[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20080106035001.GA10129@one.firstfloor.org>
Date: Sun, 6 Jan 2008 04:50:01 +0100
From: Andi Kleen <andi@...stfloor.org>
To: Arjan van de Ven <arjan@...ux.intel.com>
Cc: Andi Kleen <andi@...stfloor.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Linus Torvalds <torvalds@...ux-foundation.org>,
Andrew Morton <akpm@...ux-foundation.org>,
NetDev <netdev@...r.kernel.org>
Subject: Re: Top 10 kernel oopses for the week ending January 5th, 2008
On Sat, Jan 05, 2008 at 07:31:29PM -0800, Arjan van de Ven wrote:
> Andi Kleen wrote:
> >Arjan van de Ven <arjan@...ux.intel.com> writes:
> >>Rank 4: remove_proc_entry
> >> Was also ranked 4th last week
> >> Only in tainted oopses
> >> Reported 3 times (12 total reports)
> >> More info:
> >> http://www.kerneloops.org/search.php?search=remove_proc_entry
> >
> >Likely a broken module_exit() function that corrupts the list. To track
> >these down it might be useful to keep a list of recently unloaded modules
> >and dump these too in the oops module list with a special flag.
> >
> I suspect that simply printing the currently unloading module will catch
> 90%+ already;
There are a few cases where the corruption is only visible next time
someone accesses the list. So a small ring buffer might make sense.
-Andi
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists