general protection with 2.0.36

Henrik Seidel (seidel@mpimg-berlin-dahlem.mpg.de)
Thu, 17 Dec 1998 17:35:33 +0100


Hi,

I recently upgraded 2.0.35 -> 2.0.36. Since then, I've had lots of
kernel lockups (on two identical machines, so I don't assume it's a
hardware problem), some of them even w/out anything in messages:

Dec 16 01:34:33 osiris kernel: general protection: 0000
Dec 16 01:34:33 osiris kernel: CPU: 0
Dec 16 01:34:33 osiris kernel: EIP: 0010:[get_empty_inode+68/348]
Dec 16 01:34:33 osiris kernel: EFLAGS: 00010206
Dec 16 01:34:33 osiris kernel: eax: 00000355 ebx: 06777200 ecx: f000e6f2 edx: 00000005
Dec 16 01:34:33 osiris kernel: esi: 00000002 edi: 00000000 ebp: 001c2660 esp: 04180ee4
Dec 16 01:34:33 osiris kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 16 01:34:33 osiris kernel: Process glimpseindex (pid: 22849, process nr: 83, stackpage=04180000)
Dec 16 01:34:33 osiris kernel: Stack: 00000000 001b5e08 00124ae1 075ae300 04180f74 00000001 0397301e 0015795d
Dec 16 01:34:33 osiris kernel: 00157990 001c2660 00062856 00000001 075ae300 04180f74 04180f74 00000001
Dec 16 01:34:33 osiris kernel: 075ae300 00062856 0012be4e 075ae300 0397301e 00000001 04180f74 00000000
Dec 16 01:34:33 osiris kernel: Call Trace: [__iget+97/544] [ext2_lookup+129/368] [ext2_lookup+180/368] [lookup+222/248] [_namei+90/228] [namei+48/72] [sys_newstat+41/88]
Dec 16 01:34:33 osiris kernel: [system_call+85/124]
Dec 16 01:34:33 osiris kernel: Code: 83 b9 80 00 00 00 00 75 22 ba e7 03 00 00 66 83 b9 88 00 00
Dec 16 01:34:33 osiris kernel: general protection: 0000
Dec 16 01:34:33 osiris kernel: CPU: 0
Dec 16 01:34:33 osiris kernel: EIP: 0010:[get_empty_inode+68/348]
Dec 16 01:34:33 osiris kernel: EFLAGS: 00010206
Dec 16 01:34:33 osiris kernel: eax: 00000356 ebx: 06777200 ecx: f000e6f2 edx: 00000005
Dec 16 01:34:33 osiris kernel: esi: 00000002 edi: 05d85908 ebp: ffffffe9 esp: 07ea6f7c
Dec 16 01:34:33 osiris kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 16 01:34:33 osiris kernel: Process mailindex (pid: 20566, process nr: 82, stackpage=07ea6000)
Dec 16 01:34:33 osiris kernel: Stack: 05d8583c 00000060 001249a6 05d8583c 0012b9f3 bffff574 00000060 080a5f58
Dec 16 01:34:33 osiris kernel: bffff584 00000001 001113af 07ea6fb0 07ea7018 bffff33c 052d7300 0010ab1d
Dec 16 01:34:33 osiris kernel: bffff574 400a0031 080a5960 00000060 080a5f58 bffff584 ffffffda 0000002b
Dec 16 01:34:33 osiris kernel: Call Trace: [get_pipe_inode+6/224] [do_pipe+47/268] [sys_pipe+35/72] [system_call+85/124]
Dec 16 01:34:33 osiris kernel: Code: 83 b9 80 00 00 00 00 75 22 ba e7 03 00 00 66 83 b9 88 00 00
Dec 16 01:35:32 osiris kernel: general protection: 0000
Dec 16 01:35:32 osiris kernel: CPU: 0
Dec 16 01:35:32 osiris kernel: EIP: 0010:[get_empty_inode+68/348]
Dec 16 01:35:32 osiris kernel: EFLAGS: 00010202
Dec 16 01:35:32 osiris kernel: eax: 00000358 ebx: 04718b00 ecx: f000e6f2 edx: 00000005
Dec 16 01:35:32 osiris kernel: esi: 00000001 edi: 0805e290 ebp: 00000002 esp: 075daf40
Dec 16 01:35:32 osiris kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 16 01:35:32 osiris kernel: Process rpc.mountd (pid: 292, process nr: 20, stackpage=075da000)
Dec 16 01:35:32 osiris kernel: Stack: bffff0e4 001a9194 00137e11 00138362 bffff0e4 00000000 0805e290 bffff140
Dec 16 01:35:32 osiris kernel: 00000008 001233a1 00000202 00000000 00000000 bffff0e4 00000000 0805e290
Dec 16 01:35:32 osiris kernel: bffff140 00000000 075dafb0 00139fe6 00000002 00000002 00000011 07606810
Dec 16 01:35:32 osiris kernel: Call Trace: [sock_alloc+5/192] [sys_socket+154/324] [do_open+89/292] [sys_socketcall+250/732] [system_call+85/124]
Dec 16 01:35:32 osiris mountd[292]: NFS mount of /amd/osiris/0/home/abt_lh attempted from 141.14.130.240
Dec 16 01:35:32 osiris kernel: Code: 83 b9 80 00 00 00 00 75 22 ba e7 03 00 00 66 83 b9 88 00 00

