Hi Donald and Alan!
I am not sure if this is a problem with the 3c59x.c 0.99H driver or with
the 2.0.36 kernel, so I send it to both of you.
What happened:
===========
When I ifup:ed eth0 and let kerneld load the newly compiled 3c59x.c 0.99H I
got several
Oopses and a lot of processes (X, squid, samba etc) died on the spot.
Quite unexpected behaviour :)
There was other errors as well, on paging requests. And the Oopses looked
funny - look at the second Oops Code: segment.
FIRST OOPS
general protection: 0000
CPU: 0
EIP: 0010:[do_dev_queue_xmit+121/504]
EFLAGS: 00010202
eax: 0dc396e8 ebx: 00000001 ecx: 0dc396e8 edx: 66736864
esi: 0dc396e8 edi: 0dc39038 ebp: 1538f810 esp: 16cc5e2c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process X (pid: 471, process nr: 8, stackpage=16cc5000)
Stack: 0dc396e8 0c39c810 0dc39038 1538f810 00000000 7e0c010a 0013c846
0dc396e8
1538f810 00000001 00146671 0dc396e8 1538f810 00000001 0dc396e8
0c39c810
00007d78 0dc3904c 69d9a8c0 0014d430 0c39c810 1538f810 0dc396e8
00000000
Call Trace: [dev_queue_xmit+26/36] [ip_queue_xmit+485/568]
[tcp_write_xmit+432/504] [tcp_ack+1492/2284] [kfree_skb+235/244]
[alloc_skb+100/332] [tcp_rcv+2113/2468]
[ip_rcv+1083/1448] [net_bh+252/284] [do_bottom_half+59/96]
[handle_bottom_half+11/24]
Code: ff 82 10 01 00 00 8b 92 00 01 00 00 eb 03 90 89 ea 89 d5 89
(ksymoops refuses to decode this one)
SECOND OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 12eec668 ebx: 00000001 ecx: 12eec668 edx: 18817c0c
esi: 12eec668 edi: 179960b0 ebp: 17996018 esp: 16732e20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0013c7fb 12eec668 17996018 12eec668 08291018 12eec038 17996018
00000000
00000246 0013c846 12eec668 17996018 00000001 00146671 12eec668
17996018
00000001 12eec668 08291018 00007d78 12eec04c 7701010a 0014d430
08291018
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>]
[<0014bb38>] [<00152f73>] [<0014ccf1>]
[<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>
Using `/boot/System.map' to map addresses to symbols.
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
THIRD OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16733000 ebp: 16732de4 esp: 16732d88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0019002b 00000000 00017000 16732de4 16861018 18800000 19000000
18800000
16860018 00111b9e 0019df29 16732de4 00000000 001118d0 12eec668
179960b0
17996018 00000246 09b4e298 1300c144 0010aa24 16732de4 00000000
00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>]
[<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00130018>] [<18817c0c>] [<0013c7fb>] [<0013c846>]
[<00146671>] [<0014d430>] [<0014bb38>]
[<00152f73>] [<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>]
[<001185c3>] [<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Using `/boot/System.map' to map addresses to symbols.
>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 130018 <create_elf_tables+1c0/274>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb
%fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl
%edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000
FOURTH OOPS
Aiee, killing interrupt handler
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 162d7888 ebx: 00000001 ecx: 162d7888 edx: 18817c0c
esi: 162d7888 edi: 179960b0 ebp: 17996018 esp: 16e3ae20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0013c7fb 162d7888 17996018 162d7888 0dbaa414 162d7828 17996018
00000000
00000246 0013c846 162d7888 17996018 00000001 00146671 162d7888
17996018
00000001 162d7888 0dbaa414 00007d78 162d783c 54d5a8c0 0014d430
0dbaa414
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>]
[<0014bb38>] [<0014ccf1>] [<1881f801>]
[<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>
Using `/boot/System.map' to map addresses to symbols.
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
FIFTH OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16e3b000 ebp: 16e3ade4 esp: 16e3ad88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0019002b 00000000 00017000 16e3ade4 17b33018 18800000 19000000
18800000
17b30018 00111b9e 0019df29 16e3ade4 00000000 001118d0 162d7888
179960b0
17996018 1300c164 16ee6e98 1300fc0e 0010aa24 16e3ade4 00000000
00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>]
[<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00140018>] [<18817c0c>] [<0013c7fb>] [<0013c846>]
[<00146671>] [<0014d430>] [<0014bb38>]
[<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>]
[<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Aiee, killing interrupt handler
Using `/boot/System.map' to map addresses to symbols.
