Rolf Eike Beer wrote:
Manu Abraham wrote:
So it now looks like this but i have another problem now, after
consecutive, load/unload, i get an oops ..
Ah, one more thing i noticed, in the probe function, whatever i do to
generate interrupts, the interrupt handler does not receive any
interrupts, which makes me to think whether request_irq() really yielded
me an IRQ.
One more thing after a module load unload cycle, i did a cat
/proc/interrupts, which led to another oops..
Which makes me to think that request_irq did not work out as expected or
something like that. Any clues .. ?
Regards,
Manu
[ 4001.876841] mantis_pci_probe: <1:>IRQ=23
[ 4001.877014] mantis_pci_probe: <2:>IRQ=23
[ 4001.877176] mantis_pci_probe: Got a device
[ 4001.877356] mantis_pci_probe: We got an IRQ
[ 4001.877514] mantis_pci_probe: We finally enabled the device
[ 4001.877730] Mantis Rev 1, irq: 23, latency: 32
[ 4001.877836] memory: 0xefeff000, mmio: f9218000
[ 4009.156947] mantis_pci_remove: Removing -->Mantis irq: 23,
latency: 32
[ 4009.156949] memory: 0xefeff000, mmio: 0xf9218000
[ 4009.157391] Trying to free free IRQ23
[ 4516.358401] Unable to handle kernel paging request at virtual address
f92bd7e2
[ 4516.360543] printing eip:
[ 4516.362599] c02086fe
[ 4516.364574] *pde = 37ecf067
[ 4516.366591] *pte = 00000000
[ 4516.368554] Oops: 0000 [#1]
[ 4516.370304] SMP
[ 4516.372372] Modules linked in: i2c_core mb86a15 dvb_core 3c59x piix
sd_mod
[ 4516.374903] CPU: 0
[ 4516.374904] EIP: 0060:[<c02086fe>] Not tainted VLI
[ 4516.374906] EFLAGS: 00010097 (2.6.13)
[ 4516.382874] EIP is at vsnprintf+0x35e/0x4f0
[ 4516.385638] eax: f92bd7e2 ebx: 0000000a ecx: f92bd7e2 edx: fffffffe
[ 4516.388683] esi: f4322122 edi: 00000000 ebp: f4322fff esp: f2b0fec0
[ 4516.391978] ds: 007b es: 007b ss: 0068
[ 4516.395387] Process cat (pid: 3375, threadinfo=f2b0f000 task=f3c61020)
[ 4516.395641] Stack: f2b0ff04 f4322fff 00000000 00000000 0000000a
0000000a 00000000 00000000
[ 4516.399463] ffffffff ffffffff f2e328c0 f5f5dfa0 00000017
f2e328c0 c01801d7 f4322120
[ 4516.403230] 00000ee0 c0369c81 f2b0ff20 00000008 c0105a4c
f2e328c0 c0369c7e f92bd7e2
[ 4516.407497] Call Trace:
[ 4516.415981] [<c01801d7>] seq_printf+0x37/0x60
[ 4516.420212] [<c0105a4c>] show_interrupts+0x2bc/0x3b0
[ 4516.424905] [<c017fcd6>] seq_read+0x1d6/0x2d0
[ 4516.429671] [<c015e186>] vfs_read+0xb6/0x180
[ 4516.434507] [<c015e531>] sys_read+0x51/0x80
[ 4516.439056] [<c0102f5f>] sysenter_past_esp+0x54/0x75
[ 4516.444082] Code: 00 83 cf 01 89 44 24 24 eb bb 8b 44 24 48 8b 54 24
20 83 44 24 48 04 8b 08 b8 3c 95 36 c0 81 f9 ff 0f 00 00 0f 46 c8 89 c8
eb 06 <80> 38 00 74 07 40 4a 83 fa ff 75 f4 29 c8 83 e7 10 89 c3 75 20
[ 4516.456263]
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
|
|