On Friday 14 July 2006 20:31, Takashi Iwai wrote:
> At Fri, 14 Jul 2006 13:28:40 +0200,
>
> Martin van Es wrote:
> > On Friday 14 July 2006 12:54, Alexey Dobriyan wrote:
> > > On Fri, Jul 14, 2006 at 11:54:36AM +0200, Martin van Es wrote:
> > > > I already sent this mail to [email protected] a couple of days ago since
> > > > I thought that was the closest match in the MAINTAINERS list for this
> > > > oops. Since I didn't receive any reply
> > >
> > > Your kernel is tainted. Please complain to kqemu developers. Don't
> > > waste Jaroslav's time.
> >
> > Thank you Alexey for pointing out I reported this oops while running a
> > tainted kernel (kqemu was indeed tainting it). I interpreted the reply as
> > a request for reproducing the oops on a untainted version of the Kernel
> > of which I'll post the dmesg output below.
> >
> > Hope this helps.
> > Is there anything else I can do to contribute?
>
> Try to compile with CONFIG_SND_DEBUG=y. Also, you can try to build
> modules from alsa-driver-1.0.12rc1 whether the bug still exists in the
> latest version.
Thx!
This is dmesg output with CONFIG_SND_DEBUG=y:
BUG: unable to handle kernel NULL pointer dereference at virtual address
000001b8
printing eip:
dea9a514
*pde = 00000000
Oops: 0002 [#1]
Modules linked in: snd_usb_audio snd_usb_lib pwc snd_rawmidi snd_hwdep
videodev v4l2_common capability commoncap ipw2200
CPU: 0
EIP: 0060:[<dea9a514>] Not tainted VLI
EFLAGS: 00210202 (2.6.17.1 #5)
EIP is at snd_usb_pcm_open+0x34/0x4d0 [snd_usb_audio]
eax: d6f115c0 ebx: 00000000 ecx: 0000000e edx: 000001a8
esi: deaa8d20 edi: c8ed7e50 ebp: d5631ee0 esp: c8ed7d9c
ds: 007b es: 007b ss: 0068
Process ffmpeg (pid: 4950, threadinfo=c8ed6000 task=ca731a30)
Stack: 00000020 c8ed7dd8 00000000 c8ec7000 00000010 d5631ee0 c030f7f4 c8ec7000
00000000 00000010 c8ec7000 000001a8 00000011 0000000b ffffffff cd1a0400
00000000 0000000d c8ed7e50 d5631ee0 c030fb17 d6f115c0 00000001 c921c900
Call Trace:
<c030f7f4> snd_pcm_hw_constraints_init+0x704/0x790 <c030fb17>
snd_pcm_open_substream+0x57/0xb0
<c031df41> snd_pcm_oss_open+0x221/0x4a0 <c0163800>
generic_permission+0x110/0x120
<c02126c7> kobject_get+0x17/0x20 <c01185c0> default_wake_function+0x0/0x20
<c030482d> soundcore_open+0x8d/0x1c0 <c015e826> chrdev_open+0x76/0x160
<c015e7b0> chrdev_open+0x0/0x160 <c0153aeb> __dentry_open+0xbb/0x200
<c0153d4c> do_filp_open+0x5c/0x70 <c01539cb> get_unused_fd+0x5b/0xc0
<c0153db3> do_sys_open+0x53/0x100 <c0153eb7> sys_open+0x27/0x30
<c0102f47> syscall_call+0x7/0xb
Code: 8b 48 5c 8d 14 52 fc 89 4c 24 28 89 d1 c1 e1 04 01 ca b9 0e 00 00 00 8d
14 d5 10 00 00 00 89 54 24 2c 8b 58 08 01 da 89 54 24 2c <c7> 42 10 ff ff ff
ff c7 42 24 00 00 00 00 8b 7c 24 28 81 c7 d0
EIP: [<dea9a514>] snd_usb_pcm_open+0x34/0x4d0 [snd_usb_audio] SS:ESP
0068:c8ed7d9c
Regards,
Martin
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]