* mapped page in prep_new_page().. @ 2004-02-27 6:46 Linus Torvalds 2004-02-27 6:58 ` Andrew Morton 0 siblings, 1 reply; 10+ messages in thread From: Linus Torvalds @ 2004-02-27 6:46 UTC (permalink / raw) To: Andrew Morton, Christoph Hellwig; +Cc: linux-mm Hmm.. I've never seen this before myself, but I know there have been similar reports. Earlier today I got Bad page state at prep_new_page flags:0x00000000 mapping:0000000000000000 mapped:1 count:0 Backtrace: Call Trace: [c000000000075fe4] .prep_new_page+0x5c/0x98 [c000000000076604] .buffered_rmqueue+0x130/0x1e8 [c0000000000767a4] .__alloc_pages+0xe8/0x420 [c000000000076b18] .__get_free_pages+0x3c/0xa0 [c00000000007b020] .cache_grow+0x128/0x644 [c00000000007b7c8] .cache_alloc_refill+0x28c/0x338 [c00000000007bc94] .kmem_cache_alloc+0x70/0x74 [c0000000000f377c] .ext3_alloc_inode+0x24/0x64 [c0000000000bbab4] .alloc_inode+0x48/0x138 [c0000000000bcc5c] .get_new_inode_fast+0x38/0x15c [c0000000000ef67c] .ext3_lookup+0xb0/0x14c [c0000000000ad050] .real_lookup+0x18c/0x1f4 [c0000000000ad4f4] .do_lookup+0xe8/0x108 [c0000000000adbfc] .link_path_walk+0x6e8/0xc88 [c0000000000ae928] .__user_walk+0x78/0x98 [c0000000000a7a74] .vfs_lstat+0x24/0x74 [c0000000000cf378] .compat_sys_newlstat+0x1c/0x5c [c000000000011964] .ret_from_syscall_1+0x0/0xa4 Trying to fix it up, but a reboot is needed which I didn't even notice initially (it happened at 4:04 AM, apparently during the nigthly cron run). Now, it claims to try to fix things up, but for "page_mapped(page)" that isn't true - it leaves the page pte pointers alone (it should probably clear the rmap list). So once the machine needed memory (12 hours later - the thing has 2GB of RAM in it, so it was in no hurry) I got another message at kmem_cache_free: Bad page state at free_hot_cold_page kernel: flags:0x00000000 mapping:0000000000000000 mapped:1 count:0 Backtrace: Call Trace: [c0000000000763f0] .free_hot_cold_page+0xcc/0x1a0 [c00000000007a130] .slab_destroy+0x1e0/0x2a4 .. and soon afterwards the same page got re-used for a page cache page, and that makes it really unhappy: Bad page state at prep_new_page flags:0x00000000 mapping:0000000000000000 mapped:1 count:0 Backtrace: Call Trace: [c000000000075fe4] .prep_new_page+0x5c/0x98 [c000000000076604] .buffered_rmqueue+0x130/0x1e8 [c0000000000767a4] .__alloc_pages+0xe8/0x420 [c000000000086e04] .do_anonymous_page+0x1a8/0x50c [c000000000087204] .do_no_page+0x9c/0x570 [c0000000000879b0] .handle_mm_fault+0x1b0/0x26c [c0000000000431c8] .do_page_fault+0x120/0x3f8 [c00000000000aa94] stab_bolted_user_return+0x118/0x11c Trying to fix it up, but a reboot is needed Oops: Kernel access of bad area, sig: 11 [#1] SMP NR_CPUS=2 NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70 REGS: c00000007a43b7f0 TRAP: 0300 Not tainted MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11 DAR: 0000005f00000008, DSISR: 0000000040000000 TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0 GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4 LR [c000000000086f70] .do_anonymous_page+0x314/0x50c Call Trace: [c000000000087204] .do_no_page+0x9c/0x570 [c0000000000879b0] .handle_mm_fault+0x1b0/0x26c [c0000000000431c8] .do_page_fault+0x120/0x3f8 [c00000000000aa94] stab_bolted_user_return+0x118/0x11c So I've obviously got two questions: - shouldn't we try to clear the rmap list in bad_page() too? - does anybody have any idea why the page had been left mapped when free'd, without the test triggering in free_pages_check()? Memory corruption? Has anybody ever seen any pattern to this? Ideas? Linus -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 6:46 mapped page in prep_new_page() Linus Torvalds @ 2004-02-27 6:58 ` Andrew Morton 2004-02-27 7:11 ` Anton Blanchard 2004-02-27 7:30 ` Linus Torvalds 0 siblings, 2 replies; 10+ messages in thread From: