. this bug usually only happens when people have RAM problems,
could you try running memtest86 on that machine to see if it indeed
has memory errors or if the problem is coming from somewhere else ?
thanks,
Rik
--
Virtual memory is like a game you can't win;
However, without VM there's truly nothing to lose...
http://www.surriel.com/
http://www.conectiva.com/ http://distro.conectiva.com.br/
Rik van Riel wrote:
> On Thu, 15 Feb 2001, Martin Rode wrote:
>
> > My last bug report did not seem to attract to much attention.
>
> > For now we have switched back to 2.2.18 which stays up for about
> > a week before it crashes because of the VM too.
>
> [snip]
> > VM: reclaim_page, wrong page on list.
> > VM: refill_inactive, wrong page on list.
> > Unable to handle kernel paging request at virtual address 00002208
>
> Since:
> 1. you see this kind of bug with both 2.2 and the completely
> changed 2.4 VM code and
> 2. this bug usually only happens when people have RAM problems,
>
> could you try running memtest86 on that machine to see if it indeed
> has memory errors or if the problem is coming from somewhere else ?
Hello Rik,
my maschine has spent the entire week-end running memtest86. It ran for
over 60 hours with all tests and it finished 3 passes with 0 errors.
Here's one more interesting aspect about the behaviour I'm seeing:
with 256 MB RAM:
<= 2.2.18: > 7 days, crashes randomly, no pattern.
>= 2.2.19pre2: 1 hour. Crashes as soon as I start hylafax daemon,
reproducable.
with 512 MB RAM
<= 2.2.18: same behaviour as with 2.4.1
2.4.1: Stands up 1 day, crashes as soon as arekeia has started the
backup (happend twice, second oopses included in my last mail)
Is there anything I can do? Is my problem kernel related? I believe
somehow it is. Is my maschine busted?
Any help appreciates
; Martin
Martin Rode <[email protected]> writes:
> Rik van Riel wrote:
>
> > On Thu, 15 Feb 2001, Martin Rode wrote:
> >
> > > My last bug report did not seem to attract to much attention.
> >
> > > For now we have switched back to 2.2.18 which stays up for about
> > > a week before it crashes because of the VM too.
> >
> > [snip]
> > > VM: reclaim_page, wrong page on list.
> > > VM: refill_inactive, wrong page on list.
> > > Unable to handle kernel paging request at virtual address 00002208
> >
> > Since:
> > 1. you see this kind of bug with both 2.2 and the completely
> > changed 2.4 VM code and
> > 2. this bug usually only happens when people have RAM problems,
> >
> > could you try running memtest86 on that machine to see if it indeed
> > has memory errors or if the problem is coming from somewhere else ?
>
> Hello Rik,
>
> my maschine has spent the entire week-end running memtest86. It ran for
> over 60 hours with all tests and it finished 3 passes with 0 errors.
>
> Here's one more interesting aspect about the behaviour I'm seeing:
>
> with 256 MB RAM:
>
> <= 2.2.18: > 7 days, crashes randomly, no pattern.
> >= 2.2.19pre2: 1 hour. Crashes as soon as I start hylafax daemon,
> reproducable.
>
>
> with 512 MB RAM
>
> <= 2.2.18: same behaviour as with 2.4.1
> 2.4.1: Stands up 1 day, crashes as soon as arekeia has started the
> backup (happend twice, second oopses included in my last mail)
>
>
> Is there anything I can do? Is my problem kernel related? I believe
> somehow it is. Is my maschine busted?
You might want to double check that you have either disabled power
management or that you at least are not using memory it is using.
I ran into one motherboard that would not disable power management but
with default settings did not report which memory it was using for
power management. Eventually I enabled ACPI and that helped.
Eric