On Tue, 11 Dec 2001, Andre Werthmann wrote:
> 
> when I try use the kernel sisfb (kernel 2.4.17pre8), the kernel module
> gives me an oops.
> You sayed it works for you, have you used any special patches ?
> Where can I find Torsten's DRIVER_CTX_CTOR/DTOR fixes ?

They're in the kernel already.  That's the patch that Alan H. posted to
the group against the XF sources.  The XF sources and the linux sources 
aren't 100% in sync, and Torsten's patches are in the kernel, but not in 
XF yet.

I'm running stock linux-2.4.17-pre8 kernel, and Red Hat 7.2 XFree 4.1.  No 
patched anything.

> Here is the oops message from the kernel.
> 
> Dec 11 15:56:00 localhost kernel: sisfb: framebuffer at 0xd0000000, mapped 
> to 0xce8a3000, size 32768k
> Dec 11 15:56:00 localhost kernel: sisfb: MMIO at 0xdfee0000, mapped to
> 0xd08a4000, size 128k
> Dec 11 15:56:00 localhost kernel: sisfb: mode is 1024x768x16,
> linelength=2048
> Dec 11 15:56:00 localhost kernel: Unable to handle kernel NULL pointer
> dereference at virtual address 00000066
> Dec 11 15:56:00 localhost kernel:  printing eip:
> Dec 11 15:56:00 localhost kernel: ce89215e
> Dec 11 15:56:00 localhost kernel: *pde = 00000000
> Dec 11 15:56:00 localhost kernel: Oops: 0000
> Dec 11 15:56:00 localhost kernel: CPU:    0
> Dec 11 15:56:00 localhost kernel: EIP:    0010:[<ce89215e>]    Not tainted
> Dec 11 15:56:00 localhost kernel: EFLAGS: 00010206
> Dec 11 15:56:00 localhost kernel: eax: 00000066   ebx: 00000001
> ecx: 0000000c   edx: 00000006
> Dec 11 15:56:00 localhost kernel: esi: 00000001   edi: 00000000
> ebp: 00000016   esp: cb8d7e64
> Dec 11 15:56:01 localhost kernel: ds: 0018   es: 0018   ss: 0018
> Dec 11 15:56:01 localhost kernel: Process insmod (pid: 1089,
> stackpage=cb8d7000)
> Dec 11 15:56:01 localhost kernel: Stack: 0000acd4 00000011 0000000c
> 0000acd4 00000011 00000a3d 00010003 0000004a
> Dec 11 15:56:01 localhost kernel:        00060001 00000014 00000000
> 0000004a ce89d4a0 ce89185d 00000000 0000004a
> Dec 11 15:56:01 localhost kernel:        00000016 00000014 0000acc2
> 000000ef 00000016 0000acb0 0000004a 00000000
> Dec 11 15:56:01 localhost kernel: Call Trace: [<ce89d4a0>] [<ce89185d>]
> [<ce89d4a0>] [<ce8916e7>] [<ce89d4a0>]
> Dec 11 15:56:01 localhost kernel:    [<ce89021b>] [<ce89d4a0>]
> [<ce89d180>] [<ce890361>] [<c0116035>] [<ce88d060>]
> Dec 11 15:56:01 localhost kernel:    [<c0106ceb>]
> Dec 11 15:56:01 localhost kernel:
> Dec 11 15:56:01 localhost kernel: Code: 0f b6 04 07 50 0f b7 05 bc 10 8a 
> ce 6a 00 50 e8 de 0f 00 00
> 

You need to run this oops through the ksymoops utility.  Make sure that 
the System.map that is used corresponds to the System.map of the kernel 
that oopsed.  It will decode the 'Call Trace' portion into functions and 
offsets.


David

-- 
/==============================\
| David Mansfield              |
| [EMAIL PROTECTED]             |
\==============================/

_______________________________________________
Xpert mailing list
[EMAIL PROTECTED]
http://XFree86.Org/mailman/listinfo/xpert

Reply via email to