oops with bttv 0.8.38

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



I hope all of the kernel patching has been done right.  Mandrake's
latest kernel from their development branch has v4l2 all patched in.
Woohoo!

They have:
 o  2.4.18 +
 o  patch-2.4.19-pre6.bz2 +
 o  v4l2-01-add-api-2.4.19-pre8.diff.gz 

(the fact that the v4l2 patch says 2.4.19-pre8 and the kernel is only
2.4.19-pre6 worries me).

So I built bttv 0.8.38 and installed it into the kernel modules
directory but when I try to use it, I get an oops:

ksymoops 2.4.5 on i686 2.4.18-13mdk.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.18-13mdk/ (default)
     -m /boot/System.map-2.4.18-13mdk (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Warning (compare_ksyms_lsmod): module ext3 is in lsmod but not in ksyms, probably no symbols exported
May  5 15:35:17 pc kernel: Unable to handle kernel NULL pointer dereference at virtual address 00000004
May  5 15:35:17 pc kernel: c0118b01
May  5 15:35:17 pc kernel: *pde = 13b00067
May  5 15:35:17 pc kernel: Oops: 0002
May  5 15:35:17 pc kernel: CPU:    0
May  5 15:35:17 pc kernel: EIP:    0010:[add_wait_queue+17/48]    Tainted: P 
May  5 15:35:17 pc kernel: EIP:    0010:[<c0118b01>]    Tainted: P 
Using defaults from ksymoops -t elf32-i386 -a i386
May  5 15:35:17 pc kernel: EFLAGS: 00013046
May  5 15:35:17 pc kernel: eax: d528d544   ebx: 00000000   ecx: d3fa1f18   edx: d3fa1f10
May  5 15:35:17 pc kernel: esi: 00003246   edi: d528d4ec   ebp: 00000000   esp: d3fa1ef4
May  5 15:35:17 pc kernel: ds: 0018   es: 0018   ss: 0018
May  5 15:35:17 pc kernel: Process X (pid: 2277, stackpage=d3fa1000)
May  5 15:35:17 pc kernel: Stack: d528d508 00000000 d89be5d3 00000000 d3fa0000 00000000 00000000 00000000 
May  5 15:35:17 pc kernel:        d3fa0000 00000000 00000000 d528d508 d528d4ec d89d18e0 d43d79c0 d89c8a21 
May  5 15:35:17 pc kernel:        d528d4ec 00000000 00000000 d528d400 d89d18e0 d446c560 d89c4a9a d89d18e0 
May  5 15:35:17 pc kernel: Call Trace: [<d89be5d3>] [<d89d18e0>] [<d89c8a21>] [<d89d18e0>] [<d89c4a9a>] 
May  5 15:35:17 pc kernel:    [<d89d18e0>] [fput+77/224] [<d89c458e>] [filp_close+63/96] [sys_close+67/80] [system_call+51/64] 
May  5 15:35:17 pc kernel:    [<d89d18e0>] [<c013926d>] [<d89c458e>] [<c013817f>] [<c01381e3>] [<c0108b73>] 
May  5 15:35:17 pc kernel: Code: 89 4b 04 89 5a 08 89 41 04 89 08 56 9d 5b 5e c3 eb 0d 90 90 


>>EIP; c0118b01 <add_wait_queue+11/30>   <=====

>>eax; d528d544 <_end+14f846f0/184fb1fc>
>>ecx; d3fa1f18 <_end+13c990c4/184fb1fc>
>>edx; d3fa1f10 <_end+13c990bc/184fb1fc>
>>esi; 00003246 Before first symbol
>>edi; d528d4ec <_end+14f84698/184fb1fc>
>>esp; d3fa1ef4 <_end+13c990a0/184fb1fc>

Trace; d89be5d3 <[video-buf]videobuf_waiton+63/f0>
Trace; d89d18e0 <[bttv]bttvs+0/1c30>
Trace; d89c8a21 <[bttv]bttv_dma_free+31/70>
Trace; d89d18e0 <[bttv]bttvs+0/1c30>
Trace; d89c4a9a <[bttv]bttv_release+4a/60>
Trace; d89d18e0 <[bttv]bttvs+0/1c30>
Trace; d89d18e0 <[bttv]bttvs+0/1c30>
Trace; c013926d <fput+4d/e0>
Trace; d89c458e <[bttv]bttv_ioctl+1e/30>
Trace; c013817f <filp_close+3f/60>
Trace; c01381e3 <sys_close+43/50>
Trace; c0108b73 <system_call+33/40>

Code;  c0118b01 <add_wait_queue+11/30>
00000000 <_EIP>:
Code;  c0118b01 <add_wait_queue+11/30>   <=====
   0:   89 4b 04                  mov    %ecx,0x4(%ebx)   <=====
Code;  c0118b04 <add_wait_queue+14/30>
   3:   89 5a 08                  mov    %ebx,0x8(%edx)
Code;  c0118b07 <add_wait_queue+17/30>
   6:   89 41 04                  mov    %eax,0x4(%ecx)
Code;  c0118b0a <add_wait_queue+1a/30>
   9:   89 08                     mov    %ecx,(%eax)
Code;  c0118b0c <add_wait_queue+1c/30>
   b:   56                        push   %esi
Code;  c0118b0d <add_wait_queue+1d/30>
   c:   9d                        popf   
Code;  c0118b0e <add_wait_queue+1e/30>
   d:   5b                        pop    %ebx
Code;  c0118b0f <add_wait_queue+1f/30>
   e:   5e                        pop    %esi
Code;  c0118b10 <add_wait_queue+20/30>
   f:   c3                        ret    
Code;  c0118b11 <add_wait_queue+21/30>
  10:   eb 0d                     jmp    1f <_EIP+0x1f> c0118b20 <add_wait_queue_exclusive+0/30>
Code;  c0118b13 <add_wait_queue+23/30>
  12:   90                        nop    
Code;  c0118b14 <add_wait_queue+24/30>
  13:   90                        nop    


2 warnings issued.  Results may not be reliable.

Is 2.4.19-pre6 too early for the v4l2 patch they applied?

Thanx,
b.

-- 
Brian J. Murrell

Attachment: pgpKOKqk8xHFE.pgp
Description: PGP signature


[Index of Archives]     [Linux DVB]     [Video Disk Recorder]     [Asterisk]     [Photo]     [DCCP]     [Netdev]     [Xorg]     [Util Linux NG]     [Xfree86]     [Free Photo Albums]     [Fedora Users]     [Fedora Women]     [ALSA Users]     [ALSA Devel]     [Linux USB]

Powered by Linux