Nick
kernel BUG at page_alloc.c:204!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012c3b6>]
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010282
eax: 00000020   ebx: c1008a80   ecx: 00000000   edx: c3f8b920
esi: c1000000   edi: 00001000   ebp: c0209080   esp: c130da34
ds: 0018   es: 0018   ss: 0018
Process squid (pid: 462, stackpage=c130d000)
Stack: c01e7d60 c01e7d53 000000cc 0000022a 00000282 00000000 c0209080
c18cd040
       00000001 c1008ac0 c01248e8 c1008ac0 c12cf840 c12cf7e0 c12cf780
c0209080
       c02092b8 00000000 c02092b0 c012c5aa 00000001 000001d2 c18cd0d8
00003644
Call Trace: [<c01248e8>] [<c012c5aa>] [<c01249a0>] [<c0125ab0>] [<c0122895>]
   [<c01229fe>] [<c014630b>] [<c0125122>] [<c0111a10>] [<c0111ce5>]
[<c0111a10>]
   [<c0106e0c>] [<c01db8b0>] [<c0111a10>] [<c0106e0c>] [<c0120018>]
[<c01db8b0>]
   [<c014745c>] [<c0148081>] [<c0188fdb>] [<c0112624>] [<c012c5aa>]
[<c0147b10>]
   [<c013ad3d>] [<c013afa9>] [<c013bf2b>] [<c0105907>] [<c0106d1b>]
Code: 0f 0b 83 c4 0c 89 d8 e9 a4 fe ff ff 8b 43 18 a9 80 00 00 00
>>EIP; c012c3b6 <rmqueue+196/280>   <=====
Trace; c01248e8 <add_to_page_cache_unique+a8/b0>
Trace; c012c5aa <__alloc_pages+4a/2b0>
Trace; c01249a0 <read_cluster_nonblocking+b0/100>
Trace; c0125ab0 <filemap_nopage+1d0/400>
Trace; c0122894 <do_no_page+44/e0>
Trace; c01229fe <handle_mm_fault+ce/e0>
Trace; c014630a <update_atime+4a/50>
Trace; c0125122 <do_generic_file_read+232/530>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0111ce4 <do_page_fault+2d4/4a0>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0106e0c <error_code+34/3c>
Trace; c01db8b0 <clear_user+30/40>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0106e0c <error_code+34/3c>
Trace; c0120018 <exec_usermodehelper+298/3c0>
Trace; c01db8b0 <clear_user+30/40>
Trace; c014745c <padzero+1c/20>
Trace; c0148080 <load_elf_binary+570/a50>
Trace; c0188fda <submit_bh+3a/80>
Trace; c0112624 <schedule+1f4/3f0>
Trace; c012c5aa <__alloc_pages+4a/2b0>
Trace; c0147b10 <load_elf_binary+0/a50>
Trace; c013ad3c <search_binary_handler+6c/190>
Trace; c013afa8 <do_execve+148/200>
Trace; c013bf2a <getname+6a/b0>
Trace; c0105906 <sys_execve+36/60>
Trace; c0106d1a <system_call+32/38>
Code;  c012c3b6 <rmqueue+196/280>
00000000 <_EIP>:
Code;  c012c3b6 <rmqueue+196/280>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c012c3b8 <rmqueue+198/280>
   2:   83 c4 0c                  add    $0xc,%esp
Code;  c012c3ba <rmqueue+19a/280>
   5:   89 d8                     mov    %ebx,%eax
Code;  c012c3bc <rmqueue+19c/280>
   7:   e9 a4 fe ff ff            jmp    fffffeb0 <_EIP+0xfffffeb0> c012c266
<rmqueue+46/280>
Code;  c012c3c2 <rmqueue+1a2/280>
   c:   8b 43 18                  mov    0x18(%ebx),%eax
Code;  c012c3c4 <rmqueue+1a4/280>
   f:   a9 80 00 00 00            test   $0x80,%eax
kernel BUG at page_alloc.c:204!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012c3b6>]
EFLAGS: 00010282