......... etc...............

Dec 17 16:33:33 osiris kernel: general protection: 0000
Dec 17 16:33:33 osiris kernel: CPU: 0
Dec 17 16:33:33 osiris kernel: EIP: 0010:[get_phys_addr+42/132]
Dec 17 16:33:33 osiris kernel: EFLAGS: 00010256
Dec 17 16:33:33 osiris kernel: eax: 5f1329fb ebx: 5f1329fb ecx: 00000000 edx: 00000000
Dec 17 16:33:33 osiris kernel: esi: 00000000 edi: 00000000 ebp: 01b16c18 esp: 0103cf10
Dec 17 16:33:33 osiris kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 17 16:33:33 osiris kernel: Process top (pid: 13392, process nr: 78, stackpage=0103c000)
Dec 17 16:33:33 osiris kernel: Stack: 00000000 0015c724 05e7a810 00000000 0000343f 0112da5c 001aa144 00b9f000
Dec 17 16:33:33 osiris kernel: 0015c7d4 001bd518 00000000 01b16c18 00b9f000 0015d583 0000343f 00b9f000
Dec 17 16:33:33 osiris kernel: 0015d69c 00b9f000 0000343f 0000000a 00000000 0112da5c 000007ff 025b3b00
Dec 17 16:33:33 osiris kernel: Call Trace: [get_array+40/108] [get_arg+52/56] [get_process_array+99/136] [array_read+244/632] [sys_read+190/228] [system_call+85/124]
Dec 17 16:33:33 osiris kernel: Code: 8b 13 85 d2 74 20 89 d0 25 ff 0f 00 00 83 f8 67 74 18 52 68
Dec 17 16:33:38 osiris kernel: general protection: 0000
Dec 17 16:33:38 osiris kernel: CPU: 0
Dec 17 16:33:38 osiris kernel: EIP: 0010:[get_phys_addr+42/132]
Dec 17 16:33:38 osiris kernel: EFLAGS: 00010256
Dec 17 16:33:38 osiris kernel: eax: 5f1329fb ebx: 5f1329fb ecx: 00000000 edx: 00000000
Dec 17 16:33:38 osiris kernel: esi: 00000000 edi: 00000000 ebp: 01b16c18 esp: 010bdf10
Dec 17 16:33:38 osiris kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 17 16:33:38 osiris kernel: Process top (pid: 13393, process nr: 78, stackpage=010bd000)
Dec 17 16:33:38 osiris kernel: Stack: 00000000 0015c724 05e7a810 00000000 0000343f 033b5fac 001aa144 00b8a000
Dec 17 16:33:38 osiris kernel: 0015c7d4 001bd518 00000000 01b16c18 00b8a000 0015d583 0000343f 00b8a000
Dec 17 16:33:38 osiris kernel: 0015d69c 00b8a000 0000343f 0000000a 00000000 033b5fac 000007ff 025b3b00
Dec 17 16:33:38 osiris kernel: Call Trace: [get_array+40/108] [get_arg+52/56] [get_process_array+99/136] [array_read+244/632] [sys_read+190/228] [system_call+85/124]
Dec 17 16:33:38 osiris kernel: Code: 8b 13 85 d2 74 20 89 d0 25 ff 0f 00 00 83 f8 67 74 18 52 68

.......................................................................

