2.6.25.15 bug?

From: Anders Eriksson
Date: Tue Aug 26 2008 - 12:03:19 EST



Trying to track down a hard freeze bug, I enabled various hacker options. This
one turned up in dmesg. I'm pretty sure it souldn't be there.

This on seems to be unrealted to the bug I'm hunting though...


kobject: 'vcsa11' (d643fed8): kobject_uevent_env
kobject: 'vcsa11' (d643fed8): fill_kobj_path: path = '/class/vc/vcsa11'
IRQ handler type mismatch for IRQ 3
current handler: MPU401 UART
Pid: 4799, comm: hald-probe-seri Not tainted 2.6.25.15 #30
[<c013d4e7>] setup_irq+0x1a4/0x1bc
[<c013d644>] request_irq+0xc7/0xe5
[<c023a18f>] ? serial8250_interrupt+0x0/0x114
[<c0239f9d>] serial8250_startup+0x3b6/0x50d
[<c02360c0>] uart_startup+0x70/0x125
[<c023766d>] uart_open+0x158/0x390
[<c0399705>] ? _spin_unlock+0x27/0x3c
[<c02257e1>] ? check_tty_count+0x3b/0x8a
[<c0228df9>] tty_open+0x164/0x2a9
[<c015e60c>] chrdev_open+0x140/0x18c
[<c015ad28>] __dentry_open+0xfb/0x1ad
[<c015adf9>] nameidata_to_filp+0x1f/0x33
[<c015e4cc>] ? chrdev_open+0x0/0x18c
[<c015ae3b>] do_filp_open+0x2e/0x35
[<c015ac17>] ? get_unused_fd_flags+0xcc/0xd6
[<c0399705>] ? _spin_unlock+0x27/0x3c
[<c015ae84>] do_sys_open+0x42/0xbc
[<c015af40>] sys_open+0x1e/0x26
[<c0102aba>] sysenter_past_esp+0x5f/0xa5
=======================
kobject: 'microcode' (dc839e28): kobject_add_internal: parent: 'module', set: 'module'
kobject: 'holders' (d6072c30): kobject_add_internal: parent: 'microcode', set: '<NULL>'
kobject: 'microcode' (dc839e28): kobject_uevent_env
kobject: 'microcode' (dc839e28): fill_kobj_path: path = '/module/microcode'


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/