eax: 00000020   ebx: c1008ac0   ecx: 00000005   edx: c3f8b620
esi: c1000000   edi: 00001000   ebp: c0209080   esp: c2225df0
ds: 0018   es: 0018   ss: 0018
Process xfs-xtt (pid: 450, stackpage=c2225000)
Stack: c01e7d60 c01e7d53 000000cc 0000022b 00000286 00000000 c0209080
0044c35c
       c0279fa0 c3fbd300 c018bec0 c0279fa0 c3fbd300 0044c35c 00000028
c0209080
       c02092b8 00000000 c02092b0 c012c5aa 00000001 000001d2 00000000
c3f8b620
Call Trace: [<c018bec0>] [<c012c5aa>] [<c01227cf>] [<c012292a>] [<c01229fe>]
   [<c014630b>] [<c0125122>] [<c0111a10>] [<c0111ce5>] [<c01254eb>]
[<c0125420>]
   [<c0131ed3>] [<c0118a4b>] [<c0111a10>] [<c0106e0c>]
Code: 0f 0b 83 c4 0c 89 d8 e9 a4 fe ff ff 8b 43 18 a9 80 00 00 00
>>EIP; c012c3b6 <rmqueue+196/280>   <=====
Trace; c018bec0 <start_request+170/220>
Trace; c012c5aa <__alloc_pages+4a/2b0>
Trace; c01227ce <do_anonymous_page+3e/c0>
Trace; c012292a <do_no_page+da/e0>
Trace; c01229fe <handle_mm_fault+ce/e0>
Trace; c014630a <update_atime+4a/50>
Trace; c0125122 <do_generic_file_read+232/530>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0111ce4 <do_page_fault+2d4/4a0>
Trace; c01254ea <generic_file_read+6a/80>
Trace; c0125420 <file_read_actor+0/60>
Trace; c0131ed2 <sys_read+82/d0>
Trace; c0118a4a <do_softirq+5a/a0>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0106e0c <error_code+34/3c>
Code;  c012c3b6 <rmqueue+196/280>
00000000 <_EIP>:
Code;  c012c3b6 <rmqueue+196/280>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c012c3b8 <rmqueue+198/280>
   2:   83 c4 0c                  add    $0xc,%esp
Code;  c012c3ba <rmqueue+19a/280>
   5:   89 d8                     mov    %ebx,%eax
Code;  c012c3bc <rmqueue+19c/280>
   7:   e9 a4 fe ff ff            jmp    fffffeb0 <_EIP+0xfffffeb0> c012c266
<rmqueue+46/280>
Code;  c012c3c2 <rmqueue+1a2/280>
   c:   8b 43 18                  mov    0x18(%ebx),%eax
Code;  c012c3c4 <rmqueue+1a4/280>
   f:   a9 80 00 00 00            test   $0x80,%eax
kernel BUG at page_alloc.c:204!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012c3b6>]
EFLAGS: 00010286
eax: 00000020   ebx: c1008a80   ecx: 00000005   edx: c1f221c0
esi: c1000000   edi: 00001000   ebp: c0209080   esp: c141ddb4
ds: 0018   es: 0018   ss: 0018
Process cc1 (pid: 608, stackpage=c141d000)
Stack: c01e7d60 c01e7d53 000000cc 0000022a 00000286 00000000 c0209080
c1d6f740
       c141c000 c1009100 c01248e8 c1009100 c023e840 c023e7e0 c023e780
c0209080
       c02092b8 00000000 c02092b0 c012c5aa 00000001 000001d2 c1d6f7d8
0000001f
Call Trace: [<c01248e8>] [<c012c5aa>] [<c01249a0>] [<c0125ab0>] [<c01227cf>]
   [<c0122895>] [<c01229fe>] [<c01215ad>] [<c0111a10>] [<c0111ce5>]
[<c0123893>]
   [<c01317d1>] [<c01316d2>] [<c013bf2b>] [<c0131a04>] [<c0111a10>]
[<c0106e0c>]
Code: 0f 0b 83 c4 0c 89 d8 e9 a4 fe ff ff 8b 43 18 a9 80 00 00 00
>>EIP; c012c3b6 <rmqueue+196/280>   <=====
Trace; c01248e8 <add_to_page_cache_unique+a8/b0>
Trace; c012c5aa <__alloc_pages+4a/2b0>
Trace; c01249a0 <read_cluster_nonblocking+b0/100>
