linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* 2.5.37-bk2 maybe new traceback for $BLAH at slab.c:1374
@ 2002-09-30 17:27 Steven Cole
  2002-09-30 17:58 ` Andrew Morton
  0 siblings, 1 reply; 2+ messages in thread
From: Steven Cole @ 2002-09-30 17:27 UTC (permalink / raw)
  To: Andrew Morton; +Cc: Linux Kernel

I got the other init_irq() stuff just like many other people, but here's
one which I haven't seen reported yet.  Kernel is 2.5.39bk2.  I just got
this once on boot up.  This system is UP, IDE.

Debug: sleeping function called from illegal context at slab.c:1374
cc57bf74 cc57bf94 c013204b c02a89e1 0000055e cc57a000 cd0103e0 00000000
       cc57bfbc c010bb13 c12832e8 000001d0 c012b317 bffffb88 00000000 cc57a000
       00000000 00000004 bffffb28 c010781b 00000000 00000400 00000001 00000000
Call Trace:
 [<c013204b>]__kmem_cache_alloc+0x10b/0x110
 [<c010bb13>]sys_ioperm+0x83/0x150
 [<c012b317>]sys_munmap+0x57/0x80
 [<c010781b>]syscall_call+0x7/0xb


Steven




^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: 2.5.37-bk2 maybe new traceback for $BLAH at slab.c:1374
  2002-09-30 17:27 2.5.37-bk2 maybe new traceback for $BLAH at slab.c:1374 Steven Cole
@ 2002-09-30 17:58 ` Andrew Morton
  0 siblings, 0 replies; 2+ messages in thread
From: Andrew Morton @ 2002-09-30 17:58 UTC (permalink / raw)
  To: Steven Cole; +Cc: Andrew Morton, Linux Kernel

Steven Cole wrote:
> 
> I got the other init_irq() stuff just like many other people, but here's
> one which I haven't seen reported yet.  Kernel is 2.5.39bk2.  I just got
> this once on boot up.  This system is UP, IDE.
> 
> Debug: sleeping function called from illegal context at slab.c:1374
> cc57bf74 cc57bf94 c013204b c02a89e1 0000055e cc57a000 cd0103e0 00000000
>        cc57bfbc c010bb13 c12832e8 000001d0 c012b317 bffffb88 00000000 cc57a000
>        00000000 00000004 bffffb28 c010781b 00000000 00000400 00000001 00000000
> Call Trace:
>  [<c013204b>]__kmem_cache_alloc+0x10b/0x110
>  [<c010bb13>]sys_ioperm+0x83/0x150
>  [<c012b317>]sys_munmap+0x57/0x80
>  [<c010781b>]syscall_call+0x7/0xb
> 

Yup, thanks.  The sys_ioperm() one is known.  I'll fix it up.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2002-09-30 17:53 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2002-09-30 17:27 2.5.37-bk2 maybe new traceback for $BLAH at slab.c:1374 Steven Cole
2002-09-30 17:58 ` Andrew Morton

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).