On Tue, 2002-06-04 16:06:35 +0200, Oliver Pitzeier <o.pitzeier@uptime.at>
wrote in message <000001c20bd1$0cad7580$010b10ac@sbp.uptime.at>:
> Ok. Kernel compiled, but at the startup I see this:
> [ ... ]
> Initializing RT netlink socket
> pci: passed tb register update test
> pci: passed sg loopback i/o read test
> pci: passed tbia test
> pci: passed pte write cache snoop test
> pci: failed valid tag invalid pte reload test (mcheck; workaround
> available)
> pci: passed pci machine check test
> Kernel bug at /usr/src/linux-2.5.20/include/linux/device.h:75
> swapper(1): Kernel Bug 1
> pc =3D [<fffffc00003dceac>] ra =3D [<fffffc00003dbc14>] ps =3D 0000 =
Not
> tainted
> v0 =3D 0000000000000000 t0 =3D 0000000000000000 t1 =3D fffffc00005b3a48
>=20
> I check what is on line 75 in device.h!
That's a known problem. Please look for my mail with Subject "[2.5.19]
Oops during PCI scan on Alpha". One follow-up had a working (but
hackish) fix.
> PS: Anybody want's the patches???
/me
MfG, JBG
PS: Please answer _under_ or _within_ an old mail, but never ever above
it!
--=20
Jan-Benedict Glaw . jbglaw@lug-owl.de . +49-172-7608481
-- New APT-Proxy written in shell script --
http://lug-owl.de/~jbglaw/software/ap2/
--b/Q3JWIUAuLE0ZFy
Content-Type: application/pgp-signature
Content-Disposition: inline
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE8/M0MHb1edYOZ4bsRAhtvAJ9llWMGuNYIsdIjNTUbp42+kS0uLwCdFH4n
HCovzQY01j9rLaREBgId6IQ=
=5RsN
-----END PGP SIGNATURE-----
--b/Q3JWIUAuLE0ZFy--
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/