From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from cuda.sgi.com (cuda2.sgi.com [192.48.176.25]) by oss.sgi.com (8.12.11.20060308/8.12.11/SuSE Linux 0.7) with ESMTP id mBTB8E2o030517 for ; Mon, 29 Dec 2008 05:08:14 -0600 Received: from pih-relay04.plus.net (localhost [127.0.0.1]) by cuda.sgi.com (Spam Firewall) with ESMTP id A97AE4E525 for ; Mon, 29 Dec 2008 03:08:13 -0800 (PST) Received: from pih-relay04.plus.net (pih-relay04.plus.net [212.159.14.17]) by cuda.sgi.com with ESMTP id wqVrDCaWrSHa0cbd for ; Mon, 29 Dec 2008 03:08:13 -0800 (PST) Message-ID: <4958AF9E.7070005@yahoo.com> Date: Mon, 29 Dec 2008 11:08:14 +0000 From: Sitsofe Wheeler MIME-Version: 1.0 Subject: Re: Hi! I've noticed that kernel.org advertises 2.6.28 as "The latest stable version of the Linux kernel is". References: In-Reply-To: List-Id: XFS Filesystem from SGI List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: xfs-bounces@oss.sgi.com Errors-To: xfs-bounces@oss.sgi.com To: for.poige+linux@gmail.com Cc: Christoph Hellwig , xfs@oss.sgi.com Igor Podlesny wrote: > Yeah, I'll try to get backtraces, using null-modem cable, but alas, I Have you tried compiling your kernel with extended checks (CONFIG_DEBUG_KERNEL in the Kernel hacking menu)? There are debug poisoning options too. Sometimes this can flush out problems before they become fatal... _______________________________________________ xfs mailing list xfs@oss.sgi.com http://oss.sgi.com/mailman/listinfo/xfs