Andrew Morton @ 2004-02-27 6:58 UTC (permalink / raw) To: Linus Torvalds; +Cc: hch, linux-mm, Anton Blanchard Linus Torvalds <torvalds@osdl.org> wrote: > > Hmm.. I've never seen this before myself, but I know there have been > similar reports. There have been a few. I don't recall seeing any against x86. > Earlier today I got > > Bad page state at prep_new_page > flags:0x00000000 mapping:0000000000000000 mapped:1 count:0 But you did not get a trace for a mapped page being freed up prior to this? > which I didn't even notice initially (it happened at 4:04 AM, apparently > during the nigthly cron run). Now, it claims to try to fix things up, but > for "page_mapped(page)" that isn't true - it leaves the page pte pointers > alone (it should probably clear the rmap list). Yes, I don't think we can sanely fix all these conditions. If we really want to keep limping along we should just leak the page in __free_pages_ok(), and leak the page then pick a new one in __alloc_pages(). This shouldn't be worth the effort, of course. > Oops: Kernel access of bad area, sig: 11 [#1] > SMP NR_CPUS=2 > NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70 > REGS: c00000007a43b7f0 TRAP: 0300 Not tainted > MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11 > DAR: 0000005f00000008, DSISR: 0000000040000000 > TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0 > GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 > GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 > GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 > GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 > GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 > GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 > GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 > GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 > NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4 > LR [c000000000086f70] .do_anonymous_page+0x314/0x50c > Call Trace: > [c000000000087204] .do_no_page+0x9c/0x570 > [c0000000000879b0] .handle_mm_fault+0x1b0/0x26c > [c0000000000431c8] .do_page_fault+0x120/0x3f8 > [c00000000000aa94] stab_bolted_user_return+0x118/0x11c So what is the access address here? That will tell us what value was in page.pte.chain. > - does anybody have any idea why the page had been left mapped when > free'd, without the test triggering in free_pages_check()? Memory > corruption? Has anybody ever seen any pattern to this? I've seen no pattern to it - there have only been two or three reports I think. Probably we should print the entire pageframe, see if that pte pointer looks like a real address. It's interesting that the page->flags is zero all the time. Tends to indicate that nobody is using it for much. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 6:58 ` Andrew Morton @ 2004-02-27 7:11 ` Anton Blanchard 2004-02-27 7:21 ` Andrew Morton 2004-02-27 7:30 ` Linus Torvalds 1 sibling, 1 reply; 10+ messages in thread From: Anton Blanchard @ 2004-02-27 7:11 UTC (permalink / raw) To: Andrew Morton; +Cc: Linus Torvalds, hch, linux-mm > There have been a few. I don't recall seeing any against x86. There was a G5 user that was seeing oopses in buffered_rmqueue (I notice thats in the backtrace), it turned out to be bad RAM. > So what is the access address here? That will tell us what value was in > page.pte.chain. We tried to access 0x5f00000008. Doesnt look like much to me. Anton -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 7:11 ` Anton Blanchard @ 2004-02-27 7:21 ` Andrew Morton 0 siblings, 0 replies; 10+ messages in thread From: Andrew Morton @ 2004-02-27 7:21 UTC (permalink / raw) To: Anton Blanchard; +Cc: torvalds, hch, linux-mm Anton Blanchard <anton@samba.org> wrote: > > > So what is the access address here? That will tell us what value was in > > page.pte.chain. > > We