Dec 15 13:25:10 nilpferd kernel: Unable to handle kernel paging request at virtual address d8063057
Dec 15 13:25:10 nilpferd kernel: current->tss.cr3 = 06982000, pr3 = 06982000
Dec 15 13:25:10 nilpferd kernel: *pde = 00000000
Dec 15 13:25:10 nilpferd kernel: Oops: 0000
Dec 15 13:25:10 nilpferd kernel: CPU: 0
Dec 15 13:25:10 nilpferd kernel: EIP: 0010:[verify_area+61/440]
Dec 15 13:25:10 nilpferd kernel: EFLAGS: 00010202
Dec 15 13:25:10 nilpferd kernel: eax: 1806304f ebx: 00000000 ecx: 0808dcd0 edx: 06304add
Dec 15 13:25:10 nilpferd kernel: esi: 0808dcd0 edi: 00000020 ebp: 05f1c200 esp: 066ccf64
Dec 15 13:25:10 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:10 nilpferd kernel: Process sshd (pid: 926, process nr: 49, stackpage=066cc000)
Dec 15 13:25:10 nilpferd kernel: Stack: 00000000 0808732c 062ab990 05f1c200 00003fcc 000002e0 00123cf5 00000000
Dec 15 13:25:10 nilpferd kernel: 0808dcd0 00000020 067c7810 0808732c ffffffff bffff424 06f884c8 bfffb420
Dec 15 13:25:10 nilpferd kernel: 00004000 067c7810 00000000 067c7810 bffff4e8 0010abdd 00000007 0808dcd0
Dec 15 13:25:10 nilpferd kernel: Call Trace: [sys_write+205/396] [system_call+85/124]
Dec 15 13:25:10 nilpferd kernel: Code: 39 70 08 76 0e 89 c2 39 72 04 76 0f 8b 42 14 eb eb 89 f6 8b
Dec 15 13:25:10 nilpferd kernel: general protection: 0000
Dec 15 13:25:10 nilpferd kernel: CPU: 0
Dec 15 13:25:10 nilpferd kernel: EIP: 0010:[exit_mmap+80/164]
Dec 15 13:25:10 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:25:10 nilpferd kernel: eax: 055e05e7 ebx: 06304790 ecx: 4001c000 edx: 00000031
Dec 15 13:25:10 nilpferd kernel: esi: 055e0618 edi: 06304c98 ebp: 066ccf28 esp: 066cce94
Dec 15 13:25:10 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:10 nilpferd kernel: Process sshd (pid: 926, process nr: 49, stackpage=066cc000)
Dec 15 13:25:10 nilpferd kernel: Stack: 06304790 00000031 055e05e7 055e0618 00000014 066cd000 00117602 055e0618
Dec 15 13:25:10 nilpferd kernel: 0000002b 00000014 066cd000 066ccf28 0010b0f8 0000000b 001b8fca 00000000
Dec 15 13:25:10 nilpferd kernel: d8063057 00000000 067c7810 0000008b 09000000 08800000 001b0018 00111fa2
Dec 15 13:25:10 nilpferd kernel: Call Trace: [do_exit+170/504] [die_if_kernel+672/680] [<09000000>] [tulip:tulip_probe+-233476/22328] [f_cos+160/460] [do_page_fault+714/732] [d
o_page_fault+0/732]
Dec 15 13:25:10 nilpferd kernel: [error_code+64/72] [verify_area+61/440] [sys_write+205/396] [system_call+85/124]
Dec 15 13:25:10 nilpferd kernel: Code: ff d1 83 c4 0c 8b 43 28 8b 40 04 85 c0 74 06 53 ff d0 83 c4
Dec 15 13:25:10 nilpferd kernel: Unable to handle kernel paging request at virtual address 08091000
Dec 15 13:25:10 nilpferd kernel: current->tss.cr3 = 0654c000, pr3 = 0654c000
Dec 15 13:25:10 nilpferd kernel: *pde = 068cb067
Dec 15 13:25:10 nilpferd kernel: *pte = 00000000
