Bug#510859: zaptel: rmmod of zaphfc gives kernel stack trace
stan at saticed.me.uk
Tue Jan 20 20:08:01 UTC 2009
Based on the code reference in the warning (referring to
http://lxr.linux.no/linux+v2.6.26/arch/x86/kernel/smp.c#L207) I believe
its due to using the interrupt disabling spinlock functions.
I have not have the system deadlock as indicated by comments in the code
near the above link and the code seems to have changed/moved a lot in
newer kernels so don't know how much a problem it is.
The warning/stack trace goes away with the attached patch. I assume its
safe to not disable interrupts once the handler has been unregistered.
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 740 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20090120/0fa6d6d7/attachment.bin
More information about the Pkg-voip-maintainers