>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 140018 <unix_sendmsg+ac/3dc>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb
%fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl
%edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000
-- Daniel.Deimert@intermec.com Intermec Printer AB, Göteborg, Sweden http://www.intermec.com/ Intermec Identification Systems Division
--------------2FA115E1FEF07DD4F3AD4DDC Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit
<!doctype html public "-//w3c//dtd html 4.0 transitional//en"> Hi Donald and Alan!
I am not sure if this is a problem with the 3c59x.c 0.99H driver or with the 2.0.36 kernel, so I send it to both of you.
What happened:
===========When I ifup:ed eth0 and let kerneld load the newly compiled 3c59x.c 0.99H I got several
Oopses and a lot of processes (X, squid, samba etc) died on the spot. Quite unexpected behaviour :)There was other errors as well, on paging requests. And the Oopses looked funny - look at the second Oops Code: segment.
FIRST OOPS
general protection: 0000
CPU: 0
EIP: 0010:[do_dev_queue_xmit+121/504]
EFLAGS: 00010202
eax: 0dc396e8 ebx: 00000001 ecx: 0dc396e8 edx: 66736864
esi: 0dc396e8 edi: 0dc39038 ebp: 1538f810 esp: 16cc5e2c
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process X (pid: 471, process nr: 8, stackpage=16cc5000)
Stack: 0dc396e8 0c39c810 0dc39038 1538f810 00000000 7e0c010a 0013c846 0dc396e8
1538f810 00000001 00146671 0dc396e8 1538f810 00000001 0dc396e8 0c39c810
00007d78 0dc3904c 69d9a8c0 0014d430 0c39c810 1538f810 0dc396e8 00000000
Call Trace: [dev_queue_xmit+26/36] [ip_queue_xmit+485/568] [tcp_write_xmit+432/504] [tcp_ack+1492/2284] [kfree_skb+235/244] [alloc_skb+100/332] [tcp_rcv+2113/2468]
[ip_rcv+1083/1448] [net_bh+252/284] [do_bottom_half+59/96] [handle_bottom_half+11/24]
Code: ff 82 10 01 00 00 8b 92 00 01 00 00 eb 03 90 89 ea 89 d5 89(ksymoops refuses to decode this one)
SECOND OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 12eec668 ebx: 00000001 ecx: 12eec668 edx: 18817c0c
esi: 12eec668 edi: 179960b0 ebp: 17996018 esp: 16732e20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0013c7fb 12eec668 17996018 12eec668 08291018 12eec038 17996018 00000000
00000246 0013c846 12eec668 17996018 00000001 00146671 12eec668 17996018
00000001 12eec668 08291018 00007d78 12eec04c 7701010a 0014d430 08291018
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>] [<00152f73>] [<0014ccf1>]
[<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>Using `/boot/System.map' to map addresses to symbols.
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
THIRD OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 166f7000, %cr3 = 166f7000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16733000 ebp: 16732de4 esp: 16732d88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process linpopup (pid: 3156, process nr: 61, stackpage=16732000)
Stack: 0019002b 00000000 00017000 16732de4 16861018 18800000 19000000 18800000
16860018 00111b9e 0019df29 16732de4 00000000 001118d0 12eec668 179960b0
17996018 00000246 09b4e298 1300c144 0010aa24 16732de4 00000000 00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>] [<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00130018>] [<18817c0c>] [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>]
[<00152f73>] [<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Using `/boot/System.map' to map addresses to symbols.
>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 130018 <create_elf_tables+1c0/274>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 152f73 <icmp_unreach+1eb/1f8>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb %fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl %edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000
FOURTH OOPS
Aiee, killing interrupt handler
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<18817c0c>]
EFLAGS: 00010246
eax: 162d7888 ebx: 00000001 ecx: 162d7888 edx: 18817c0c
esi: 162d7888 edi: 179960b0 ebp: 17996018 esp: 16e3ae20
ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0013c7fb 162d7888 17996018 162d7888 0dbaa414 162d7828 17996018 00000000
00000246 0013c846 162d7888 17996018 00000001 00146671 162d7888 17996018
00000001 162d7888 0dbaa414 00007d78 162d783c 54d5a8c0 0014d430 0dbaa414
Call Trace: [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>] [<0014ccf1>] [<1881f801>]
[<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: <1>
Using `/boot/System.map' to map addresses to symbols.
