Same trace as bug #621371
From your http://launchpadlibrarian.net/54070406/OopsText.txt
Call Trace: [<c013e642>] __schedule_bug+0x62/0x70 [<c05c4340>] schedule+0x760/0x7a0 [<c05c44c2>] _cond_resched+0x32/0x50 [<c01fac3e>] anon_vma_prepare+0x1e/0x130 [<c01f62ad>] expand_downwards+0x1d/0x170 [<c01df709>] ? __alloc_pages_nodemask+0xd9/0x1c0 [<c01f640d>] expand_stack+0xd/0x10 [<c01f032b>] do_anonymous_page+0x2fb/0x310 [<c01f4170>] handle_mm_fault+0x340/0x400 [<c01f4339>] __get_user_pages+0x109/0x3f0 [<c01f46c5>] get_user_pages+0x55/0x70 [<c021d3d2>] get_arg_page+0x52/0xb0 [<c035996b>] ? strnlen_user+0x2b/0x60 [<c021d500>] copy_strings+0xd0/0x180 [<c021d5d9>] copy_strings_kernel+0x29/0x40 [<c021efba>] do_execve+0x19a/0x2c0 [<c0359a9a>] ? strncpy_from_user+0x3a/0x70 [<c0109d97>] sys_execve+0x37/0x70 [<c010316e>] ptregs_execve+0x12/0x18 [<c05c6634>] ? syscall_call+0x7/0xb
Same trace as bug #621371
From your http:// launchpadlibrar ian.net/ 54070406/ OopsText. txt
Call Trace: bug+0x62/ 0x70 0x760/0x7a0 0x32/0x50 prepare+ 0x1e/0x130 downwards+ 0x1d/0x170 pages_nodemask+ 0xd9/0x1c0 stack+0xd/ 0x10 page+0x2fb/ 0x310 mm_fault+ 0x340/0x400 pages+0x109/ 0x3f0 pages+0x55/ 0x70 page+0x52/ 0xb0 user+0x2b/ 0x60 0xd0/0x180 kernel+ 0x29/0x40 0x19a/0x2c0 from_user+ 0x3a/0x70 0x37/0x70 execve+ 0x12/0x18 call+0x7/ 0xb
[<c013e642>] __schedule_
[<c05c4340>] schedule+
[<c05c44c2>] _cond_resched+
[<c01fac3e>] anon_vma_
[<c01f62ad>] expand_
[<c01df709>] ? __alloc_
[<c01f640d>] expand_
[<c01f032b>] do_anonymous_
[<c01f4170>] handle_
[<c01f4339>] __get_user_
[<c01f46c5>] get_user_
[<c021d3d2>] get_arg_
[<c035996b>] ? strnlen_
[<c021d500>] copy_strings+
[<c021d5d9>] copy_strings_
[<c021efba>] do_execve+
[<c0359a9a>] ? strncpy_
[<c0109d97>] sys_execve+
[<c010316e>] ptregs_
[<c05c6634>] ? syscall_