Trace; c0125ab0 <filemap_nopage+1d0/400>
Trace; c01227ce <do_anonymous_page+3e/c0>
Trace; c0122894 <do_no_page+44/e0>
Trace; c01229fe <handle_mm_fault+ce/e0>
Trace; c01215ac <zap_page_range+22c/260>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0111ce4 <do_page_fault+2d4/4a0>
Trace; c0123892 <do_munmap+62/2a0>
Trace; c01317d0 <dentry_open+f0/160>
Trace; c01316d2 <filp_open+52/60>
Trace; c013bf2a <getname+6a/b0>
Trace; c0131a04 <sys_open+74/b0>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0106e0c <error_code+34/3c>
Code;  c012c3b6 <rmqueue+196/280>
00000000 <_EIP>:
Code;  c012c3b6 <rmqueue+196/280>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c012c3b8 <rmqueue+198/280>
   2:   83 c4 0c                  add    $0xc,%esp
Code;  c012c3ba <rmqueue+19a/280>
   5:   89 d8                     mov    %ebx,%eax
Code;  c012c3bc <rmqueue+19c/280>
   7:   e9 a4 fe ff ff            jmp    fffffeb0 <_EIP+0xfffffeb0> c012c266
<rmqueue+46/280>
Code;  c012c3c2 <rmqueue+1a2/280>
   c:   8b 43 18                  mov    0x18(%ebx),%eax
Code;  c012c3c4 <rmqueue+1a4/280>
   f:   a9 80 00 00 00            test   $0x80,%eax
kernel BUG at page_alloc.c:75!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012bf72>]
EFLAGS: 00010282
eax: 0000001f   ebx: 00000000   ecx: 00000000   edx: 00000000
esi: c1008a80   edi: 00000007   ebp: 00000001   esp: c3fc1f60
ds: 0018   es: 0018   ss: 0018
Process kswapd (pid: 4, stackpage=c3fc1000)
Stack: c01e7d60 c01e7d53 0000004b c0145b22 c3fc1f7c 00000001 00000000
c1008a9c
       00000000 00000000 c1008a80 00000007 00000001 c012b368 00000002
00000006
       000001c0 00000019 00000001 c012b969 000001c0 00000001 000001c0
00000001
Call Trace: [<c0145b22>] [<c012b368>] [<c012b969>] [<c012ba3e>] [<c0105000>]
   [<c0105000>] [<c01054d6>] [<c012b9e0>]
Code: 0f 0b 83 c4 0c 8b 1d 6c 0c 26 c0 89 f2 29 da c1 fa 06 3b 15
>>EIP; c012bf72 <__free_pages_ok+42/2f0>   <=====
Trace; c0145b22 <prune_icache+92/140>
Trace; c012b368 <page_launder+548/8e0>
Trace; c012b968 <do_try_to_free_pages+48/c0>
Trace; c012ba3e <kswapd+5e/c0>
Trace; c0105000 <_stext+0/0>
Trace; c0105000 <_stext+0/0>
Trace; c01054d6 <kernel_thread+26/30>
Trace; c012b9e0 <kswapd+0/c0>
Code;  c012bf72 <__free_pages_ok+42/2f0>
00000000 <_EIP>:
Code;  c012bf72 <__free_pages_ok+42/2f0>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c012bf74 <__free_pages_ok+44/2f0>
   2:   83 c4 0c                  add    $0xc,%esp
Code;  c012bf76 <__free_pages_ok+46/2f0>
   5:   8b 1d 6c 0c 26 c0         mov    0xc0260c6c,%ebx
Code;  c012bf7c <__free_pages_ok+4c/2f0>
   b:   89 f2                     mov    %esi,%edx
Code;  c012bf7e <__free_pages_ok+4e/2f0>
   d:   29 da                     sub    %ebx,%edx
Code;  c012bf80 <__free_pages_ok+50/2f0>
   f:   c1 fa 06                  sar    $0x6,%edx
Code;  c012bf84 <__free_pages_ok+54/2f0>
  12:   3b 15 00 00 00 00         cmp    0x0,%edx
kernel BUG at vmscan.c:451!
invalid operand: 0000
CPU:    0
EIP:    0010:[<c012ad54>]
EFLAGS: 00010286
eax: 0000001c   ebx: c1008a9c   ecx: 00000004   edx: c1f223c0
esi: c18cd7d8   edi: c1008a80   ebp: c0209098   esp: c3453df8
ds: 0018   es: 0018   ss: 0018
Process modprobe (pid: 905, stackpage=c3453000)
Stack: c01e7b29 c01e7b20 000001c3 c0209080 c02092b8 00000001 00000001
c012c4e5
       c0209080 00000000 c02092bc 00000000 c02092b0 c012c5e0 c02092b0
00000000
       00000001 00000001 00000001 000001d2 00000000 c1f223c0 00000001
c27adae0
Call Trace: [<c012c4e5>] [<c012c5e0>] [<c01227cf>] [<c012292a>] [<c01229fe>]
   [<c014630b>] [<c0125122>] [<c0111a10>] [<c0111ce5>] [<c01254eb>]
[<c0125420>]
   [<c0131ed3>] [<c0150800>] [<c0111a10>] [<c0106e0c>]
Code: 0f 0b 83 c4 0c e9 7c ff ff ff 89 f6 8b 47 18 a9 80 00 00 00
>>EIP; c012ad54 <reclaim_page+3a4/470>   <=====
Trace; c012c4e4 <__alloc_pages_limit+44/a0>
Trace; c012c5e0 <__alloc_pages+80/2b0>
Trace; c01227ce <do_anonymous_page+3e/c0>
Trace; c012292a <do_no_page+da/e0>
Trace; c01229fe <handle_mm_fault+ce/e0>
Trace; c014630a <update_atime+4a/50>
Trace; c0125122 <do_generic_file_read+232/530>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0111ce4 <do_page_fault+2d4/4a0>
Trace; c01254ea <generic_file_read+6a/80>
Trace; c0125420 <file_read_actor+0/60>
Trace; c0131ed2 <sys_read+82/d0>
Trace; c0150800 <ext2_file_lseek+0/b0>
Trace; c0111a10 <do_page_fault+0/4a0>
Trace; c0106e0c <error_code+34/3c>
Code;  c012ad54 <reclaim_page+3a4/470>
00000000 <_EIP>:
Code;  c012ad54 <reclaim_page+3a4/470>   <=====
   0:   0f 0b                     ud2a      <=====
Code;  c012ad56 <reclaim_page+3a6/470>
   2:   83 c4 0c                  add    $0xc,%esp
Code;  c012ad58 <reclaim_page+3a8/470>
   5:   e9 7c ff ff ff            jmp    ffffff86 <_EIP+0xffffff86> c012acda
<reclaim_page+32a/470>
Code;  c012ad5e <reclaim_page+3ae/470>
   a:   89 f6                     mov    %esi,%esi
Code;  c012ad60 <reclaim_page+3b0/470>
   c:   8b 47 18                  mov    0x18(%edi),%eax
Code;  c012ad62 <reclaim_page+3b2/470>
   f:   a9 80 00 00 00            test   $0x80,%eax
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/