Dec 15 13:25:10 nilpferd kernel: Oops: 0000
Dec 15 13:25:10 nilpferd kernel: CPU: 0
Dec 15 13:25:10 nilpferd kernel: EIP: 0010:[<08840bf1>]
Dec 15 13:25:10 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:25:10 nilpferd kernel: eax: 00000800 ebx: 00002000 ecx: 00000400 edx: 056580b4
Dec 15 13:25:10 nilpferd kernel: esi: 08091000 edi: 056590c4 ebp: 05658018 esp: 06c6cc18
Dec 15 13:25:10 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:10 nilpferd kernel: Process tcsh (pid: 929, process nr: 53, stackpage=06c6c000)
Dec 15 13:25:10 nilpferd kernel: Stack: 00002000 00008000 0000d000 00002000 00000000 056580c0 056580c4 0620a2b4
Dec 15 13:25:10 nilpferd kernel: 001f7698 00000000 08843890 0620a200 0000d000 00002000 08090000 06c6cc78
Dec 15 13:25:10 nilpferd kernel: 00051000 07bee618 07bee618 00058000 00005000 00000000 00000010 ae35c116
Dec 15 13:25:10 nilpferd kernel: Call Trace: [<08843890>] [dump_write+26/44] [elf_core_dump+2470/2616] [<08842103>] [tulip:tulip_probe+-157305/22328] [scsi_do_cmd+897/940] [cop
y_page_range+371/916]
Dec 15 13:25:10 nilpferd kernel: [setup_frame+266/380] [handle_signal+90/144] [do_wp_page+0/600] [<08845e5c>] [do_signal+495/632] [signal_return+18/56]
Dec 15 13:25:10 nilpferd kernel: Code: 64 f3 a5 83 e3 03 89 d9 64 f3 a4 8b 5c 24 18 8d 04 83 89 44
Dec 15 13:25:10 nilpferd kernel: general protection: 0000
Dec 15 13:25:10 nilpferd kernel: CPU: 0
Dec 15 13:25:10 nilpferd kernel: EIP: 0010:[exit_mmap+62/164]
Dec 15 13:25:10 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:25:10 nilpferd kernel: eax: 4458067d ebx: 06304e52 ecx: 06304610 edx: 06304000
Dec 15 13:25:10 nilpferd kernel: esi: 055e0818 edi: 00000000 ebp: 06c6cbdc esp: 06c6cb54
Dec 15 13:25:10 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:10 nilpferd kernel: Process tcsh (pid: 929, process nr: 53, stackpage=06c6c000)
Dec 15 13:25:10 nilpferd kernel: Stack: 055e0818 00000014 06c6d000 00117602 055e0818 0000002b 00000014 06c6d000
Dec 15 13:25:10 nilpferd kernel: 06c6cbdc 0010b0f8 0000000b 001b8fca 068cb000 00091000 00000000 05faf018
Dec 15 13:25:10 nilpferd kernel: 00000044 09000000 08800000 05fa0018 00111fa2 001b9d64 06c6cbdc 00000000
Dec 15 13:25:10 nilpferd kernel: Call Trace: [do_exit+170/504] [die_if_kernel+672/680] [<09000000>] [tulip:tulip_probe+-233476/22328] [do_page_fault+714/732] [do_page_fault+0/7
32] [error_code+64/72]
Dec 15 13:25:10 nilpferd kernel: [<08840bf1>] [<08843890>] [dump_write+26/44] [elf_core_dump+2470/2616] [<08842103>] [tulip:tulip_probe+-157305/22328] [scsi_do_cmd+897/9
40] [copy_page_range+371/916]
Dec 15 13:25:10 nilpferd kernel: [setup_frame+266/380] [handle_signal+90/144] [do_wp_page+0/600] [<08845e5c>] [do_signal+495/632] [signal_return+18/56]
Dec 15 13:25:10 nilpferd kernel: Code: 8b 48 08 85 c9 74 10 8b 53 04 8b 43 08 29 d0 50 52 53 ff d1
