Bug#510859: zaptel: rmmod of zaphfc gives kernel stack trace

Tristan Hill stan at saticed.me.uk
Tue Jan 20 20:08:01 UTC 2009


Based on the code reference in the warning (referring to
http://lxr.linux.no/linux+v2.6.26/arch/x86/kernel/smp.c#L207) I believe
its due to using the interrupt disabling spinlock functions.

I have not have the system deadlock as indicated by comments in the code
near the above link and the code seems to have changed/moved a lot in
newer kernels so don't know how much a problem it is.

The warning/stack trace goes away with the attached patch.  I assume its
safe to not disable interrupts once the handler has been unregistered.

Thanks
Tristan
-------------- next part --------------
A non-text attachment was scrubbed...
Name: zaphfc.patch
Type: text/x-patch
Size: 740 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-voip-maintainers/attachments/20090120/0fa6d6d7/attachment.bin 


More information about the Pkg-voip-maintainers mailing list