+ Responder ao Tópico



  1. #1
    Celio
    Bem, ao bisbilhotar meu log, notei as seguintes linhas, talvez essa informacao seja util a alguem, aparentemente um bug no kernel vindo do
    arquivo /usr/src/linux-2.4.19/mm/page_alloc.c

    Uma coisa que queria perguntar e o seguinte: Ja que praticamente nunca usa memoria virtual, principalmente quando deixo o pc ligado para fazer
    downlods e o X desligado durante madrugada, queria saber como desligar os hds que nao estiverem em uso, pois o monitor ele desliga/suspende
    sem problema.

    Outra coisa que fico olhando e que depois de um certo tempo de uso, pois geralmente nao preciso reiniciar, a memoria vai toda embora, ficando
    somente uns 5 MB livre de RAM fisica, aparentemente a maior parte dessa RAM vai para cache/buffers, bem, isso parece ser bom por um lado, que
    mantem cache dos arquivos em memoria para agilizar, porem e no caso de um programa/jogo que requer bastante RAM, como ele trata isso ? e seria
    possivel saber o que esta em cache ?

    Bem, realmente sou curioso, e venho usando o Red Hat 7.3 a uns 2 meses e estou achando interessante usar o Linux como desktop <IMG SRC="images/forum/smilies/icon_wink.gif">