tried to access 0x5f00000008. Doesnt look like much to me. > So on a G5 that is neither a valid kernel pointer nor a valid pte_addr_t? -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 6:58 ` Andrew Morton 2004-02-27 7:11 ` Anton Blanchard @ 2004-02-27 7:30 ` Linus Torvalds 2004-02-27 7:31 ` Anton Blanchard 2004-02-27 10:38 ` Benjamin Herrenschmidt 1 sibling, 2 replies; 10+ messages in thread From: Linus Torvalds @ 2004-02-27 7:30 UTC (permalink / raw) To: Andrew Morton; +Cc: hch, linux-mm, Anton Blanchard, Benjamin Herrenschmidt On Thu, 26 Feb 2004, Andrew Morton wrote: > Linus Torvalds <torvalds@osdl.org> wrote: > > > > Hmm.. I've never seen this before myself, but I know there have been > > similar reports. > > There have been a few. I don't recall seeing any against x86. Yeah, I wouldn't be surprised if it is an architecture bug (possibly one that has been common but has long been fixed on x86). > > Earlier today I got > > > > Bad page state at prep_new_page > > flags:0x00000000 mapping:0000000000000000 mapped:1 count:0 > > But you did not get a trace for a mapped page being freed up prior to this? That's correct. > Yes, I don't think we can sanely fix all these conditions. If we really > want to keep limping along we should just leak the page in > __free_pages_ok(), and leak the page then pick a new one in > __alloc_pages(). This shouldn't be worth the effort, of course. I agree - it's only worth doing if it is simple. In this case it would have been simple to just refuse to add the bad page back to the free list. > > Oops: Kernel access of bad area, sig: 11 [#1] > > SMP NR_CPUS=2 > > NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70 > > REGS: c00000007a43b7f0 TRAP: 0300 Not tainted > > MSR: 9000000000009032 EE: 1 PR: 0 FP: 0 ME: 1 IR/DR: 11 > > DAR: 0000005f00000008, DSISR: 0000000040000000 > > TASK: c000000059819b20[8510] 'bk' THREAD: c00000007a438000 CPU: 0 > > GPR00: 0000000000000000 C00000007A43BA70 C0000000006AD0D0 C000000000FFFFC0 > > GPR04: C00000002CBC30F0 C000000032F2F200 C000000002FD64D0 C0000000004D8050 > > GPR08: 0000000002AFE480 0000000000000000 0000005F00000000 0000000000000004 > > GPR12: 0000000042008488 C0000000004E0000 0000000002000000 0000000011A1E004 > > GPR16: C00000005EC23400 0000000000000050 C000000054447000 4000000000000000 > > GPR20: C0000000005714C8 C0000000006F6B80 0000000000001580 C000000032F2F200 > > GPR24: 0000000000532000 0000000000000532 C00000000072FFB8 C000000000FFFFC0 > > GPR28: CCCCCCCCCCCCCCCD 00000001A88C0397 C000000000586978 C00000002CBC30F0 > > NIP [c00000000008d7c4] .page_add_rmap+0xb4/0x1b4 > > LR [c000000000086f70] .do_anonymous_page+0x314/0x50c > > Call Trace: > > [c000000000087204] .do_no_page+0x9c/0x570 > > [c0000000000879b0] .handle_mm_fault+0x1b0/0x26c > > [c0000000000431c8] .do_page_fault+0x120/0x3f8 > > [c00000000000aa94] stab_bolted_user_return+0x118/0x11c > > So what is the access address here? That will tell us what value was in > page.pte.chain. Heh. I've had this G5 thing for a couple of weeks, I'm not very good at reading the oops dump either ;) The ppc64 page fault oops thing seems to be braindead, and not even print out the address. Stupid. Somebody is too used to debuggers, and as a result users aren't helped to make good reports, hint hint.. Anyway, a little digging shows that the thing seems to be the instruction .. r3 is "struct page *" .. ld r10,64(r3) /* r10 is "page->pte.direct" */ ... ld r0,0(r3) /* r0 is "page->flags */ rldicl r0,r0,48,63 cmpwi r0,0 /* PageDirect(page) ? */ ... nope, direct bit not set ... ld r0,8(r10) where r10 (as per above) is 0x0000005F00000000. So the fault address would have been 0x0000005F00000008. The value of r3 is interesting: C000000000FFFFC0. That's _just_ under the 16MB mark, and the offset of the "page->pte.direct" access is 