How come? Calling initcall 0xc0517656: flow_cache_init+0x0/0x11b() Calling initcall 0xc0517771: llc_init+0x0/0x60() Calling initcall 0xc05177d1: snap_init+0x0/0x37() Calling initcall 0xc05186e7: inet_init+0x0/0x1ae() NET: Registered protocol family 2 input: AT Translated Set 2 keyboard as /class/input/input0 IP route cache hash table entries: 4096 (order: 2, 16384 bytes) TCP established hash table entries: 16384 (order: 6, 393216 bytes) TCP bind hash table entries: 16384 (order: 6, 393216 bytes) TCP: Hash tables configured (established 16384 bind 16384) TCP reno registered Calling initcall 0xc03723ec: init+0x0/0x1e() Calling initcall 0xc0518bb4: init+0x0/0x16() ip_conntrack version 2.4 (2046 buckets, 16368 max) - 172 bytes per conntrack Calling initcall 0xc0518dd9: ip_vs_init+0x0/0x138() IPVS: Registered protocols (TCP) IPVS: Connection hash table configured (size=4096, memory=32Kbytes) IPVS: ipvs loaded. Calling initcall 0xc0518f11: inet_diag_init+0x0/0x8c() Calling initcall 0xc0518f9d: tcp_diag_init+0x0/0x16() Calling initcall 0xc0518fb3: bictcp_register+0x0/0x16() TCP bic registered Calling initcall 0xc051917a: af_unix_init+0x0/0x7b() NET: Registered protocol family 1 Calling initcall 0xc05191f5: packet_init+0x0/0x6f() NET: Registered protocol family 17 Calling initcall 0xc0519264: ipsec_pfkey_init+0x0/0xb4() NET: Registered protocol family 15 Calling initcall 0xc0519318: br_init+0x0/0x87() Bridge firewalling registered Calling initcall 0xc05193e2: init+0x0/0xb6() Ebtables v2.0 registered Calling initcall 0xc0519498: init+0x0/0x24() Calling initcall 0xc05194bc: init+0x0/0x74() Calling initcall 0xc0519530: init+0x0/0x74() Calling initcall 0xc05195a4: init+0x0/0x16() Calling initcall 0xc05195ba: init+0x0/0x16() Calling initcall 0xc05195d0: init+0x0/0x16() Calling initcall 0xc05195e6: init+0x0/0x16() Calling initcall 0xc05195fc: init+0x0/0x16() Calling initcall 0xc0519612: init+0x0/0x16() Calling initcall 0xc0519628: init+0x0/0x16() Calling initcall 0xc051963e: init+0x0/0x16() Calling initcall 0xc0519654: init+0x0/0x4a() Calling initcall 0xc051969e: init+0x0/0x16() Calling initcall 0xc05196b4: init+0x0/0x16() Calling initcall 0xc05196ca: init+0x0/0x16() Calling initcall 0xc05196e0: init+0x0/0x16() Calling initcall 0xc05196f6: init+0x0/0x16() Calling initcall 0xc051970c: init+0x0/0x42() Calling initcall 0xc051974e: init+0x0/0x132() ebt_ulog: not logging via ulog since somebody else already registered for PF_BRIDGE Calling initcall 0xc0519880: init_sunrpc+0x0/0x51() Calling initcall 0xc05198d1: init_rpcsec_gss+0x0/0x3f() Calling initcall 0xc0519910: init_kerberos_module+0x0/0x32() Calling initcall 0xc04fde5e: amd_exit_cpu+0x0/0x11() Calling initcall 0xc04fe43e: cyrix_exit_cpu+0x0/0x11() Calling initcall 0xc04fe460: nsc_exit_cpu+0x0/0x11() Calling initcall 0xc04fe6eb: centaur_exit_cpu+0x0/0x11()
I'd also be interested in knowing how we managed to defeat print_fn_descriptor_symbol().. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html
