[mythtv-users] Kernel oops?
Craig O'Shannessy
craig at ucw.com.au
Sun Sep 7 15:04:33 EDT 2003
Hi,
I've finally got everthing working in Myth, which is very cool, I LOVE
Myth, but my bloody 'puter keeps crashing (kernel oops, hard lock).
It's almost always when I'm recording, although I have managed to lock it
once by thrashing the drive (cat /dev/hda2 > /dev/null).
I'm beginning to suspect hardware problems, perhaps the chipset or
motherboard (it's a Abit A7G with a KT133 chipset), I have heard of people
having problems with the KT133 and bttv.
I have tried upgrading from 2.4.20-8 + bttv 0.7x (standard RH9) to 2.4.22
+ bttv 0.9, but it still crashes (although it seems to crash less often).
I've also run memtest for about 12 hours with no errors.
Here are a couple of the oops. Anyone got any ideas? I'm about to give up
and go and buy a new motherboard, CPU, case and memory, but if I can fix
it without that I'd be happier :)
Here's a ksymoops run on the first oops.
Craig
--
root at furby log]# ksymoops < /tmp/tmp3.oops
ksymoops 2.4.9 on i686 2.4.22. Options used
-V (default)
-k /proc/ksyms (default)
-l /proc/modules (default)
-o /lib/modules/2.4.22/ (default)
-m /usr/src/linux/System.map (default)
Warning: You did not tell me where to find symbol information. I will
assume that the log matches the kernel and modules that are running
right now and I'll use the default options above for symbol resolution.
If the current kernel and/or modules do not match the log, you can get
more accurate output by telling me the kernel version and where to find
map, modules, ksyms etc. ksymoops -h explains the options.
Sep 4 21:33:19 furby kernel: Unable to handle kernel paging request at virtual address 11111316
Sep 4 21:33:19 furby kernel: c0134432
Sep 4 21:33:19 furby kernel: *pde = 00000000
Sep 4 21:33:19 furby kernel: Oops: 0002
Sep 4 21:33:19 furby kernel: CPU: 0
Sep 4 21:33:19 furby kernel: EIP: 0010:[<c0134432>] Tainted: P
Using defaults from ksymoops -t elf32-i386 -a i386
Sep 4 21:33:19 furby kernel: EFLAGS: 00010056
Sep 4 21:33:19 furby kernel: eax: c12c7ed4 ebx: c0eecc40 ecx: c0eec000 edx: 11111312
Sep 4 21:33:19 furby kernel: esi: 00000005 edi: 00000078 ebp: c12c7ecc esp: c8c71ddc
Sep 4 21:33:19 furby kernel: ds: 0018 es: 0018 ss: 0018
Sep 4 21:33:19 furby kernel: Process mythbackend (pid: 1659, stackpage=c8c71000)
Sep 4 21:33:19 furby kernel: Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
Sep 4 21:33:19 furby kernel: c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
Sep 4 21:33:19 furby kernel: 000000f0 c0140d58 00000001 02a2f350 cedc57c0 00000303 c113ebd0 00000000
Sep 4 21:33:19 furby kernel: Call Trace: [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
Sep 4 21:33:19 furby kernel: [<c0136d4d>] [<c01092ac>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>]
Sep 4 21:33:19 furby kernel: [<c012e9c0>] [<c012eb1d>] [<c012e9c0>] [<c013e233>] [<c01076bf>]
Sep 4 21:33:19 furby kernel: Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04
>>EIP; c0134432 <kmem_cache_alloc_batch+92/e0> <=====
>>eax; c12c7ed4 <_end+ec1010/104501bc>
>>ebx; c0eecc40 <_end+ae5d7c/104501bc>
>>ecx; c0eec000 <_end+ae513c/104501bc>
>>ebp; c12c7ecc <_end+ec1008/104501bc>
>>esp; c8c71ddc <_end+886af18/104501bc>
Trace; c01350db <__kmem_cache_alloc+5b/130>
Trace; c0140c6a <get_unused_buffer_head+5a/b0>
Trace; c0140d58 <create_buffers+28/f0>
Trace; c0140ff5 <create_empty_buffers+25/70>
Trace; c01418da <block_read_full_page+24a/270>
Trace; c0136d4d <__alloc_pages+ad/180>
Trace; c01092ac <do_IRQ+dc/e0>
Trace; c012daa0 <page_cache_read+c0/e0>
Trace; c016c5a0 <ext3_get_block+0/90>
Trace; c012e199 <generic_file_readahead+c9/160>
Trace; c012e5a4 <do_generic_file_read+344/490>
Trace; c012e9c0 <file_read_actor+0/a0>
Trace; c012eb1d <generic_file_read+bd/1b0>
Trace; c012e9c0 <file_read_actor+0/a0>
Trace; c013e233 <sys_read+a3/150>
Trace; c01076bf <system_call+33/38>
Code; c0134432 <kmem_cache_alloc_batch+92/e0>
00000000 <_EIP>:
Code; c0134432 <kmem_cache_alloc_batch+92/e0> <=====
0: 89 42 04 mov %eax,0x4(%edx) <=====
Code; c0134435 <kmem_cache_alloc_batch+95/e0>
3: c7 01 00 00 00 00 movl $0x0,(%ecx)
Code; c013443b <kmem_cache_alloc_batch+9b/e0>
9: 8b 45 00 mov 0x0(%ebp),%eax
Code; c013443e <kmem_cache_alloc_batch+9e/e0>
c: 89 48 04 mov %ecx,0x4(%eax)
Code; c0134441 <kmem_cache_alloc_batch+a1/e0>
f: 89 01 mov %eax,(%ecx)
Code; c0134443 <kmem_cache_alloc_batch+a3/e0>
11: 89 69 04 mov %ebp,0x4(%ecx)
1 warning issued. Results may not be reliable.
