Oops for 2.4.20 + patch-2.4.20-kraxel (before Jan 15)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hi Gerd,

Sorry for taking so long but I've been busy and travelling.

This is the ksymoops output for my setup using the pre Jan17 code (patch
and v4l2 0.2.3 code). The oops is triggered only when there is a real TV
signal on the TV card input. If I disconnect the TV antenna input, it does
not trigger. The oops is copied by hand so I hope I didn't input anything
incorrectly. I'll try the Jan 21 snapshots later.

----------
ksymoops 2.4.5 on i686 2.4.20.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.20/ (default)
     -m /boot/System.map-2.4.20 (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Error (expand_objects): cannot stat(/lib/ext3.o) for ext3
Error (expand_objects): cannot stat(/lib/jbd.o) for jbd
Error (expand_objects): cannot stat(/lib/ncr53c8xx.o) for ncr53c8xx
Error (expand_objects): cannot stat(/lib/sd_mod.o) for sd_mod
Error (expand_objects): cannot stat(/lib/scsi_mod.o) for scsi_mod
Warning (map_ksym_to_module): cannot match loaded module ext3 to a unique module object.  Trace may not be reliable.
*pde = 00000000
Oops: 0000
CPU: 0
EIP: 0010:[<c0119ffc>] Not Tainted
Using defaults from ksymoops -t elf32-i386 -a i386
EFLAGS: 00010082
eax: c2ef45c4 ebx: 00000000 ecx: 00000001 edx: 00000001
esi: 00000000 edi: c2e845c4 ebp: c02aff30 esp: c02aff18
ds: 0018 es: 0018 ss: 0018
Stack: 00000001 00000282 00000001 00000100 00000000 c2e84000 00000000 cc97a41e
       cc973b7c c2e84000 c02a7d88 00000000 c02d81c0 c7751c80 24000001 c02affa0
       00000005 c010a3f5 00000005 c2e84000 c02affa0 c02d4a40 00000025 00000140
Call trace: [<cc97a41e>] [<cc973b7c>] [<c010a385>] [<c010a574>] [<c0106ea0>] [<c010cb18>]
        [<c0106ea0>] [<c0106ec3>] [<c0106f32>] [<c0105000>]
Code: 8b 13 0f 0d 02 39 c3 74 3c 8b 4b fc 8b 01 85 45 f0 74 25 31


>>EIP; c0119ffc <__wake_up+1c/a0>   <=====

>>eax; c2ef45c4 <_end+2bd45c4/c4ee080>
>>edi; c2e845c4 <_end+2b645c4/c4ee080>
>>ebp; c02aff30 <init_task_union+1f30/2000>
>>esp; c02aff18 <init_task_union+1f18/2000>

Trace; cc97a41e <[saa7134]saa7134_tvaudio_do_scan+1e/30>
Trace; cc973b7c <[saa7134]saa7134_irq+14c/1a0>
Trace; c010a385 <get_irq_list+195/1c0>
Trace; c010a574 <do_IRQ+64/a0>
Trace; c0106ea0 <default_idle+0/30>
Trace; c010cb18 <call_do_IRQ+5/d>
Trace; c0106ea0 <default_idle+0/30>
Trace; c0106ec3 <default_idle+23/30>
Trace; c0106f32 <cpu_idle+42/60>
Trace; c0105000 <_stext+0/0>

Code;  c0119ffc <__wake_up+1c/a0>
00000000 <_EIP>:
Code;  c0119ffc <__wake_up+1c/a0>   <=====
   0:   8b 13                     mov    (%ebx),%edx   <=====
Code;  c0119ffe <__wake_up+1e/a0>
   2:   0f 0d 02                  prefetch (%edx)
Code;  c011a001 <__wake_up+21/a0>
   5:   39 c3                     cmp    %eax,%ebx
Code;  c011a003 <__wake_up+23/a0>
   7:   74 3c                     je     45 <_EIP+0x45>
Code;  c011a005 <__wake_up+25/a0>
   9:   8b 4b fc                  mov    0xfffffffc(%ebx),%ecx
Code;  c011a008 <__wake_up+28/a0>
   c:   8b 01                     mov    (%ecx),%eax
Code;  c011a00a <__wake_up+2a/a0>
   e:   85 45 f0                  test   %eax,0xfffffff0(%ebp)
Code;  c011a00d <__wake_up+2d/a0>
  11:   74 25                     je     38 <_EIP+0x38>
Code;  c011a00f <__wake_up+2f/a0>
  13:   31 00                     xor    %eax,(%eax)

<0> Kernel Panic: Aiee, killing interrupt handler!

2 warnings and 5 errors issued.  Results may not be reliable.


----
Wan Tat Chee (Lecturer)
School of Computer Science, Univ. Science Malaysia,
11800 Minden, Penang, Malaysia.          Ofc Ph: +604 653-3888 x 3617
Internet: tcwan@xxxxxxxxx            Web: http://nrg.cs.usm.my/~tcwan
GPG Key : http://nrg.cs.usm.my/~tcwan/tcw_gpg.asc
F'print : FB0F CED7 85A5 ECF9 DEF0  50E8 A550 A0D2 8638 B1EB






[Index of Archives]     [Linux DVB]     [Video Disk Recorder]     [Asterisk]     [Photo]     [DCCP]     [Netdev]     [Xorg]     [Util Linux NG]     [Xfree86]     [Free Photo Albums]     [Fedora Users]     [Fedora Women]     [ALSA Users]     [ALSA Devel]     [Linux USB]

Powered by Linux