    Agradeco desde ja, abraços,
    Célio


    Oct 3 04:02:52 venonc kernel: kernel BUG at page_alloc.c:91!
    Oct 3 04:02:52 venonc kernel: invalid operand: 0000
    Oct 3 04:02:52 venonc kernel: CPU: 0
    Oct 3 04:02:52 venonc kernel: EIP: 0010:[<c012fa50>] Tainted: P
    Oct 3 04:02:52 venonc kernel: EFLAGS: 00010282
    Oct 3 04:02:52 venonc kernel: eax: c121b980 ebx: c11a9b58 ecx: 00000000 edx: c023ec80
    Oct 3 04:02:52 venonc kernel: esi: c11a9b58 edi: 00000000 ebp: 00001432 esp: cff35f04
    Oct 3 04:02:52 venonc kernel: ds: 0018 es: 0018 ss: 0018
    Oct 3 04:02:52 venonc kernel: Process kswapd (pid: 5, stackpage=cff35000)
    Oct 3 04:02:52 venonc kernel: Stack: c0139608 cfef4200 c023edb4 c102c01c c023edcc 00000000 c11a9b58 000001d0
    Oct 3 04:02:52 venonc kernel: c11a9b58 00000016 00001432 c012f32d 00000000 cff34000 00000200 000001d0
    Oct 3 04:02:52 venonc kernel: c023edb4 c12c51a0 c460c3c0 c12c5600 00000001 00000020 000001d0 00000006
    Oct 3 04:02:52 venonc kernel: Call Trace: [<c0139608>] [<c012f32d>] [<c012f540>] [<c012f5bc>] [<c012f661>]
    Oct 3 04:02:52 venonc kernel: [<c012f6d6>] [<c012f811>] [<c012f770>] [<c0105000>] [<c0107126>] [<c012f770>]
    Oct 3 04:02:52 venonc kernel:
    Oct 3 04:02:52 venonc kernel: Code: 0f 0b 5b 00 16 82 21 c0 89 d8 2b 05 f0 73 2a c0 69 c0 a3 8b
    Oct 3 04:02:55 venonc kernel: kernel BUG at page_alloc.c:91!
    Oct 3 04:02:55 venonc kernel: invalid operand: 0000
    Oct 3 04:02:55 venonc kernel: CPU: 0
    Oct 3 04:02:55 venonc kernel: EIP: 0010:[<c012fa50>] Tainted: P
    Oct 3 04:02:55 venonc kernel: EFLAGS: 00010282
    Oct 3 04:02:55 venonc kernel: eax: c125b854 ebx: c1047d70 ecx: 00000000 edx: c023ec80
    Oct 3 04:02:55 venonc kernel: esi: c1047d70 edi: 00000000 ebp: 00001459 esp: c3d5dc7c
    Oct 3 04:02:55 venonc kernel: ds: 0018 es: 0018 ss: 0018
    Oct 3 04:02:55 venonc kernel: Process updatedb (pid: 12449, stackpage=c3d5d000)
    Oct 3 04:02:55 venonc kernel: Stack: c0139608 00000000 cdb5d1e0 ceaffa40 cfef4200 00000000 c1047d70 000000f0
    Oct 3 04:02:55 venonc kernel: c1047d70 00000020 00001459 c012f32d cff1c000 c3d5c000 00000200 000000f0
    Oct 3 04:02:55 venonc kernel: c023edb4 c02d8500 00000016 c12c51a0 00000000 00000020 000000f0 00000006
    Oct 3 04:02:55 venonc kernel: Call Trace: [<c0139608>] [<c012f32d>] [<c012f540>] [<c012f5bc>] [<c012ff27>]
    Oct 3 04:02:55 venonc kernel: [<c01301bb>] [<c01295de>] [<c0139221>] [<c0139451>] [<c0137487>] [<d081d938>]
    Oct 3 04:02:55 venonc kernel: [<c0137478>] [<c01376c2>] [<c0130303>] [<d081f169>] [<d081f1e5>] [<d081f371>]
    Oct 3 04:02:55 venonc kernel: [<d0820494>] [<d081dafe>] [<d081b5cb>] [<c013e3dd>] [<c013f576>] [<c01422f8>]
    Oct 3 04:02:55 venonc kernel: [<c0142880>] [<c0142a0f>] [<c0142880>] [<c0134d7f>] [<c01088bb>]
    Oct 3 04:02:55 venonc kernel:
    Oct 3 04:02:56 venonc kernel: Code: 0f 0b 5b 00 16 82 21 c0 89 d8 2b 05 f0 73 2a c0 69 c0 a3 8b
    Oct 3 04:02:56 venonc kernel: kernel BUG at page_alloc.c:91!
    Oct 3 04:02:56 venonc kernel: invalid operand: 0000
    Oct 3 04:02:56 venonc kernel: CPU: 0
    Oct 3 04:02:56 venonc kernel: EIP: 0010:[<c012fa50>] Tainted: P
    Oct 3 04:02:56 venonc kernel: EFLAGS: 00010282
    Oct 3 04:02:56 venonc kernel: eax: c10ceca4 ebx: c1047cc0 ecx: 00000000 edx: c023ec80
    Oct 3 04:02:56 venonc kernel: esi: c1047cc0 edi: 00000000 ebp: 00001459 esp: c14fddbc
    Oct 3 04:02:56 venonc kernel: ds: 0018 es: 0018 ss: 0018
    Oct 3 04:02:56 venonc kernel: Process modprobe (pid: 12453, stackpage=c14fd000)
    Oct 3 04:02:56 venonc kernel: Stack: c0139608 c14fdf34 464c457f 00010101 00000000 00000000 c1047cc0 000001d2
    Oct 3 04:02:56 venonc kernel: c1047cc0 00000020 00001459 c012f32d 00200034 c14fc000 00000200 000001d2
    Oct 3 04:02:56 venonc kernel: c023edb4 00000000 cff977b0 cffc1980 00000000 00000020 000001d2 00000006
    Oct 3 04:02:56 venonc kernel: Call Trace: [<c0139608>] [<c012f32d>] [<c012f540>] [<c012f5bc>] [<c012ff27>]
    Oct 3 04:02:56 venonc kernel: [<c01301bb>] [<c0126ffd>] [<c0127594>] [<c0127138>] [<c0127b6f>] [<c011612e>]
    Oct 3 04:02:56 venonc kernel: [<c010dafa>] [<c012c40d>] [<c0115fb0>] [<c01089ac>]
    Oct 3 04:02:56 venonc kernel:
    Oct 3 04:02:56 venonc kernel: Code: 0f 0b 5b 00 16 82 21 c0 89 d8 2b 05 f0 73 2a c0 69 c0 a3 8b
    Oct 3 04:02:56 venonc kernel: kernel BUG at page_alloc.c:91!
    Oct 3 04:02:56 venonc kernel: invalid operand: 0000
    Oct 3 04:02:56 venonc kernel: CPU: 0
    Oct 3 04:02:56 venonc kernel: EIP: 0010:[<c012fa50>] Tainted: P
    Oct 3 04:02:56 venonc kernel: EFLAGS: 00010282
    Oct 3 04:02:56 venonc kernel: eax: c11a8700 ebx: c1047c3c ecx: 00000000 edx: c023ec80
    Oct 3 04:02:56 venonc kernel: esi: c1047c3c edi: 00000000 ebp: 00001452 esp: c3d5dd84
    Oct 3 04:02:56 venonc kernel: ds: 0018 es: 0018 ss: 0018
    Oct 3 04:02:56 venonc kernel: Process sendmail (pid: 12452, stackpage=c3d5d000)
    Oct 3 04:02:56 venonc kernel: Stack: c0139608 cfef4200 c023edb4 c102c01c c023edcc 00000000 c1047c3c 000001d2
    Oct 3 04:02:56 venonc kernel: c1047c3c 00000018 00001452 c012f32d c0c1fa00 c3d5c000 00000200 000001d2
    Oct 3 04:02:56 venonc kernel: c023edb4 cf8745d0 ceaffac0 cffc1520 00000000 00000020 000001d2 00000006
    Oct 3 04:02:56 venonc kernel: Call Trace: [<c0139608>] [<c012f32d>] [<c012f540>] [<c012f5bc>] [<c012ff27>]
    Oct 3 04:02:56 venonc kernel: [<c01301bb>] [<c012a5bb>] [<c0126ec8>] [<d081fa93>] [<c0126fa1>] [<d080e6c5>]
    Oct 3 04:02:56 venonc kernel: [<c0127138>] [<c01472ce>] [<c011612e>] [<c0129f8a>] [<c0129e90>] [<c0135a50>]
    Oct 3 04:02:56 venonc kernel: [<c0115fb0>] [<c01089ac>]
    Oct 3 04:02:56 venonc kernel:
    Oct 3 04:02:56 venonc kernel: Code: 0f 0b 5b 00 16 82 21 c0 89 d8 2b 05 f0 73 2a c0 69 c0 a3 8b
    Oct 3 19:05:36 venonc login(pam_unix)[11767]: check pass; user unknown
    Oct 3 19:05:36 venonc login(pam_unix)[11767]: authentication failure; logname=LOGIN uid=0 euid=0 tty=tty2 ruser= rhost=
    Oct 3 19:05:38 venonc login[11767]: FAILED LOGIN 1 FROM (null) FOR rot, Authentication failure
    Oct 3 19:05:42 venonc su(pam_unix)[12821]: session opened for user root by celio(uid=500)
    Oct 3 19:05:50 venonc kernel: kernel BUG at page_alloc.c:91!
    Oct 3 19:05:50 venonc kernel: invalid operand: 0000
    Oct 3 19:05:50 venonc kernel: CPU: 0
    Oct 3 19:05:50 venonc kernel: EIP: 0010:[<c012fa50>] Tainted: P
    Oct 3 19:05:50 venonc kernel: EFLAGS: 00010282
    Oct 3 19:05:50 venonc kernel: eax: 00000000 ebx: c1047c3c ecx: 00000000 edx: c023ec80
    Oct 3 19:05:50 venonc kernel: esi: 00000001 edi: 00000000 ebp: cf9b5540 esp: c4b45e5c
    Oct 3 19:05:50 venonc kernel: ds: 0018 es: 0018 ss: 0018
    Oct 3 19:05:50 venonc kernel: Process xfs (pid: 9149, stackpage=c4b45000)
    Oct 3 19:05:50 venonc kernel: Stack: 0004c800 c115dde8 c013077b c023ec80 0004c900 cff44f3c 00000000 00000000
    Oct 3 19:05:50 venonc kernel: 00000001 00000008 cf9b5540 c0126d77 000004c9 0004cf00 00000000 c19eda8c
    Oct 3 19:05:50 venonc kernel: c0126dcd 0004cf00 00000001 082a3000 00000001 cf9b5540 cb5b8540 c012714b
    Oct 3 19:05:50 venonc kernel: Call Trace: [<c013077b>] [<c0126d77>] [<c0126dcd>] [<c012714b>] [<c018d6ca>]
    Oct 3 19:05:50 venonc kernel: [<c011612e>] [<c018ddd4>] [<c018e205>] [<c0198e70>] [<c0109c59>] [<c0109dc8>]
    Oct 3 19:05:50 venonc kernel: [<c0115fb0>] [<c01089ac>]
    Oct 3 19:05:50 venonc kernel:
    Oct 3 19:05:50 venonc kernel: Code: 0f 0b 5b 00 16 82 21 c0 89 d8 2b 05 f0 73 2a c0 69 c0 a3 8b