Unable to handle kernel paging request at virtual address 52617998
printing eip:
c0134432
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c0134432>] Tainted: P
EFLAGS: 00010056
eax: c12c7ed4 ebx: c4f0e8c0 ecx: c4f0e000 edx: 52617994
esi: 00000004 edi: 00000079 ebp: c12c7ecc esp: c51b9ddc
ds: 0018 es: 0018 ss: 0018
Process mythbackend (pid: 7407, stackpage=c51b9000)
Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
000000f0 c0140d58 00000001 02922f98 c2147ac0 00000303 c1245d34 00000000
Call Trace: [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
[<c0136d4d>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>] [<c012e9c0>]
[<c012eb1d>] [<c012e9c0>] [<c0116802>] [<c013e233>] [<c01076bf>]
Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04
Unable to handle kernel paging request at virtual address 10101014
printing eip:
c0134432
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c0134432>] Tainted: P
EFLAGS: 00010056
eax: c12c7ed4 ebx: ceb4e0c0 ecx: ceb4e000 edx: 10101010
esi: 00000053 edi: 0000002a ebp: c12c7ecc esp: c234ddd4
ds: 0018 es: 0018 ss: 0018
Process apt-get (pid: 1894, stackpage=c234d000)
Stack: c12c7ed4 c12c7edc c12c7ecc 00000246 000000f0 00000001 c01350db c12c7ecc
c12f7000 000000f0 00000000 00000000 00001000 00000001 c0140c6a c12c7ecc
000000f0 c0140d58 00000001 0009f2e0 ceaadc40 00000301 c106808c 00000000
Call Trace: [<c01350db>] [<c0140c6a>] [<c0140d58>] [<c0140ff5>] [<c01418da>]
[<c0136ce2>] [<c0116b0b>] [<c012daa0>] [<c016c5a0>] [<c012e199>] [<c012e5a4>]
[<c012e9c0>] [<c012eb1d>] [<c012e9c0>] [<c011fb94>] [<c013e8ea>] [<c01076bf>]
Code: 89 42 04 c7 01 00 00 00 00 8b 45 00 89 48 04 89 01 89 69 04
Unable to handle kernel paging request at virtual address 696a6465
printing eip:
c013521a
*pde = 00000000
Oops: 0002
CPU: 0
EIP: 0010:[<c013521a>] Tainted: P
EFLAGS: 00010046
eax: 696a6461 ebx: c12ebdd8 ecx: cac9b000 edx: cb671000
esi: 00000047 edi: c12eac0c ebp: 00000006 esp: c12f3f28
ds: 0018 es: 0018 ss: 0018
Process kswapd (pid: 4, stackpage=c12f3000)
Stack: c12ebdd8 0000007e c12eac0c c0134a82 c12ebdd8 cac9bed0 c12f2000 c12eac00
00000000 00000000 00000000 00000000 00000020 000001d0 c0334fb4 00000006
c0135b76 c29da000 c12f2000 c0334fb4 00000006 000001d0 c0334fb4 00000000
Call Trace: [<c0134a82>] [<c0135b76>] [<c0135c26>] [<c0135d54>] [<c0135db9>]
[<c0135eed>] [<c0105000>] [<c01058de>] [<c0135e50>]
Code: 89 50 04 c7 01 00 00 00 00 8b 43 08 8d 53 08 89 48 04 89 01
More information about the mythtv-users
mailing list