From: Frederic Weisbecker <fweisbec@xxxxxxxxx> Date: Wed, 14 Apr 2010 17:48:04 +0200 > Ok, I've applied the two patches and it fixes the problems > partially. > > The crashes happen less likely as run into a manual > loop of > > echo function_graph > current_tracer > echo nop > current_tracer > > But after some trials: Thanks for testing, I still get weird crashes too during stress tests. At this point I think either we're still getting stack overflow due to deep call chains, or something that is supposed to be NMI safe actually isn't :-) Validating the stack overflow theory is pretty simple so I'll do some tests tonight to check that out. -- To unsubscribe from this list: send the line "unsubscribe sparclinux" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html