Your message dated Fri, 25 Nov 2005 09:37:11 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#339757: kernel-image: kernel BUG at mm/page_alloc.c:683! 
invalid operand: 0000 [#4]
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 Nov 2005 16:58:05 +0000
>From [EMAIL PROTECTED] Fri Nov 18 08:58:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from wmh38-1-82-225-141-72.fbx.proxad.net ([82.225.141.72] 
helo=Roumano)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1Ed9Yq-0007h9-JW
        for [EMAIL PROTECTED]; Fri, 18 Nov 2005 08:58:05 -0800
Received: from localhost (localhost [127.0.0.1])
  (uid 0)
  by Roumano with local; Fri, 18 Nov 2005 17:58:02 +0100
  id 00043DF8.437E081A.000016E5
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: roumano <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: kernel-image: kernel BUG at mm/page_alloc.c:683! invalid operand: 0000 
[#4]
X-Mailer: reportbug 3.17
Date: Fri, 18 Nov 2005 17:58:02 +0100
Message-ID: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Package: kernel-image
Version: 2.6.12-1-386
Severity: normal

34 24 9d 8b 44 24 04 83 c4 1c 5b 5e 5f 5d c3 <0f> 0b 1e 01 22 15 29 c0 e9 14 ff 
ff ff 0f 0b 1d 01 22 15 29 c0 
Nov 18 17:32:16 localhost kernel:  ------------[ cut here ]------------
Nov 18 17:32:16 localhost kernel: kernel BUG at mm/page_alloc.c:683!
Nov 18 17:32:16 localhost kernel: invalid operand: 0000 [#4]
Nov 18 17:32:16 localhost kernel: Modules linked in: ipv6 af_packet vfat fat 
ntfs eth1394 usbhid snd_emu10k1_synth snd_emux_synth i2c_viapro snd_seq_virmidi 
snd_seq_midi_emul snd_seq_dummy via686a snd_seq_oss snd_seq_midi 
snd_seq_midi_event snd_seq i2c_sensor i2c_core ohci1394 ieee1394 snd_emu10k1 
snd_rawmidi snd_seq_device snd_ac97_codec emu10k1_gp gameport snd_pcm_oss 
snd_mixer_oss snd_pcm snd_timer snd_page_alloc snd_util_mem snd_hwdep snd 
soundcore 8139cp 8139too mii joydev evdev mousedev uhci_hcd ide_cd cdrom 
usbcore via_agp agpgart psmouse pci_hotplug rtc floppy parport_pc parport 
serio_raw pcspkr ext3 jbd ide_disk ide_generic via82cxxx trm290 triflex 
slc90e66 sis5513 siimage serverworks sc1200 rz1000 piix pdc202xx_old opti621 
ns87415 hpt366 hpt34x generic cy82c693 cs5530 cs5520 cmd64x atiixp amd74xx 
alim15x3 aec62xx pdc202xx_new ide_core unix fbcon tileblit font bitblit vesafb 
cfbcopyarea cfbimgblt cfbfillrect softcursor capability commoncap
Nov 18 17:32:16 localhost kernel: CPU:    0
Nov 18 17:32:16 localhost kernel: EIP:    0060:[buffered_rmqueue+385/408]    
Not tainted VLI
Nov 18 17:32:16 localhost kernel: EFLAGS: 00010202   (2.6.12-1-386) 
Nov 18 17:32:16 localhost kernel: EIP is at buffered_rmqueue+0x181/0x198
Nov 18 17:32:16 localhost kernel: eax: 00000001   ebx: c02c1518   ecx: c02c1510 
  edx: c02c14e4
Nov 18 17:32:16 localhost kernel: esi: c02c14e4   edi: 00000015   ebp: 00000000 
  esp: d577dde4
Nov 18 17:32:16 localhost kernel: ds: 007b   es: 007b   ss: 0068
Nov 18 17:32:16 localhost kernel: Process java (pid: 5437, threadinfo=d577c000 
task=d5b590e0)
Nov 18 17:32:16 localhost kernel: Stack: c02c1510 00000206 c02c14e4 c02c1750 
00000000 00000000 c0134280 c02c14e4 
Nov 18 17:32:16 localhost kernel:        00000000 000001d2 00000001 c02c174c 
000001d2 00000010 d5b590e0 00000000 
Nov 18 17:32:16 localhost kernel:        00000001 00000602 00000001 00000001 
d577de44 c0136050 d4c02324 00000bab 
Nov 18 17:32:16 localhost kernel: Call Trace:
Nov 18 17:32:16 localhost kernel:  [__alloc_pages+308/952] 
__alloc_pages+0x134/0x3b8
Nov 18 17:32:16 localhost kernel:  [__do_page_cache_readahead+200/292] 
__do_page_cache_readahead+0xc8/0x124
Nov 18 17:32:16 localhost kernel:  [filemap_nopage+522/828] 
filemap_nopage+0x20a/0x33c
Nov 18 17:32:16 localhost kernel:  [filemap_nopage+0/828] 
filemap_nopage+0x0/0x33c
Nov 18 17:32:16 localhost kernel:  [do_no_page+105/796] do_no_page+0x69/0x31c
Nov 18 17:32:16 localhost kernel:  [handle_mm_fault+234/280] 
handle_mm_fault+0xea/0x118
Nov 18 17:32:16 localhost kernel:  [do_page_fault+328/1405] 
do_page_fault+0x148/0x57d
Nov 18 17:32:16 localhost kernel:  [scheduler_tick+26/904] 
scheduler_tick+0x1a/0x388
Nov 18 17:32:16 localhost kernel:  [recalc_task_prio+222/436] 
recalc_task_prio+0xde/0x1b4
Nov 18 17:32:16 localhost kernel:  [smp_local_timer_interrupt+11/84] 
smp_local_timer_interrupt+0xb/0x54
Nov 18 17:32:16 localhost kernel:  [timer_interrupt+138/144] 
timer_interrupt+0x8a/0x90
Nov 18 17:32:16 localhost kernel:  [handle_IRQ_event+47/96] 
handle_IRQ_event+0x2f/0x60
Nov 18 17:32:16 localhost kernel:  [do_page_fault+0/1405] 
do_page_fault+0x0/0x57d
Nov 18 17:32:16 localhost kernel:  [error_code+79/84] error_code+0x4f/0x54
Nov 18 17:32:16 localhost kernel: Code: 5d c3 9c 5b fa 55 56 e8 d2 fa ff ff 89 
44 24 08 53 9d 5b 5f 85 c0 0f 85 e8 fe ff ff e9 44 ff ff ff b8 28 00 00 00 e9 
15 ff ff ff <0f> 0b ab 02 22 15 29 c0 e9 df fe ff ff 0f 0b 82 02 22 15 29 c0 
Nov 18 17:32:35 localhost kernel:  <1>Unable to handle kernel paging request at 
virtual address 00100104
Nov 18 17:35:24 localhost kernel: klogd 1.4.1#17, log source = /proc/kmsg 
started.
Nov 18 17:35:24 localhost kernel: Inspecting /boot/System.map-2.6.12-1-386

-- System Information:
Debian Release: testing/unstable
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/dash
Kernel: Linux 2.6.12-1-386
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)

---------------------------------------
Received: (at 339757-done) by bugs.debian.org; 25 Nov 2005 16:38:08 +0000
>From [EMAIL PROTECTED] Fri Nov 25 08:38:08 2005
Return-path: <[EMAIL PROTECTED]>
Received: from colo.lackof.org ([198.49.126.79])
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1EfgaN-0005v5-UW; Fri, 25 Nov 2005 08:38:08 -0800
Received: from localhost (localhost [127.0.0.1])
        by colo.lackof.org (Postfix) with ESMTP id 2577D298034;
        Fri, 25 Nov 2005 09:45:38 -0700 (MST)
Received: from colo.lackof.org ([127.0.0.1])
        by localhost (colo.lackof.org [127.0.0.1]) (amavisd-new, port 10024)
        with ESMTP id 21085-01; Fri, 25 Nov 2005 09:45:36 -0700 (MST)
Received: from localhost (localhost [127.0.0.1])
        by colo.lackof.org (Postfix) with ESMTP id 70AF7298026;
        Fri, 25 Nov 2005 09:45:36 -0700 (MST)
Subject: Re: Bug#339757: kernel-image: kernel BUG at mm/page_alloc.c:683!
        invalid operand: 0000 [#4]
From: dann frazier <[EMAIL PROTECTED]>
To: Roumano <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED], [EMAIL PROTECTED]
In-Reply-To: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]>
         <[EMAIL PROTECTED]>  <[EMAIL PROTECTED]>
Content-Type: text/plain
Date: Fri, 25 Nov 2005 09:37:11 -0700
Message-Id: <[EMAIL PROTECTED]>
Mime-Version: 1.0
X-Mailer: Evolution 2.2.3 
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: by amavisd-new-20030616-p10 (Debian) at lackof.org
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Version: 2.6.14-3

On Fri, 2005-11-25 at 17:30 +0100, Roumano wrote:
> Yes, problem is solve.

Thanks, marking accordingly.

In the future, please leave the bug number in the CC field when
replying.




-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to