Devfs isn't the only code that can panic without a warning. If some
code gets passed a bogus pointer, there's not a lot you can do
(without putting in error checking on almost every line, and if we did
that, our performance would suck).
> I am able to recreate the problem, and I can giv more info if
> someone talls me what to say.
Please grab the latest devfs patch and apply it to kernel 2.4.15-pre9
or later. If the problem persists, please send a bug report directly.
Patch available at:
ftp://ftp.no.kernel.org/pub/linux/kernel/people/rgooch/v2.4/devfs-patch-v198.gz
Regards,
Richard....
Permanent: rgooch@atnf.csiro.au
Current: rgooch@ras.ucalgary.ca
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/