Bug#339757: marked as done (kernel-image: kernel BUG at mm/page_alloc.c:683! invalid operand: 0000 [#4])
Your message dated Fri, 25 Nov 2005 09:37:11 -0700
with message-id <1132936631.6062.53.camel@localhost>
and subject line Bug#339757: kernel-image: kernel BUG at mm/page_alloc.c:683! invalid operand: 0000 [#4]
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Nov 2005 16:58:05 +0000
>From roumano@free.fr Fri Nov 18 08:58:05 2005
Return-path: <roumano@free.fr>
Received: from wmh38-1-82-225-141-72.fbx.proxad.net ([82.225.141.72] helo=Roumano)
by spohr.debian.org with esmtp (Exim 4.50)
id 1Ed9Yq-0007h9-JW
for submit@bugs.debian.org; Fri, 18 Nov 2005 08:58:05 -0800
Received: from localhost (localhost [127.0.0.1])
(uid 0)
by Roumano with local; Fri, 18 Nov 2005 17:58:02 +0100
id 00043DF8.437E081A.000016E5
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: roumano <roumano@free.fr>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: kernel-image: kernel BUG at mm/page_alloc.c:683! invalid operand: 0000 [#4]
X-Mailer: reportbug 3.17
Date: Fri, 18 Nov 2005 17:58:02 +0100
Message-ID: <courier.437E081A.000016E5@Roumano>
Delivered-To: submit@bugs.debian.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Package: kernel-image
Version: 2.6.12-1-386
Severity: normal
34 24 9d 8b 44 24 04 83 c4 1c 5b 5e 5f 5d c3 <0f> 0b 1e 01 22 15 29 c0 e9 14 ff ff ff 0f 0b 1d 01 22 15 29 c0
Nov 18 17:32:16 localhost kernel: ------------[ cut here ]------------
Nov 18 17:32:16 localhost kernel: kernel BUG at mm/page_alloc.c:683!
Nov 18 17:32:16 localhost kernel: invalid operand: 0000 [#4]
Nov 18 17:32:16 localhost kernel: Modules linked in: ipv6 af_packet vfat fat ntfs eth1394 usbhid snd_emu10k1_synth snd_emux_synth i2c_viapro snd_seq_virmidi snd_seq_midi_emul snd_seq_dummy via686a snd_seq_oss snd_seq_midi snd_seq_midi_event snd_seq i2c_sensor i2c_core ohci1394 ieee1394 snd_emu10k1 snd_rawmidi snd_seq_device snd_ac97_codec emu10k1_gp gameport snd_pcm_oss snd_mixer_oss snd_pcm snd_timer snd_page_alloc snd_util_mem snd_hwdep snd soundcore 8139cp 8139too mii joydev evdev mousedev uhci_hcd ide_cd cdrom usbcore via_agp agpgart psmouse pci_hotplug rtc floppy parport_pc parport serio_raw pcspkr ext3 jbd ide_disk ide_generic via82cxxx trm290 triflex slc90e66 sis5513 siimage serverworks sc1200 rz1000 piix pdc202xx_old opti621 ns87415 hpt366 hpt34x generic cy82c693 cs5530 cs5520 cmd64x atiixp amd74xx alim15x3 aec62xx pdc202xx_new ide_core unix fbcon tileblit font bitblit vesafb cfbcopyarea cfbimgblt cfbfillrect softcursor capability commoncap
Nov 18 17:32:16 localhost kernel: CPU: 0
Nov 18 17:32:16 localhost kernel: EIP: 0060:[buffered_rmqueue+385/408] Not tainted VLI
Nov 18 17:32:16 localhost kernel: EFLAGS: 00010202 (2.6.12-1-386)
Nov 18 17:32:16 localhost kernel: EIP is at buffered_rmqueue+0x181/0x198
Nov 18 17:32:16 localhost kernel: eax: 00000001 ebx: c02c1518 ecx: c02c1510 edx: c02c14e4
Nov 18 17:32:16 localhost kernel: esi: c02c14e4 edi: 00000015 ebp: 00000000 esp: d577dde4
Nov 18 17:32:16 localhost kernel: ds: 007b es: 007b ss: 0068
Nov 18 17:32:16 localhost kernel: Process java (pid: 5437, threadinfo=d577c000 task=d5b590e0)
Nov 18 17:32:16 localhost kernel: Stack: c02c1510 00000206 c02c14e4 c02c1750 00000000 00000000 c0134280 c02c14e4
Nov 18 17:32:16 localhost kernel: 00000000 000001d2 00000001 c02c174c 000001d2 00000010 d5b590e0 00000000
Nov 18 17:32:16 localhost kernel: 00000001 00000602 00000001 00000001 d577de44 c0136050 d4c02324 00000bab
Nov 18 17:32:16 localhost kernel: Call Trace:
Nov 18 17:32:16 localhost kernel: [__alloc_pages+308/952] __alloc_pages+0x134/0x3b8
Nov 18 17:32:16 localhost kernel: [__do_page_cache_readahead+200/292] __do_page_cache_readahead+0xc8/0x124
Nov 18 17:32:16 localhost kernel: [filemap_nopage+522/828] filemap_nopage+0x20a/0x33c
Nov 18 17:32:16 localhost kernel: [filemap_nopage+0/828] filemap_nopage+0x0/0x33c
Nov 18 17:32:16 localhost kernel: [do_no_page+105/796] do_no_page+0x69/0x31c
Nov 18 17:32:16 localhost kernel: [handle_mm_fault+234/280] handle_mm_fault+0xea/0x118
Nov 18 17:32:16 localhost kernel: [do_page_fault+328/1405] do_page_fault+0x148/0x57d
Nov 18 17:32:16 localhost kernel: [scheduler_tick+26/904] scheduler_tick+0x1a/0x388
Nov 18 17:32:16 localhost kernel: [recalc_task_prio+222/436] recalc_task_prio+0xde/0x1b4
Nov 18 17:32:16 localhost kernel: [smp_local_timer_interrupt+11/84] smp_local_timer_interrupt+0xb/0x54
Nov 18 17:32:16 localhost kernel: [timer_interrupt+138/144] timer_interrupt+0x8a/0x90
Nov 18 17:32:16 localhost kernel: [handle_IRQ_event+47/96] handle_IRQ_event+0x2f/0x60
Nov 18 17:32:16 localhost kernel: [do_page_fault+0/1405] do_page_fault+0x0/0x57d
Nov 18 17:32:16 localhost kernel: [error_code+79/84] error_code+0x4f/0x54
Nov 18 17:32:16 localhost kernel: Code: 5d c3 9c 5b fa 55 56 e8 d2 fa ff ff 89 44 24 08 53 9d 5b 5f 85 c0 0f 85 e8 fe ff ff e9 44 ff ff ff b8 28 00 00 00 e9 15 ff ff ff <0f> 0b ab 02 22 15 29 c0 e9 df fe ff ff 0f 0b 82 02 22 15 29 c0
Nov 18 17:32:35 localhost kernel: <1>Unable to handle kernel paging request at virtual address 00100104
Nov 18 17:35:24 localhost kernel: klogd 1.4.1#17, log source = /proc/kmsg started.
Nov 18 17:35:24 localhost kernel: Inspecting /boot/System.map-2.6.12-1-386
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/dash
Kernel: Linux 2.6.12-1-386
Locale: LANG=fr_FR@euro, LC_CTYPE=fr_FR@euro (charmap=ISO-8859-15)
---------------------------------------
Received: (at 339757-done) by bugs.debian.org; 25 Nov 2005 16:38:08 +0000
>From dannf@dannf.org Fri Nov 25 08:38:08 2005
Return-path: <dannf@dannf.org>
Received: from colo.lackof.org ([198.49.126.79])
by spohr.debian.org with esmtp (Exim 4.50)
id 1EfgaN-0005v5-UW; Fri, 25 Nov 2005 08:38:08 -0800
Received: from localhost (localhost [127.0.0.1])
by colo.lackof.org (Postfix) with ESMTP id 2577D298034;
Fri, 25 Nov 2005 09:45:38 -0700 (MST)
Received: from colo.lackof.org ([127.0.0.1])
by localhost (colo.lackof.org [127.0.0.1]) (amavisd-new, port 10024)
with ESMTP id 21085-01; Fri, 25 Nov 2005 09:45:36 -0700 (MST)
Received: from localhost (localhost [127.0.0.1])
by colo.lackof.org (Postfix) with ESMTP id 70AF7298026;
Fri, 25 Nov 2005 09:45:36 -0700 (MST)
Subject: Re: Bug#339757: kernel-image: kernel BUG at mm/page_alloc.c:683!
invalid operand: 0000 [#4]
From: dann frazier <dannf@dannf.org>
To: Roumano <roumano@free.fr>
Cc: 339757-done@bugs.debian.org, 339757@bugs.debian.org
In-Reply-To: <43873C41.4040608@free.fr>
References: <courier.437E081A.000016E5@Roumano>
<1132509354.5896.52.camel@localhost> <43873C41.4040608@free.fr>
Content-Type: text/plain
Date: Fri, 25 Nov 2005 09:37:11 -0700
Message-Id: <1132936631.6062.53.camel@localhost>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.3
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at lackof.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Version: 2.6.14-3
On Fri, 2005-11-25 at 17:30 +0100, Roumano wrote:
> Yes, problem is solve.
Thanks, marking accordingly.
In the future, please leave the bug number in the CC field when
replying.
Reply to: