Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755403AbYAFDe7 (ORCPT ); Sat, 5 Jan 2008 22:34:59 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1752835AbYAFDes (ORCPT ); Sat, 5 Jan 2008 22:34:48 -0500 Received: from mga07.intel.com ([143.182.124.22]:39282 "EHLO azsmga101.ch.intel.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751502AbYAFDer (ORCPT ); Sat, 5 Jan 2008 22:34:47 -0500 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.24,249,1196668800"; d="scan'208";a="359337172" Message-ID: <47804B91.1050709@linux.intel.com> Date: Sat, 05 Jan 2008 19:31:29 -0800 From: Arjan van de Ven User-Agent: Thunderbird 1.5 (Windows/20051201) MIME-Version: 1.0 To: Andi Kleen CC: Linux Kernel Mailing List , Linus Torvalds , Andrew Morton , NetDev Subject: Re: Top 10 kernel oopses for the week ending January 5th, 2008 References: <477FF149.4070609@linux.intel.com> In-Reply-To: Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 881 Lines: 19 Andi Kleen wrote: > Arjan van de Ven writes: >> Rank 4: remove_proc_entry >> Was also ranked 4th last week >> Only in tainted oopses >> Reported 3 times (12 total reports) >> More info: http://www.kerneloops.org/search.php?search=remove_proc_entry > > Likely a broken module_exit() function that corrupts the list. To track > these down it might be useful to keep a list of recently unloaded modules > and dump these too in the oops module list with a special flag. > I suspect that simply printing the currently unloading module will catch 90%+ already; I'll look into adding this, it's a very good idea. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/