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
FIFTH OOPS
Unable to handle kernel paging request at virtual address d8817c0c
current->tss.cr3 = 16ff1000, %cr3 = 16ff1000
*pde = 00001067
*pte = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<0010adbc>]
EFLAGS: 00010202
eax: 00000010 ebx: 0000002b ecx: 18817c0c edx: 17ac1c0c
esi: 00000000 edi: 16e3b000 ebp: 16e3ade4 esp: 16e3ad88
ds: 0018 es: 0018 fs: 0010 gs: 002b ss: 0018
Process squid (pid: 442, process nr: 44, stackpage=16e3a000)
Stack: 0019002b 00000000 00017000 16e3ade4 17b33018 18800000 19000000 18800000
17b30018 00111b9e 0019df29 16e3ade4 00000000 001118d0 162d7888 179960b0
17996018 1300c164 16ee6e98 1300fc0e 0010aa24 16e3ade4 00000000 00000001
Call Trace: [<0019002b>] [<18800000>] [<19000000>] [<18800000>] [<00111b9e>] [<001118d0>] [<0010aa24>]
[<18817c0c>] [<00140018>] [<18817c0c>] [<0013c7fb>] [<0013c846>] [<00146671>] [<0014d430>] [<0014bb38>]
[<0014ccf1>] [<1881f801>] [<00143d97>] [<0013ca1c>] [<001185c3>] [<0010a853>]
Code: 64 8a 04 0e 0f a1 88 c2 81 e2 ff 00 00 00 89 54 24 10 52 68
Aiee, killing interrupt handler
Using `/boot/System.map' to map addresses to symbols.
>>EIP: 10adbc <die_if_kernel+280/2c0>
Trace: 19002b <random_write+5b/d4>
Trace: 18800000
Trace: 19000000
Trace: 18800000
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 111b9e <do_page_fault+2ce/2e0>
Trace: 10aa24 <error_code+40/48>
Trace: 18817c0c
Trace: 140018 <unix_sendmsg+ac/3dc>
Trace: 18817c0c
Trace: 13c7fb <do_dev_queue_xmit+1c7/1f8>
Trace: 13c846 <dev_queue_xmit+1a/24>
Trace: 146671 <ip_queue_xmit+1e5/238>
Trace: 14d430 <tcp_write_xmit+1b0/1f8>
Trace: 14bb38 <tcp_ack+5d4/8ec>
Trace: 14ccf1 <tcp_rcv+841/9a4>
Trace: 1881f801
Trace: 143d97 <ip_rcv+43b/5a8>
Trace: 13ca1c <net_bh+fc/11c>
Trace: 1185c3 <do_bottom_half+3b/60>
Trace: 10a853 <handle_bottom_half+b/18>
Code: 10adbc <die_if_kernel+280/2c0>
Code: 10adbc <die_if_kernel+280/2c0> 64 8a 04 0e movb %fs:(%esi,%ecx,1),%al
Code: 10adc0 <die_if_kernel+284/2c0> 0f a1 popl %fs
Code: 10adc2 <die_if_kernel+286/2c0> 88 c2 movb %al,%dl
Code: 10adc4 <die_if_kernel+288/2c0> 81 e2 ff 00 00 andl $0xff,%edx
Code: 10adcf <die_if_kernel+293/2c0> 00
Code: 10add0 <die_if_kernel+294/2c0> 89 54 24 10 movl %edx,0x10(%esp,1)
Code: 10add4 <die_if_kernel+298/2c0> 52 pushl %edx
Code: 10add5 <die_if_kernel+299/2c0> 68 00 90 90 90 pushl $0x90909000
--
Daniel.Deimert@intermec.com Intermec Printer AB, Göteborg, Sweden
http://www.intermec.com/ Intermec Identification Systems Division
--------------2FA115E1FEF07DD4F3AD4DDC-- - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/