[mythtv-users] Kernel oops?

Craig O'Shannessy craig at ucw.com.au
Sun Sep 7 15:04:33 EDT 2003


Hi,

I've finally got everthing working in Myth, which is very cool, I LOVE 
Myth, but my bloody 'puter keeps crashing (kernel oops, hard lock).

It's almost always when I'm recording, although I have managed to lock it 
once by thrashing the drive (cat /dev/hda2 > /dev/null).

I'm beginning to suspect hardware problems, perhaps the chipset or 
motherboard (it's a Abit A7G with a KT133 chipset), I have heard of people 
having problems with the KT133 and bttv.

I have tried upgrading from 2.4.20-8 + bttv 0.7x (standard RH9) to 2.4.22 
+  bttv 0.9, but it still crashes (although it seems to crash less often).

I've also run memtest for about 12 hours with no errors.

Here are a couple of the oops. Anyone got any ideas?  I'm about to give up 
and go and buy a new motherboard, CPU, case and memory, but if I can fix 
it without that I'd be happier :)

Here's a ksymoops run on the first oops.

Craig

--

root at furby log]# ksymoops  < /tmp/tmp3.oops
ksymoops 2.4.9 on i686 2.4.22.  Options used
     -V (default)
     -k /proc/ksyms (default)
     -l /proc/modules (default)
     -o /lib/modules/2.4.22/ (default)
     -m /usr/src/linux/System.map (default)

Warning: You did not tell me where to find symbol information.  I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc.  ksymoops -h explains the options.

Sep  4 21:33:19 furby kernel: Unable to handle kernel paging request at virtual address 11111316
Sep  4 21:33:19 furby kernel: c0134432
Sep  4 21:33:19 furby kernel: *pde = 00000000
Sep  4 21:33:19 furby kernel: Oops: 0002
Sep  4 21:33:19 furby kernel: CPU:    0
Sep  4 21:33:19 furby kernel: EIP:    0010:[<c0134432>]    Tainted: P
Using defaults from ksymoops -t elf32-i386 -a i386
Sep  4 21:33:19 furby kernel: EFLAGS: 00010056
Sep  4 21:33:19 furby kernel: eax: c12c7ed4   ebx: c0eecc40   ecx: c0eec000   edx: 11111312
Sep  4 21:33:19 furby kernel: esi: 00000005   edi: 00000078   ebp: c12c7ecc   esp: c8c71ddc
Sep  4 21:33:19 furby kernel: ds: 0018   es: 0018   ss: 0018
Sep  4 21:33:19 furby kernel: Process mythbackend (pid: 1659, stackpage=c8c71000)
Sep  4 21:33:19 furby kernel: Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
Sep  4 21:33:19 furby kernel:        c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
Sep  4 21:33:19 furby kernel:        000000f0 c0140d58 00000001 02a2f350 cedc57c0 00000303 c113ebd0 00000000
Sep  4 21:33:19 furby kernel: Call Trace:    [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
Sep  4 21:33:19 furby kernel:   [<c0136d4d>] [<c01092ac>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>]
Sep  4 21:33:19 furby kernel:   [<c012e9c0>] [<c012eb1d>] [<c012e9c0>] [<c013e233>] [<c01076bf>]
Sep  4 21:33:19 furby kernel: Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04


>>EIP; c0134432 <kmem_cache_alloc_batch+92/e0>   <=====

>>eax; c12c7ed4 <_end+ec1010/104501bc>
>>ebx; c0eecc40 <_end+ae5d7c/104501bc>
>>ecx; c0eec000 <_end+ae513c/104501bc>
>>ebp; c12c7ecc <_end+ec1008/104501bc>
>>esp; c8c71ddc <_end+886af18/104501bc>

Trace; c01350db <__kmem_cache_alloc+5b/130>
Trace; c0140c6a <get_unused_buffer_head+5a/b0>
Trace; c0140d58 <create_buffers+28/f0>
Trace; c0140ff5 <create_empty_buffers+25/70>
Trace; c01418da <block_read_full_page+24a/270>
Trace; c0136d4d <__alloc_pages+ad/180>
Trace; c01092ac <do_IRQ+dc/e0>
Trace; c012daa0 <page_cache_read+c0/e0>
Trace; c016c5a0 <ext3_get_block+0/90>
Trace; c012e199 <generic_file_readahead+c9/160>
Trace; c012e5a4 <do_generic_file_read+344/490>
Trace; c012e9c0 <file_read_actor+0/a0>
Trace; c012eb1d <generic_file_read+bd/1b0>
Trace; c012e9c0 <file_read_actor+0/a0>
Trace; c013e233 <sys_read+a3/150>
Trace; c01076bf <system_call+33/38>