64 bytes. Which means that the corrupted data was at _exactly_ the 16MB mark. Now, I have no idea why, but it's an interesting - if slightly odd - detail. Who would write the value quadword 0x0000005F00000000 to the physical address 1<<24? And is that a valid "struct page *" in the first place? Probably. Bad pointer crapola? Or some subtle CPU bug with address arithmetic that crosses the 16MB border? Anton, BenH, any ideas? Linus -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 7:30 ` Linus Torvalds @ 2004-02-27 7:31 ` Anton Blanchard 2004-02-27 10:38 ` Benjamin Herrenschmidt 1 sibling, 0 replies; 10+ messages in thread From: Anton Blanchard @ 2004-02-27 7:31 UTC (permalink / raw) To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Benjamin Herrenschmidt > Yeah, I wouldn't be surprised if it is an architecture bug (possibly > one that has been common but has long been fixed on x86). Its possible, I think Ive seen this before on a pseries box before. > The ppc64 page fault oops thing seems to be braindead, and not even print > out the address. Stupid. Somebody is too used to debuggers, and as a > result users aren't helped to make good reports, hint hint.. DAR is the address. I should probably make it more obvious, Ive been somewhat IBMized with my TLAs. > Who would write the value quadword 0x0000005F00000000 to the physical > address 1<<24? And is that a valid "struct page *" in the first place? > Probably. > > Bad pointer crapola? Or some subtle CPU bug with address arithmetic that > crosses the 16MB border? Anton, BenH, any ideas? Interesting, but nothing springs to mind yet. Anton -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 7:30 ` Linus Torvalds 2004-02-27 7:31 ` Anton Blanchard @ 2004-02-27 10:38 ` Benjamin Herrenschmidt 2004-02-27 15:32 ` Linus Torvalds 1 sibling, 1 reply; 10+ messages in thread From: Benjamin Herrenschmidt @ 2004-02-27 10:38 UTC (permalink / raw) To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard > > > DAR: 0000005f00000008, DSISR: 0000000040000000 > > Heh. I've had this G5 thing for a couple of weeks, I'm not very good at > reading the oops dump either ;) DAR is the access address for a 300 trap > The ppc64 page fault oops thing seems to be braindead, and not even print > out the address. Stupid. Somebody is too used to debuggers, and as a > result users aren't helped to make good reports, hint hint.. Hehe :) > Anyway, a little digging shows that the thing seems to be the instruction > > .. r3 is "struct page *" .. > ld r10,64(r3) /* r10 is "page->pte.direct" */ > > ... > > ld r0,0(r3) /* r0 is "page->flags */ > rldicl r0,r0,48,63 > cmpwi r0,0 /* PageDirect(page) ? */ > > ... nope, direct bit not set ... > > ld r0,8(r10) > > where r10 (as per above) is 0x0000005F00000000. So the fault address > would have been 0x0000005F00000008. > > The value of r3 is interesting: C000000000FFFFC0. That's _just_ under the > 16MB mark, and the offset of the "page->pte.direct" access is 64 bytes. > Which means that the corrupted data was at _exactly_ the 16MB mark. > > Now, I have no idea why, but it's an interesting - if slightly odd - > detail. > > Who would write the value quadword 0x0000005F00000000 to the physical > address 1<<24? And is that a valid "struct page *" in the first place? > Probably. > > Bad pointer crapola? Or some subtle CPU bug with address arithmetic that > crosses the 16MB border? Anton, BenH, any ideas? I don't beleive in a subtle CPU bug... we are chasing a +/- random corruption bug that happens not just on G5s and we think it may be related. Did you have slab poisoning ? I wonder if it could be a use after free ... That or a subtle ordering issue (missing barrier somewhere) leading to crap. The interesting bit is that 16Mb point... If that ever happen again let me know. Ben. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 10:38 ` Benjamin Herrenschmidt @ 2004-02-27 15:32 ` Linus Torvalds 2004-02-27 15:38 ` Anton Blanchard 2004-02-27 22:06 ` Benjamin Herrenschmidt 0 siblings, 2 replies; 10+ messages in thread From: Linus Torvalds @ 2004-02-27 15:32 UTC (permalink / raw) To: Benjamin Herrenschmidt; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard On Fri, 27 Feb 2004, Benjamin Herrenschmidt wrote: > > > Heh. I've had this G5 thing for a couple of weeks, I'm not very good at > > reading the oops dump either ;) > > DAR is the access address for a 300 trap Yeah, that makes complete sense now. "DAR" and "300 trap". I should have seen it immediately. I'm not entirely sure if it's just me being very very used to x86, but let's see what Linux historically (ie on an x86) prints out on a kernel page fault: Unable to handle kernel paging request at virtual address 41648370 printing eip: c013f6bc ... and here's what ppc64 prints out: Oops: Kernel access of bad area, sig: 11 [#1] NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70 REGS: c00000007a43b7f0 TRAP: 0300 Not tainted ... And I'm sure it's clear as glass what that's all about. Can you read your assembly language too? IBM people must just be smarter than the rest of us. Linus -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 15:32 ` Linus Torvalds @ 2004-02-27 15:38 ` Anton Blanchard 2004-02-27 22:06 ` Benjamin Herrenschmidt 1 sibling, 0 replies; 10+ messages in thread From: Anton Blanchard @ 2004-02-27 15:38 UTC (permalink / raw) To: Linus Torvalds; +Cc: Benjamin Herrenschmidt, Andrew Morton, hch, linux-mm > Yeah, that makes complete sense now. "DAR" and "300 trap". I should have > seen it immediately. Glad you see it our way. Want a job at IBM? ... > and here's what ppc64 prints out: > > Oops: Kernel access of bad area, sig: 11 [#1] > NIP: C00000000008D7C4 XER: 0000000020000000 LR: C000000000086F70 > REGS: c00000007a43b7f0 TRAP: 0300 Not tainted > ... > > And I'm sure it's clear as glass what that's all about. Yeah it needs to be made clearer. We are also missing a dump of a few instructions around the fail, especially useful when you dont have the vmlinux or the fail is in modules somewhere. Anton -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: mapped page in prep_new_page().. 2004-02-27 15:32 ` Linus Torvalds 2004-02-27 15:38 ` Anton Blanchard @ 2004-02-27 22:06 ` Benjamin Herrenschmidt 1 sibling, 0 replies; 10+ messages in thread From: Benjamin Herrenschmidt @ 2004-02-27 22:06 UTC (permalink / raw) To: Linus Torvalds; +Cc: Andrew Morton, hch, linux-mm, Anton Blanchard On Sat, 2004-02-28 at 02:32, Linus Torvalds wrote: > On Fri, 27 Feb 2004, Benjamin Herrenschmidt wrote: > > > > > Heh. I've had this G5 thing for a couple of weeks, I'm not very good at > > > reading the oops dump either ;) > > > > DAR is the access address for a 300 trap > > Yeah, that makes complete sense now. "DAR" and "300 trap". I should have > seen it immediately. Heh, well, i didn't say it was good, I told you the info for next time :) But I agree that is far from explicit. Anton or I will come up with a patch making it nicer. Ben. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"aart@kvack.org"> aart@kvack.org </a> ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2004-02-27 22:06 UTC | newest] Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2004-02-27 6:46 mapped page in prep_new_page() Linus Torvalds 2004-02-27 6:58 ` Andrew Morton 2004-02-27 7:11 ` Anton Blanchard 2004-02-27 7:21 ` Andrew Morton 2004-02-27 7:30 ` Linus Torvalds 2004-02-27 7:31 ` Anton Blanchard 2004-02-27 10:38 ` Benjamin Herrenschmidt 2004-02-27 15:32 ` Linus Torvalds 2004-02-27 15:38 ` Anton Blanchard 2004-02-27 22:06 ` Benjamin Herrenschmidt
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox