[ale] Something blew up -- but what
Sean Kilpatrick
kilpatms at gmail.com
Sat Nov 17 17:35:48 EST 2012
One sure fire way to guarantee confusion is to change two things at the
same time. I'm supposed to know better! :(
This mobo has two pair of memory slots. First slot in each pair had a 1
gig memory module. Today I added more memory and now the first slot of each
pair has a 2 gig module and the second slots each have the older 1 gig
module.
Computer (FC-13) booted just fine. Recognized the new memory.
Also replaced an aging CRT with a new monitor (Asus PA248) w/ 1920/1200
resolution. Vast improvement.
Then I am enjoying the new monitor by viewing scenic vistas I shot this
summer when the keyboard & mouse lock up completely. Have to hit the
power button on the box -- which I know is not a good thing to do.
Below is the appropriate section from /var/log/messages.
Can anyone shed any light on what might have caused the keyboard/mouse to
lockup? I'd guess it's video related, but that's just a guess.
Sean
----------------------------------------------------------------------------------------------------------------
Nov 17 17:12:15 Sarge kernel: ------------[ cut here ]------------
Nov 17 17:12:15 Sarge kernel: kernel BUG at
drivers/gpu/drm/ttm/ttm_bo.c:271!
Nov 17 17:12:15 Sarge kernel: invalid opcode: 0000 [#1] SMP
Nov 17 17:12:15 Sarge kernel: last sysfs file:
/sys/devices/pci0000:00/0000:00:10.0/0000:04:08.0/local_cpus
Nov 17 17:12:15 Sarge kernel: CPU 1
Nov 17 17:12:15 Sarge kernel: Modules linked in: tcp_lp fuse deflate
zlib_deflate ctr camellia cast5 rmd160 crypto_null ccm serpent blowfish
twofish_x86_64 twofish_common ecb xcbc cbc sha256_generic sha512_generic
des_generic ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4
xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport xfrm6_mode_ro
xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6 xfrm_ipcomp xfrm6_tunnel
tunnel6 af_key sunrpc tun cpufreq_ondemand powernow_k8 freq_table
ip6t_REJECT nf_conntrack_ipv6 ip6table_filter ip6_tables ipv6 uinput
snd_hda_codec_analog snd_hda_intel snd_hda_codec snd_hwdep snd_seq
snd_seq_device snd_pcm snd_timer tulip snd ppdev i2c_nforce2 parport_pc
soundcore snd_page_alloc parport edac_core edac_mce_amd k8temp
asus_atk0110 microcode aes_x86_64 aes_generic xts gf128mul dm_crypt raid1
firewire_ohci ata_generic firewire_core crc_itu_t pata_amd pata_acpi sata_nv
nouveau ttm drm_kms_helper drm i2c_algo_bit video output i2c_core [last
unloaded: scsi_wait_scan]
Nov 17 17:12:15 Sarge kernel:
Nov 17 17:12:15 Sarge kernel: Pid: 2112, comm: Xorg Not tainted
2.6.34.9-69.fc13.x86_64 #1 M2NPV-VM/System Product Name
Nov 17 17:12:15 Sarge kernel: RIP: 0010:[<ffffffffa0074739>] [<ffffffffa0074739>]
ttm_bo_ref_bug+0x9/0xd [ttm]
Nov 17 17:12:15 Sarge kernel: RSP: 0018:ffff8801a593dba8 EFLAGS: 00010202
Nov 17 17:12:15 Sarge kernel: RAX: 0000000000000000 RBX: ffff88015a584844
RCX: ffff8801a593db58
Nov 17 17:12:15 Sarge kernel: RDX: ffff88017da42a01 RSI: 0000000000000041
RDI: ffff88015a584844
Nov 17 17:12:15 Sarge kernel: RBP: ffff8801a593dba8 R08: ffff88017da42250 R09:
0000000040086409
Nov 17 17:12:15 Sarge kernel: R10: 0000000000000000 R11: 0000000000003246
R12: ffffffffa0074730
Nov 17 17:12:15 Sarge kernel: R13: 0000000000000000 R14: 0000000000000000
R15: 00000000a593dd01
Nov 17 17:12:15 Sarge kernel: FS: 00007ffc8d5dc840(0000)
