How come?

Calling initcall 0xc0517656: flow_cache_init+0x0/0x11b()
Calling initcall 0xc0517771: llc_init+0x0/0x60()
Calling initcall 0xc05177d1: snap_init+0x0/0x37()
Calling initcall 0xc05186e7: inet_init+0x0/0x1ae()
NET: Registered protocol family 2
input: AT Translated Set 2 keyboard as /class/input/input0
IP route cache hash table entries: 4096 (order: 2, 16384 bytes)
TCP established hash table entries: 16384 (order: 6, 393216 bytes)
TCP bind hash table entries: 16384 (order: 6, 393216 bytes)
TCP: Hash tables configured (established 16384 bind 16384)
TCP reno registered
Calling initcall 0xc03723ec: init+0x0/0x1e()
Calling initcall 0xc0518bb4: init+0x0/0x16()
ip_conntrack version 2.4 (2046 buckets, 16368 max) - 172 bytes per conntrack
Calling initcall 0xc0518dd9: ip_vs_init+0x0/0x138()
IPVS: Registered protocols (TCP)
IPVS: Connection hash table configured (size=4096, memory=32Kbytes)
IPVS: ipvs loaded.
Calling initcall 0xc0518f11: inet_diag_init+0x0/0x8c()
Calling initcall 0xc0518f9d: tcp_diag_init+0x0/0x16()
Calling initcall 0xc0518fb3: bictcp_register+0x0/0x16()
TCP bic registered
Calling initcall 0xc051917a: af_unix_init+0x0/0x7b()
NET: Registered protocol family 1
Calling initcall 0xc05191f5: packet_init+0x0/0x6f()
NET: Registered protocol family 17
Calling initcall 0xc0519264: ipsec_pfkey_init+0x0/0xb4()
NET: Registered protocol family 15
Calling initcall 0xc0519318: br_init+0x0/0x87()
Bridge firewalling registered
Calling initcall 0xc05193e2: init+0x0/0xb6()
Ebtables v2.0 registered
Calling initcall 0xc0519498: init+0x0/0x24()
Calling initcall 0xc05194bc: init+0x0/0x74()
Calling initcall 0xc0519530: init+0x0/0x74()
Calling initcall 0xc05195a4: init+0x0/0x16()
Calling initcall 0xc05195ba: init+0x0/0x16()
Calling initcall 0xc05195d0: init+0x0/0x16()
Calling initcall 0xc05195e6: init+0x0/0x16()
Calling initcall 0xc05195fc: init+0x0/0x16()
Calling initcall 0xc0519612: init+0x0/0x16()
Calling initcall 0xc0519628: init+0x0/0x16()
Calling initcall 0xc051963e: init+0x0/0x16()
Calling initcall 0xc0519654: init+0x0/0x4a()
Calling initcall 0xc051969e: init+0x0/0x16()
Calling initcall 0xc05196b4: init+0x0/0x16()
Calling initcall 0xc05196ca: init+0x0/0x16()
Calling initcall 0xc05196e0: init+0x0/0x16()
Calling initcall 0xc05196f6: init+0x0/0x16()
Calling initcall 0xc051970c: init+0x0/0x42()
Calling initcall 0xc051974e: init+0x0/0x132()
ebt_ulog: not logging via ulog since somebody else already registered for 
PF_BRIDGE
Calling initcall 0xc0519880: init_sunrpc+0x0/0x51()
Calling initcall 0xc05198d1: init_rpcsec_gss+0x0/0x3f()
Calling initcall 0xc0519910: init_kerberos_module+0x0/0x32()
Calling initcall 0xc04fde5e: amd_exit_cpu+0x0/0x11()
Calling initcall 0xc04fe43e: cyrix_exit_cpu+0x0/0x11()
Calling initcall 0xc04fe460: nsc_exit_cpu+0x0/0x11()
Calling initcall 0xc04fe6eb: centaur_exit_cpu+0x0/0x11()


I'd also be interested in knowing how we managed to defeat
print_fn_descriptor_symbol()..
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to