Hi all, I get some problems w/ 2.4.5-ac7, ncr53c8xx w/ 2.4.4-ac18 works fine. I gave a small looked on problem .. the problem apparently is w/ ncr53c8xx driver ( who accuses timeout ), and make reiserfs call BUG() : please somebody debug this, I have no time :-(( prints.c:332 void reiserfs_panic (struct super_block * sb, const char * fmt, ...) { #ifdef __KERNEL__ show_reiserfs_locks() ; #endif do_reiserfs_warning; printk ("%s", error_buf); BUG (); ... journal.c:729 if (!buffer_uptodate(tbh)) { reiserfs_panic(s, "journal-601, buffer write failed\n") ; } OOPS 1: ksymoops 2.4.1 on i686 2.4.5-14tlsmp. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-14tlsmp/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. <1>Unable to handle kernel paging request at virtual address e0c12da7 c022467c *pde = 1ee33067 Oops: 0000 CPU: 1 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010297 eax: e0c12da7 ebx: ffffffff ecx: e0c12da7 edx: fffffffe esi: ffffffff edi: dcce6182 ebp: c8c65ef4 esp: c8c65eb8 ds: 0018 es: 0018 ss: 0018 Process cat (pid: 18237, stackpage=c8c65000) Stack: 00000002 dcce6180 d8c6fe00 ffffffff dcce6171 d8c6fe00 0000000d 0804daf4 c8c65f04 c0126116 c8e297a0 dfd926e0 0000004e 00000001 00000000 c8c65f08 c0224880 dcce6180 c022e997 c8c65f1c c8c65f3c c010834b dcce6180 c022e994 Call Trace: [] [] [] [] [] [] [] [] [] Code: 80 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 89 c6 8b 45 fc a8 >>EIP; c022467c <===== Trace; c0126116 Trace; c0224880 Trace; c010834b <__read_lock_failed+24eb/25f0> Trace; e0c12da7 Trace; c0157111 Trace; c0154efc Trace; c012732e Trace; c013589a Trace; c01070d7 <__read_lock_failed+1277/25f0> Code; c022467c 00000000 <_EIP>: Code; c022467c <===== 0: 80 38 00 cmpb $0x0,(%eax) <===== Code; c022467f 3: 74 07 je c <_EIP+0xc> c0224688 Code; c0224681 5: 40 inc %eax Code; c0224682 6: 4a dec %edx Code; c0224683 7: 83 fa ff cmp $0xffffffff,%edx Code; c0224686 a: 75 f4 jne 0 <_EIP> Code; c0224688 c: 29 c8 sub %ecx,%eax Code; c022468a e: 89 c6 mov %eax,%esi Code; c022468c 10: 8b 45 fc mov 0xfffffffc(%ebp),%eax Code; c022468f 13: a8 00 test $0x0,%al OOPS 2: ksymoops 2.4.1 on i686 2.4.5-14tlsmp. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.5-14tlsmp/ (default) -m /usr/src/linux/System.map (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. cpu: 0, clocks: 997304, slice: 332434 cpu: 1, clocks: 997304, slice: 332434 kernel BUG at prints.c:332! invalid operand: 0000 CPU: 1 EIP: 0010:[] Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010286 eax: 0000001c ebx: c02e8100 ecx: c0285d40 edx: 00003dac esi: d6e0fd6c edi: c02e8500 ebp: 00000000 esp: d6e0fd30 ds: 0018 es: 0018 ss: 0018 Process cat (pid: 4140, stackpage=d6e0f000) Stack: c024c418 0000014c 00000000 e4ab30bc dfba4000 d6e0fd88 c02e8500 dfba4000 d6e0fd5c d6e0fd58 d6e0e000 00000000 c017d726 dfba4000 c024e340 00000000 00000002 dfba4000 e4ab30bc 00000003 00000004 00000000 d6fb2980 c017dc1d Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 08 83 7c 24 2c 00 74 08 8b 44 24 2c 80 48 28 01 >>EIP; c01721e0 <===== Trace; e4ab30bc Trace; c017d726 Trace; e4ab30bc Trace; c017dc1d Trace; e4ab30bc Trace; e4ab30bc Trace; e4ab30fc Trace; c017f0b4 Trace; c0181815 Trace; e4ab30bc Trace; c017d075 Trace; e4ab3000 Trace; c017fb2d Trace; c0177922 Trace; c0169ed5 Trace; e4ab3000 Trace; e4ab30bc Trace; e4abc3bc Trace; e4ad006c Trace; c017fd6a Trace; c016a20b Trace; c014a861 <__mark_inode_dirty+2d/948> Trace; c014c07a Trace; c01284b2 Trace; c012858b Trace; c01284c0 Trace; c01352f6 Trace; c0106f67 <__read_lock_failed+1107/25f0> Code; c01721e0 00000000 <_EIP>: Code; c01721e0 <===== 0: 0f 0b ud2a <===== Code; c01721e2 2: 83 c4 08 add $0x8,%esp Code; c01721e5 5: 83 7c 24 2c 00 cmpl $0x0,0x2c(%esp,1) Code; c01721ea a: 74 08 je 14 <_EIP+0x14> c01721f4 Code; c01721ec c: 8b 44 24 2c mov 0x2c(%esp,1),%eax Code; c01721f0 10: 80 48 28 01 orb $0x1,0x28(%eax) kernel BUG at prints.c:332! invalid operand: 0000 CPU: 1 EIP: 0010:[] EFLAGS: 00010286 eax: 0000001c ebx: c02e8100 ecx: c0285d40 edx: 000047c1 esi: d5953dbc edi: c02e8500 ebp: 00000000 esp: d5953d80 ds: 0018 es: 0018 ss: 0018 Process umount (pid: 4152, stackpage=d5953000) Stack: c024c418 0000014c 00000000 e48a90bc da5c3800 d5953dd8 c02e8500 da5c3800 d5953dac d5953da8 d5952000 00000000 c017d726 da5c3800 c024e340 000000bc e48a9000 e48a90bc 00000000 00000002 00000003 00000000 d85953e0 c01815ad Call Trace: [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] [] Code: 0f 0b 83 c4 08 83 7c 24 2c 00 74 08 8b 44 24 2c 80 48 28 01 >>EIP; c01721e0 <===== Trace; e48a90bc Trace; c017d726 Trace; e48a9000 Trace; e48a90bc Trace; c01815ad Trace; e48a90bc Trace; c01138c7 Trace; c0113744 Trace; c0130216 <__alloc_pages+6e/280> Trace; c0128a3d Trace; e48a9000 Trace; e48a90bc Trace; e48b23bc Trace; e48c6024 Trace; c017e309 Trace; c01700de Trace; c017e38d Trace; c01700ec Trace; c013ad7b Trace; c0139faf <__mntput+53/678> Trace; c01401f8 Trace; c013b269 Trace; c01269a2 Trace; c013b2a0 Trace; c0106f67 <__read_lock_failed+1107/25f0> Code; c01721e0 00000000 <_EIP>: Code; c01721e0 <===== 0: 0f 0b ud2a <===== Code; c01721e2 2: 83 c4 08 add $0x8,%esp Code; c01721e5 5: 83 7c 24 2c 00 cmpl $0x0,0x2c(%esp,1) Code; c01721ea a: 74 08 je 14 <_EIP+0x14> c01721f4 Code; c01721ec c: 8b 44 24 2c mov 0x2c(%esp,1),%eax Code; c01721f0 10: 80 48 28 01 orb $0x1,0x28(%eax) -- _________________________ Carlos E Gorges (carlos@techlinux.com.br) Tech informática LTDA Brazil _________________________