Code;  c0134432 <kmem_cache_alloc_batch+92/e0>
00000000 <_EIP>:
Code;  c0134432 <kmem_cache_alloc_batch+92/e0>   <=====
   0:   89 42 04                  mov    %eax,0x4(%edx)   <=====
Code;  c0134435 <kmem_cache_alloc_batch+95/e0>
   3:   c7 01 00 00 00 00         movl   $0x0,(%ecx)
Code;  c013443b <kmem_cache_alloc_batch+9b/e0>
   9:   8b 45 00                  mov    0x0(%ebp),%eax
Code;  c013443e <kmem_cache_alloc_batch+9e/e0>
   c:   89 48 04                  mov    %ecx,0x4(%eax)
Code;  c0134441 <kmem_cache_alloc_batch+a1/e0>
   f:   89 01                     mov    %eax,(%ecx)
Code;  c0134443 <kmem_cache_alloc_batch+a3/e0>
  11:   89 69 04                  mov    %ebp,0x4(%ecx)


1 warning issued.  Results may not be reliable.


Unable to handle kernel paging request at virtual address 52617998
 printing eip:
c0134432
*pde = 00000000
Oops: 0002
CPU:    0
EIP:    0010:[<c0134432>]    Tainted: P
EFLAGS: 00010056
eax: c12c7ed4   ebx: c4f0e8c0   ecx: c4f0e000   edx: 52617994
esi: 00000004   edi: 00000079   ebp: c12c7ecc   esp: c51b9ddc
ds: 0018   es: 0018   ss: 0018
Process mythbackend (pid: 7407, stackpage=c51b9000)
Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
       c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
       000000f0 c0140d58 00000001 02922f98 c2147ac0 00000303 c1245d34 00000000
Call Trace:    [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
  [<c0136d4d>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>] [<c012e9c0>]
  [<c012eb1d>] [<c012e9c0>] [<c0116802>] [<c013e233>] [<c01076bf>]

Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04


Unable to handle kernel paging request at virtual address 10101014
 printing eip:
c0134432
*pde = 00000000
Oops: 0002
CPU:    0
EIP:    0010:[<c0134432>]    Tainted: P
EFLAGS: 00010056
eax: c12c7ed4   ebx: ceb4e0c0   ecx: ceb4e000   edx: 10101010
esi: 00000053   edi: 0000002a   ebp: c12c7ecc   esp: c234ddd4
ds: 0018   es: 0018   ss: 0018
Process apt-get (pid: 1894, stackpage=c234d000)
Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
       c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
       000000f0 c0140d58 00000001 0009f2e0 ceaadc40 00000301 c106808c 00000000
Call Trace:    [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
  [<c0136ce2>] [<c0116b0b>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>]
  [<c012e9c0>] [<c012eb1d>] [<c012e9c0>] [<c011fb94>] [<c013e8ea>] [<c01076bf>]

Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04

Unable to handle kernel paging request at virtual address 696a6465
 printing eip:
c013521a
*pde = 00000000
Oops: 0002
CPU:    0
EIP:    0010:[<c013521a>]    Tainted: P
EFLAGS: 00010046
eax: 696a6461   ebx: c12ebdd8   ecx: cac9b000   edx: cb671000
esi: 00000047   edi: c12eac0c   ebp: 00000006   esp: c12f3f28
ds: 0018   es: 0018   ss: 0018
Process kswapd (pid: 4, stackpage=c12f3000)
Stack: c12ebdd8 0000007e c12eac0c c0134a82 c12ebdd8 cac9bed0 c12f2000 c12eac00
       00000000 00000000 00000000 00000000 00000020 000001d0 c0334fb4 00000006
       c0135b76 c29da000 c12f2000 c0334fb4 00000006 000001d0 c0334fb4 00000000
Call Trace:    [<c0134a82>] [<c0135b76>] [<c0135c26>] [<c0135d54>] [<c0135db9>]
  [<c0135eed>] [<c0105000>] [<c01058de>] [<c0135e50>]

Code: 89 50 04 c7 01 00 00 00 00 8b 43 08 8d 53 08 89 48 04 89 01





More information about the mythtv-users mailing list