Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 14 Oct 2002 16:26:07 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 14 Oct 2002 16:26:07 -0400 Received: from inet-mail3.oracle.com ([148.87.2.203]:61061 "EHLO inet-mail3.oracle.com") by vger.kernel.org with ESMTP id ; Mon, 14 Oct 2002 16:26:05 -0400 Message-ID: <8312592.1034627297477.JavaMail.nobody@web55.us.oracle.com> Date: Mon, 14 Oct 2002 13:28:17 -0700 (PDT) From: Bert Barbe To: caligula@cam029208.student.utwente.nl, linux-kernel@vger.kernel.org Subject: Re: 2.5.42: Debug: sleeping function called from illegal context at mm/slab.c:1374 Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Priority: 3 X-Mailer: Oracle Webmail Client Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2842 Lines: 68 Ave, I get a similar trace when using ifenslave to enslave eth0 or eth1 to bond0. I use the bonding module with mode=1 for active backup mode. kernel: bond0: enslaving eth1 as an active interface with an up link kernel: Debug: sleeping function called from illegal context at mm/slab.c:1374 kernel: Call Trace: kernel: [] __might_sleep+0x56/0x60 kernel: [] kmalloc+0x61/0x200 kernel: [] kfree_skbmem+0xb/0x60 kernel: [] mii_ioctl+0x0/0x80 kernel: [] bond_enslave+0xc2/0x300 [bonding] kernel: [] bond_ioctl+0x2bd/0x330 [bonding] kernel: [] dev_change_flags+0xfa/0x110 kernel: [] dev_ifsioc+0x357/0x380 kernel: [] dev_ioctl+0x21f/0x2e0 kernel: [] inet_ioctl+0xdd/0xf0 kernel: [] sock_ioctl+0xd9/0x110 kernel: [] sys_ioctl+0x247/0x290 kernel: [] syscall_call+0x7/0xb kernel: kernel: bond0: enslaving eth0 as a backup interface with an up link. Bert > Ave people > When using xmms with oss output I found this message in my dmesg. > Kernel has alsa sound with oss emulation. > Full dmesg/kernelconfig/lspci can be found at > cam029208.student.utwente.nl/~caligula/kernel/ > ALSA device list: > #0: VIA 82C686A/B at 0xdc00, irq 10 > Debug: sleeping function called from illegal context at mm/slab.c:1374 > Call Trace: > [] __might_sleep+0x52/0x60 > [] kmalloc+0x61/0x200 > [] snd_pci_hack_alloc_consistent+0x56/0xc0 > [] __snd_kmalloc+0x14/0x80 > [] snd_hidden_kmalloc+0x10/0x20 > [] build_via_table+0x9d/0x1c0 > [] build_via_table+0x9d/0x1c0 > [] snd_via82xx_setup_periods+0x2c/0x120 > [] snd_via82xx_playback_prepare+0xb1/0xc0 > [] snd_pcm_prepare+0x127/0x230 > [] snd_pcm_playback_ioctl1+0x3af/0x3c0 > [] find_get_page+0x1e/0x40 > [] filemap_nopage+0x103/0x280 > [] __alloc_pages+0x79/0x250 > [] snd_pcm_kernel_playback_ioctl+0x27/0x30 > [] snd_pcm_oss_prepare+0x16/0x60 > [] snd_pcm_oss_make_ready+0x38/0x50 > [] snd_pcm_oss_write1+0x3a/0x160 > [] snd_pcm_oss_write+0x6b/0xa0 > [] vfs_write+0xba/0x150 > [] sys_write+0x28/0x40 > [] syscall_call+0x7/0xb > - > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@vger.kernel.org > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/