Re: [RFC] O(1) proc_pid_readdir

William Lee Irwin III (wli@holomorphy.com)
Tue, 18 Mar 2003 01:25:05 -0800


William Lee Irwin III wrote:
>> The NMI oopses are mostly decoded by hand b/c in-kernel (and other)
>> backtrace decoders can't do it automatically. I might have to generate
>> some fresh data, with some kind of hack (e.g. hand-coded NMI-based kind
>> of smp_call_function) to trace the culprit and not just the victim.
>> The victims were usually stuck in fork() or exit().

On Mon, Mar 17, 2003 at 07:17:08PM +0100, Manfred Spraul wrote:
> Could you check if the attached test app triggers the NMI oopser?

Okay, good news is I take NMI's now, bad news is the watchdog is still
getting disabled somehow.

-- wli
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/