On Tue, 2011-03-29 at 13:10 +0200, Takashi Iwai wrote:
At Tue, 29 Mar 2011 12:58:16 +0200, Svante Signell wrote:
On Tue, 2011-03-29 at 12:31 +0200, Takashi Iwai wrote:
At Tue, 29 Mar 2011 12:24:40 +0200, Svante Signell wrote:
...
But let's check the Oops first as below.
Also, please try to decode the line from the code shown in the Oops. It's a bit too little information to analyze, unfortunately.
...
As mentioned, you can decode the binary dump in Oops to guess which line of the source code corresponds to the Oops point. Use gdb or objdump to figure out the disassembled code. For example,
% objdump -D -l /lib/modules/$(uname -r)/kernel/sound/pci/hda/snd-hda-intel.ko
Then look for azx_probe. Calculate the position from the offset Oops gave, compare the hex codes with the data show in "Code" section of Oops. objdump with -l will show the source code line as well, so you'll see now more exactly where it was triggered.
Below is the kernel Oops and the objdump output related to azx_probe. Unfortunately I don't know where to find the Oops offset!
Kernel Oops when booting: ========================= [ 4.631033] Oops: 0009 [#1] SMP [ 4.631187] last sysfs file: /sys/devices/virtual/net/lo/operstate [ 4.631243] CPU 0 [ 4.631293] Modules linked in: snd_hda_intel(+) snd_hda_codec tpm_tis tpm pcspkr snd_hwdep tpm_bios shpchp(+) pci_hotplug k8temp nouveau(+) snd_pcm ttm drm_kms_helper drm parport_pc i2c_viapro i2c_algo_bit usblp power_supply i2c_core parport edac_core video edac_mce_amd processor psmouse evdev serio_raw button snd_seq snd_timer snd_seq_device snd soundcore snd_page_alloc thermal_sys ext3 jbd mbcache sg sr_mod cdrom usbhid sd_mod crc_t10dif ata_generic hid sata_via uhci_hcd pata_via libata ehci_hcd usbcore scsi_mod via_rhine floppy mii nls_base [last unloaded: scsi_wait_scan] [ 4.632005] [ 4.632005] Pid: 632, comm: work_for_cpu Not tainted 2.6.38-1-amd64 #1 MICRO-STAR INTERNATIONAL CO., LTD MS-7253/MS-7253 [ 4.632005] RIP: 0010:[<ffffffffa061f416>] [<ffffffffa061f416>] azx_probe+0x3ad/0x870 [snd_hda_intel] [ 4.632005] RSP: 0018:ffff88007c05be50 EFLAGS: 00010286 [ 4.632005] RAX: ffffc90013c98000 RBX: ffff880036de6000 RCX: 0000000000000006 [ 4.632005] RDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246 [ 4.632005] RBP: ffff88007c93d000 R08: 0000000000000000 R09: 0000000000000040 [ 4.632005] R10: 0000000000000286 R11: 000000000000a971 R12: ffff880036de5c00 [ 4.632005] R13: 0000000000000000 R14: 0000000000000000 R15: ffff88007c93d090 [ 4.632005] FS: 00007f1cd2afb7a0(0000) GS:ffff88007fc00000(0000) knlGS:0000000000000000 [ 4.632005] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 4.632005] CR2: ffffc90013c98000 CR3: 000000007c00f000 CR4: 00000000000006f0 [ 4.632005] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 4.632005] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 4.632005] Process work_for_cpu (pid: 632, threadinfo ffff88007c05a000, task ffff88003713a880) [ 4.632005] Stack: [ 4.632005] 0000000000000005 ffffffff81240724 0000000000000001 ffff880036de5c00 [ 4.632005] 0000000000013700 ffff88007c93d000 ffff88007c93d090 ffff88007a7c7dc8 [ 4.632005] ffff88007c93d200 0000000000000000 0000000000000000 ffffffff811b1a42 [ 4.632005] Call Trace: [ 4.632005] [<ffffffff81240724>] ? __pm_runtime_set_status +0x162/0x186 [ 4.632005] [<ffffffff811b1a42>] ? local_pci_probe+0x49/0x92 [ 4.632005] [<ffffffff8105aad2>] ? do_work_for_cpu+0x0/0x1b [ 4.632005] [<ffffffff8105aad2>] ? do_work_for_cpu+0x0/0x1b [ 4.632005] [<ffffffff8105aadd>] ? do_work_for_cpu+0xb/0x1b [ 4.632005] [<ffffffff8105fcdf>] ? kthread+0x7a/0x82 [ 4.632005] [<ffffffff8100a764>] ? kernel_thread_helper+0x4/0x10 [ 4.632005] [<ffffffff8105fc65>] ? kthread+0x0/0x82 [ 4.632005] [<ffffffff8100a760>] ? kernel_thread_helper+0x0/0x10 [ 4.632005] Code: f4 01 00 00 ef 31 f6 48 89 df e8 15 dd ff ff 85 c0 0f 88 2b 03 00 00 48 89 ef e8 ee 11 b9 e0 8b 7b 40 e8 9f 25 a7 e0 48 8b 43 38 <66> 8b 10 66 89 14 24 8b 43 14 83 e8 03 83 f8 01 77 32 31 d2 be [ 4.632005] RIP [<ffffffffa061f416>] azx_probe+0x3ad/0x870 [snd_hda_intel] [ 4.632005] RSP <ffff88007c05be50> [ 4.632005] CR2: ffffc90013c98000 [ 4.632005] ---[ end trace c6748815fe9ff43b ]---
objdump -D -l /lib/modules/$(uname -r)/kernel/sound/pci/hda/snd-hda-intel.ko
/lib/modules/2.6.38-1-amd64/kernel/sound/pci/hda/snd-hda-intel.ko: file format elf64-x86-64
00000000000001fd <azx_probe>: azx_probe():
(see attachment)