From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757301Ab0JUDPG (ORCPT ); Wed, 20 Oct 2010 23:15:06 -0400 Received: from cn.fujitsu.com ([222.73.24.84]:55418 "EHLO song.cn.fujitsu.com" rhost-flags-OK-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1752662Ab0JUDPE (ORCPT ); Wed, 20 Oct 2010 23:15:04 -0400 Message-ID: <4CBFB06B.3020305@cn.fujitsu.com> Date: Thu, 21 Oct 2010 11:15:55 +0800 From: Li Zefan User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.1b3pre) Gecko/20090513 Fedora/3.0-2.3.beta2.fc11 Thunderbird/3.0b2 MIME-Version: 1.0 To: akpm@linux-foundation.org CC: mm-commits@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: mmotm 2010-10-20-15-01 uploaded References: <201010202233.o9KMXNoL008303@imap1.linux-foundation.org> <4CBFAB7B.7080306@cn.fujitsu.com> In-Reply-To: <4CBFAB7B.7080306@cn.fujitsu.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Li Zefan wrote: > akpm@linux-foundation.org wrote: >> The mm-of-the-moment snapshot 2010-10-20-15-01 has been uploaded to >> >> http://userweb.kernel.org/~akpm/mmotm/ >> >> and will soon be available at >> >> git://zen-kernel.org/kernel/mmotm.git >> >> It contains the following patches against 2.6.36-rc8: >> > > Got this: > > arch/x86/pci/xen.c: In function 'pci_xen_init': > arch/x86/pci/xen.c:138: error: 'isapnp_disable' undeclared (first use in this function) > arch/x86/pci/xen.c:138: error: (Each undeclared identifier is reported only once > arch/x86/pci/xen.c:138: error: for each function it appears in.) > > # quilt patches arch/x86/pci/xen.c > linux-next.patch I just commented out isapnp_disable, and after boot I saw this warning: ------------[ cut here ]------------ WARNING: at arch/x86/mm/highmem_32.c:82 __kunmap_atomic+0x80/0xd4() Hardware name: ASPIRE AG1720 Modules linked in: Pid: 1, comm: swapper Not tainted 2.6.36-rc8-mm1+ #1 Call Trace: [] warn_slowpath_common+0x6a/0x7f [] ? __kunmap_atomic+0x80/0xd4 [] warn_slowpath_null+0x14/0x18 [] __kunmap_atomic+0x80/0xd4 [] zero_user_segments+0x5e/0x64 [] simple_write_begin+0x5e/0x6c [] generic_file_buffered_write+0xc0/0x1c5 [] ? current_fs_time+0x1b/0x1e [] __generic_file_aio_write+0x25e/0x28f [] generic_file_aio_write+0x62/0xaa [] do_sync_write+0x8f/0xca [] ? _raw_write_unlock_irqrestore+0x41/0x4d [] ? kmemleak_alloc+0x59/0x78 [] ? do_name+0x10e/0x26b [] ? do_sync_write+0x0/0xca [] vfs_write+0x85/0xe3 [] sys_write+0x40/0x62 [] do_copy+0x24/0xbe [] flush_buffer+0x6a/0x8a [] gunzip+0x267/0x2e6 [] ? nofill+0x0/0x8 [] ? gunzip+0x0/0x2e6 [] unpack_to_rootfs+0x1e0/0x2ee [] ? flush_buffer+0x0/0x8a [] ? error+0x0/0x13 [] populate_rootfs+0x4c/0x200 [] ? pci_get_subsys+0x4d/0x59 [] ? printk+0x14/0x18 [] ? pci_apply_final_quirks+0xc9/0xe6 [] do_one_initcall+0x76/0x126 [] ? populate_rootfs+0x0/0x200 [] kernel_init+0x126/0x1a2 [] ? kernel_init+0x0/0x1a2 [] kernel_thread_helper+0x6/0x10 ---[ end trace e93713a9d40cd06c ]---