Dec 15 13:25:10 nilpferd kernel: general protection: 0000
Dec 15 13:25:10 nilpferd kernel: CPU: 0
Dec 15 13:25:10 nilpferd kernel: EIP: 0010:[remove_shared_vm_struct+71/76]
Dec 15 13:25:10 nilpferd kernel: EFLAGS: 00010287
Dec 15 13:25:10 nilpferd kernel: eax: 05dd065a ebx: 07e72b00 ecx: 05dd06d8 edx: de984618
Dec 15 13:25:10 nilpferd kernel: esi: 055e0798 edi: 05dd0858 ebp: 00000000 esp: 05c5ff68
Dec 15 13:25:10 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:10 nilpferd kernel: Process xboard (pid: 954, process nr: 54, stackpage=05c5f000)
Dec 15 13:25:10 nilpferd kernel: Stack: 05dd06d8 0011c4ff 05dd06d8 055e0798 05c5ffbc ffffffff 00117602 055e0798
Dec 15 13:25:10 nilpferd kernel: 00000001 05c5ffbc ffffffff 00000000 0010aabb 00000001 00000000 bffffa0c
Dec 15 13:25:10 nilpferd kernel: bffffaa0 bffff8b0 0010ac9e 00000000 05c5ffbc 00000007 bffff90c bffff98c
Dec 15 13:25:10 nilpferd kernel: Call Trace: [exit_mmap+107/164] [do_exit+170/504] [do_signal+547/632] [signal_return+18/56]
Dec 15 13:25:10 nilpferd kernel: Code: 89 42 24 5b c3 81 ec c0 00 00 00 55 57 56 53 8b 9c 24 d8 00
Dec 15 13:25:28 nilpferd kernel: general protection: 0000
Dec 15 13:25:28 nilpferd kernel: CPU: 0
Dec 15 13:25:28 nilpferd kernel: EIP: 0010:[do_fork+1401/1988]
Dec 15 13:25:28 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:25:28 nilpferd kernel: eax: 656e5f72 ebx: 067f2810 ecx: 05dd00d8 edx: 075a075a
Dec 15 13:25:28 nilpferd kernel: esi: 075a0792 edi: 05dd0110 ebp: 055e0918 esp: 076a2f74
Dec 15 13:25:28 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:28 nilpferd kernel: Process sshd (pid: 272, process nr: 17, stackpage=076a2000)
Dec 15 13:25:28 nilpferd kernel: Stack: 07580018 bffff990 bffffe30 076a2fb4 075a075a 05dd00d8 0013aa0e 075a075a
Dec 15 13:25:28 nilpferd kernel: 05dd0e74 066cc000 fffffff4 00000031 0010a311 00000011 bffff960 076a2fbc
Dec 15 13:25:28 nilpferd kernel: bffffe30 0010abdd 00000005 bffff958 00000003 bffff990 bffffe30 bffffe30
Dec 15 13:25:28 nilpferd kernel: Call Trace: [sys_socketcall+338/732] [sys_fork+17/24] [system_call+85/124]
Dec 15 13:25:28 nilpferd kernel: Code: ff 80 80 00 00 00 8b 41 20 89 48 24 89 4a 20 89 51 24 ff 74
Dec 15 13:25:28 nilpferd kernel: general protection: 0000
Dec 15 13:25:28 nilpferd kernel: CPU: 0
Dec 15 13:25:28 nilpferd kernel: EIP: 0010:[exit_mmap+62/164]
Dec 15 13:25:28 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:25:28 nilpferd kernel: eax: 67657200 ebx: 075a075a ecx: 075a9750 edx: 075a9000
Dec 15 13:25:28 nilpferd kernel: esi: 07538b18 edi: 525f6674 ebp: 076a2f38 esp: 076a2ec8
Dec 15 13:25:28 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:25:28 nilpferd kernel: Process sshd (pid: 272, process nr: 17, stackpage=076a2000)
Dec 15 13:25:28 nilpferd kernel: Stack: 07538b18 00000014 076a3000 00117602 07538b18 0000002b 00000014 076a3000