GS:ffff880002100000(0000) knlGS:0000000000000000
Nov 17 17:12:15 Sarge kernel: CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
Nov 17 17:12:15 Sarge kernel: CR2: 00000000071ea000 CR3: 00000001a5954000
CR4: 00000000000006e0
Nov 17 17:12:15 Sarge kernel: DR0: 0000000000000000 DR1: 0000000000000000
DR2: 0000000000000000
Nov 17 17:12:15 Sarge kernel: DR3: 0000000000000000 DR6: 00000000ffff0ff0
DR7: 0000000000000400
Nov 17 17:12:15 Sarge kernel: Process Xorg (pid: 2112, threadinfo
ffff8801a593c000, task ffff8801a500c650)
Nov 17 17:12:15 Sarge kernel: Stack:
Nov 17 17:12:15 Sarge kernel: ffff8801a593dbc8 ffffffff8120ee41 ffff88015a584844
ffff8801a51d4f00
Nov 17 17:12:15 Sarge kernel: <0> ffff8801a593dc18 ffffffffa00756c1
ffff880159a446c0 ffff880159a44de0
Nov 17 17:12:15 Sarge kernel: <0> ffff8801a593dc18 ffff88015a584800
ffff8801a4800108 ffff8801a48000e8
Nov 17 17:12:15 Sarge kernel: Call Trace:
Nov 17 17:12:15 Sarge kernel: [<ffffffff8120ee41>] kref_put+0x43/0x4d
Nov 17 17:12:15 Sarge kernel: [<ffffffffa00756c1>]
ttm_bo_cleanup_refs+0x176/0x229 [ttm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa0077085>] ttm_bo_release+0x65/0x86
[ttm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa0077020>] ? ttm_bo_release+0x0/0x86
[ttm]
Nov 17 17:12:15 Sarge kernel: [<ffffffff8120ee41>] kref_put+0x43/0x4d
Nov 17 17:12:15 Sarge kernel: [<ffffffffa0074fbc>] ttm_bo_unref+0x35/0x42
[ttm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa0096d48>]
nouveau_gem_object_del+0x6b/0x82 [nouveau]
Nov 17 17:12:15 Sarge kernel: [<ffffffff8111c8ab>] ? pollwake+0x0/0x54
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002d8fe>] ?
drm_gem_object_free+0x0/0x2f [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002d92b>]
drm_gem_object_free+0x2d/0x2f [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffff8120ee41>] kref_put+0x43/0x4d
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002d830>]
drm_gem_object_unreference_unlocked+0x33/0x40 [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002d882>]
drm_gem_object_handle_unreference_unlocked+0x2e/0x32 [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002da22>]
drm_gem_close_ioctl+0x6d/0x78 [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002c5f6>] drm_ioctl+0x26c/0x36a [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffffa002d9b5>] ?
drm_gem_close_ioctl+0x0/0x78 [drm]
Nov 17 17:12:15 Sarge kernel: [<ffffffff8110df6b>] ? do_sync_read+0xcb/0x108
Nov 17 17:12:15 Sarge kernel: [<ffffffff8111aec7>] vfs_ioctl+0x32/0xa6
Nov 17 17:12:15 Sarge kernel: [<ffffffff8111b43a>] do_vfs_ioctl+0x483/0x4c9
Nov 17 17:12:15 Sarge kernel: [<ffffffff8110dbcb>] ? fsnotify_access+0x6c/0x74
Nov 17 17:12:15 Sarge kernel: [<ffffffff8111b4d6>] sys_ioctl+0x56/0x79
Nov 17 17:12:15 Sarge kernel: [<ffffffff81009c72>]
system_call_fastpath+0x16/0x1b
Nov 17 17:12:15 Sarge kernel: Code: a7 75 3d e1 eb 07 c7 43 5c 02 00 00 00
48 83 c4 28 4c 89 f0 5b 41 5c 41 5d 41 5e 41 5f c9 c3 90 90 90 55 48 89 e5
0f 1f 44 00 00 <0f> 0b eb fe 55 48 89 e5 0f 1f 44 00 00 8b 4e 1c 89 c8 48
6b c0
Nov 17 17:12:15 Sarge kernel: RIP [<ffffffffa0074739>] ttm_bo_ref_bug+0x9/0xd
[ttm]
Nov 17 17:12:15 Sarge kernel: RSP <ffff8801a593dba8>
Nov 17 17:12:15 Sarge kernel: ---[ end trace aea371318cc5bb47 ]---
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20121117/88659b5b/attachment.html>
More information about the Ale
mailing list