From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262373AbTGFPZ4 (ORCPT ); Sun, 6 Jul 2003 11:25:56 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262385AbTGFPZ4 (ORCPT ); Sun, 6 Jul 2003 11:25:56 -0400 Received: from franka.aracnet.com ([216.99.193.44]:36754 "EHLO franka.aracnet.com") by vger.kernel.org with ESMTP id S262373AbTGFPZn (ORCPT ); Sun, 6 Jul 2003 11:25:43 -0400 Date: Sun, 06 Jul 2003 08:40:03 -0700 From: "Martin J. Bligh" To: linux-kernel Subject: [Bugme-new] [Bug 879] New: radeon fbdev oopses when watching a picture on the console with fbi Message-ID: <26120000.1057506003@[10.10.2.4]> X-Mailer: Mulberry/2.2.1 (Linux/x86) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org http://bugme.osdl.org/show_bug.cgi?id=879 Summary: radeon fbdev oopses when watching a picture on the console with fbi Kernel Version: 2.5.74-bk3 Status: NEW Severity: normal Owner: jsimmons@infradead.org Submitter: jmm@informatik.uni-bremen.de Distribution: Debian testing Hardware Environment: ATI Technologies Inc Radeon RV200 QW [Radeon 7500] (prog-if 00 [VGA]) Software Environment: fbi 1.26 (http://bytesex.org/fbi.html Problem Description: Displaying arbitraty pictures on the console with fbi leads to the attached oopsen. Steps to reproduce: $ fbi picture-file printing eip: c02c0421 Oops: 0002 [#2] CPU: 0 EIP: 0060:[] Not tainted EFLAGS: 00010202 EIP is at _mmx_memcpy+0xe1/0x170 eax: 08058ee0 ebx: 00000001 ecx: 00000000 edx: 08058fe0 esi: dfe485c0 edi: 08058e20 ebp: d1613dec esp: d1613ddc ds: 007b es: 007b ss: 0068 Process fbi (pid: 512, threadinfo=d1612000 task=d5377980) Stack: 08058e20 00000200 dfe48400 08058e20 d1613e40 c0366c75 08058fe0 dfe48400 00000200 c05613e0 dec57a00 d1613e9c c035ffea dffe0000 d1613e40 00000720 0000003b 00000001 c05613e0 0000000c 00000000 00000000 dffe0000 d1613e74 Call Trace: [] fb_copy_cmap+0x305/0x510 [] fbcon_cursor+0x27a/0x390 [] fb_ioctl+0x15d/0x560 [] dput+0x24/0x200 [] in_group_p+0x27/0x30 [] vfs_permission+0x7c/0x110 [] permission+0x2c/0x50 [] cdev_get+0x52/0xb0 [] chrdev_open+0xf1/0x230 [] chrdev_open+0x0/0x230 [] dentry_open+0x140/0x210 [] filp_open+0x5b/0x60 [] sys_ioctl+0xf4/0x290 [] syscall_call+0x7/0xb Code: 0f 7f 42 20 0f 7f 4a 28 0f 7f 52 30 0f 7f 5a 38 4b 83 c2 40 <6>note: fbi[512] exited with preempt_count 2 Call Trace: [] __might_sleep+0x5f/0x80 [] clear_page_tables+0xaa/0xb0 [] remove_shared_vm_struct+0x39/0xa0 [] exit_mmap+0x12b/0x190 [] do_page_fault+0x0/0x4c7 [] mmput+0x65/0xc0 [] do_exit+0xd6/0x480 [] do_page_fault+0x0/0x4c7 [] die+0xe1/0xf0 [] do_page_fault+0x12e/0x4c7 [] accel_clear+0x73/0x80 [] do_page_fault+0x0/0x4c7 [] error_code+0x2d/0x38 [] _mmx_memcpy+0xe1/0x170 [] fb_copy_cmap+0x305/0x510 [] fbcon_cursor+0x27a/0x390 [] fb_ioctl+0x15d/0x560 [] dput+0x24/0x200 [] in_group_p+0x27/0x30 [] vfs_permission+0x7c/0x110 [] permission+0x2c/0x50 [] cdev_get+0x52/0xb0 [] chrdev_open+0xf1/0x230 [] chrdev_open+0x0/0x230 [] dentry_open+0x140/0x210 [] filp_open+0x5b/0x60 [] sys_ioctl+0xf4/0x290 [] syscall_call+0x7/0xb agpgart: Found an AGP 2.0 compliant device at 0000:00:00.0. agpgart: Putting AGP V2 device at 0000:00:00.0 into 1x mode agpgart: Putting AGP V2 device at 0000:01:00.0 into 1x mode