  2. Certo Celio ,
    oq nao entendi e´ quando ele te da essa big mensagem???


    oq ocorre para ele dar essa mensagem??

    vc executa algum programa ??

    []os



  3. #3
    Mr_Mind
    Em relaçao ao kernel nao te posso ajudar.
    Para desligar discos etc ... procura no teu suporte a gestao de energia .. acpi ou apm.

    Um abraço <IMG SRC="images/forum/smilies/icon_biggrin.gif">






Tópicos Similares

  1. Respostas: 1
    Último Post: 23-11-2014, 08:31
  2. Como saber o formato do sistema de Arquivos utilizado ?
    Por prs_linux no fórum Servidores de Rede
    Respostas: 9
    Último Post: 27-09-2005, 17:17
  3. Tamanho do nome de arquivo
    Por whinston no fórum Servidores de Rede
    Respostas: 3
    Último Post: 11-06-2005, 03:21
  4. mudar formato de arquivo dos to unix.
    Por MAJOR no fórum Servidores de Rede
    Respostas: 2
    Último Post: 03-07-2004, 21:10
  5. Cópia de arquivos mantendo o dono do arquivo
    Por estanisgeyer no fórum Servidores de Rede
    Respostas: 6
    Último Post: 09-01-2004, 11:21

Visite: BR-Linux ·  VivaOLinux ·  Dicas-L