"David S. Miller" <[EMAIL PROTECTED]> wrote: > > From: Andrew Morton <[EMAIL PROTECTED]> > Date: Sat, 28 Jan 2006 17:22:40 -0800 > > > David, your tree > > git+ssh://master.kernel.org/pub/scm/linux/kernel/git/davem/net-2.6.17.git > > is oopsing all over the place. Reverting "[NET]: Do not lose accepted > > socket when -ENFILE/-EMFILE." makes it stop: > > I just checked in the following fix, thanks for the report.
It's still oopsing, with slab poisoning enabled. VFS: Mounted root (ext3 filesystem) readonly. Freeing unused kernel memory: 336k freed Write protecting the kernel read-only data: 758k Unable to handle kernel paging request at virtual address 6b6b6b6f printing eip: *pde = 0c230200 Oops: 0000 [#1] PREEMPT SMP last sysfs file: Modules linked in: video thermal processor fan container button battery ac CPU: 1 EIP: 0060:[<c040a33e>] Not tainted VLI EFLAGS: 00010202 (2.6.16-rc1) EIP is at sock_release+0x87/0xf4 eax: 6b6b6b6b ebx: 0000000a ecx: 00000001 edx: 00000000 esi: ce2dbb18 edi: ce2dbb18 ebp: ce605ebc esp: ce605eb0 ds: 007b es: 007b ss: 0068 Process minilogd (pid: 1509, threadinfo=ce604000 task=ce170aa0) Stack: <0>0000000a 0000000a cff4903c ce605f6c c040b7e3 ce2dbb18 00000002 bf886010 bf885f3c 00000002 ceb839cc ffffffea c1000001 00000002 00000000 00000000 cef67184 ce605f3c c015276e ce145c04 cef67184 499d4bf0 ce6fbea0 ce16c260 Call Trace: [<c0103d95>] show_stack_log_lvl+0xaa/0xdc [<c0103f74>] show_registers+0x167/0x1d4 [<c010417f>] die+0x112/0x19a [<c01143f7>] do_page_fault+0x2a6/0x68b [<c01039eb>] error_code+0x4f/0x54 [<c040b7e3>] sys_accept+0x10b/0x200 [<c040c446>] sys_socketcall+0xe8/0x25b [<c0102e6b>] sysenter_past_esp+0x54/0x75 Code: 00 00 83 c4 04 5b 5e 5d c3 8d 46 38 89 04 24 e8 37 70 d7 ff eb ec e8 a6 94 08 00 eb d7 c7 04 24 00 57 53 c0 e8 32 41 d1 ff eb 92 <8b> 58 04 89 34 24 ff 50 08 85 db c7 46 08 00 00 00 00 2e 0f 84 <6>Adding 1020116k swap on /dev/hda3. Priority:-1 extents:1 across:1020116k - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html