Dec 15 13:25:28 nilpferd kernel: 076a2f38 0010b0f8 0000000b 001b8fca 00000000 075a0792 05dd0110 055e0918
Dec 15 13:25:28 nilpferd kernel: 00000074 09000000 08800000 05dd0018 0010b55c 001b90b8 076a2f38 00000000
Dec 15 13:25:28 nilpferd kernel: Call Trace: [do_exit+170/504] [die_if_kernel+672/680] [<09000000>] [tulip:tulip_probe+-233476/22328] [do_general_protection+120/168] [do_genera
l_protection+0/168] [error_code+64/72]
Dec 15 13:25:28 nilpferd kernel: [do_fork+1401/1988] [sys_socketcall+338/732] [sys_fork+17/24] [system_call+85/124]
Dec 15 13:25:28 nilpferd kernel: Code: 8b 48 08 85 c9 74 10 8b 53 04 8b 43 08 29 d0 50 52 53 ff d1
Dec 15 13:25:44 nilpferd amd[376]: file server molgix type nfs is down
Dec 15 13:26:03 nilpferd amd[376]: No fs type specified (key = "/defaults", map = ""root"")
Dec 15 13:26:08 nilpferd last message repeated 18 times
Dec 15 13:26:14 nilpferd kernel: general protection: 0000
Dec 15 13:26:14 nilpferd kernel: CPU: 0
Dec 15 13:26:14 nilpferd kernel: EIP: 0010:[do_dev_queue_xmit+119/504]
Dec 15 13:26:14 nilpferd kernel: EFLAGS: 00010206
Dec 15 13:26:14 nilpferd kernel: eax: 06a675b8 ebx: 00000001 ecx: 05dd0e58 edx: 4000b000
Dec 15 13:26:14 nilpferd kernel: esi: 06a675b8 edi: 00000080 ebp: 05dd0e58 esp: 07a90d0c
Dec 15 13:26:14 nilpferd kernel: ds: 0018 es: 0018 fs: 002b gs: 002b ss: 0018
Dec 15 13:26:14 nilpferd kernel: Process amd (pid: 376, process nr: 24, stackpage=07a90000)
Dec 15 13:26:14 nilpferd kernel: Stack: 05dd0345 00000001 00000080 06a675b8 00000000 a8830e8d 0013c6fb 06a675b8
Dec 15 13:26:14 nilpferd kernel: 05dd0e58 00000001 00147fb8 06a675b8 05dd0e58 00000001 00000030 07a90f00
Dec 15 13:26:14 nilpferd kernel: 06bd4018 00000000 05fff890 00000040 05fff84c 05dc4400 00000000 05dc3810
Dec 15 13:26:14 nilpferd kernel: Call Trace: [dev_queue_xmit+23/36] [ip_build_xmit+3392/3536] [kfree_skb+175/236] [udp_send+301/336] [udp_getfrag+0/168] [udp_sendto+197/232] [u
dp_sendmsg+46/180]
Dec 15 13:26:14 nilpferd kernel: [inet_sendmsg+129/144] [sys_sendto+456/512] [sock_wfree+35/44] [kfree_skb+175/236] [dev_kfree_skb+60/72] [tulip:tulip_probe+13578/22328]
[sys_socketcall+495/732] [system_call+85/124]
Dec 15 13:26:14 nilpferd kernel: Code: ff 82 10 01 00 00 8b 92 00 01 00 00 eb 05 8d 76 00 89 ea 89
Dec 15 13:26:14 nilpferd kernel: Aiee, killing interrupt handler

===============================

Hardware:

Asus P2L97-S w/ 128 MB (append="MEM=126M")
Pentium II 233
IBM DCAS-34330W
DEC DC21140

Any suggestions?

Please CC: to my email address since I'm not subscribed.

Regards
--- Henrik

-- 
Dr. Henrik Seidel, http://www.mpimg-berlin-dahlem.mpg.de/~seidel/
Max Planck Institute for Molecular Genetics
14195 Berlin, GERMANY, Ihnestrasse 73
tel: ++49-30-8413-1613 fax: ++49-30-8413-1384
see my home page for my public PGP key

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/