Hi. Well, the subject gives you the problem. I've got some more info for you as well. Below is: kernel version, lspci information, relevant bits from /var/log/messages, and the oops run through ksymoops. I was getting similar problems during shutdown if the PCMCIA system shutdown before the USB system. I *suspect* it's a bug somewhere in the USB code, but have CC'd this message to the kind PCMCIA folks as well just in case)
If there's anything else you need, just ask (but I'm not a member of this list, so perhaps email me directly. I'll post any reply to the list) Also, the USB card works perfectly under Linux (except for ejecting it), so many thanks for that :) -- Kernel Version-- 2.4.21 with ACPI Patch --LSPCI information-- 06:00.0 USB Controller: NEC Corporation USB (rev 41) (prog-if 10 [OHCI]) Subsystem: NetMos Technology: Unknown device 0035 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- Status: Cap+ 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- Latency: 64 (250ns min, 10500ns max) Interrupt: pin A routed to IRQ 9 Region 0: Memory at 11000000 (32-bit, non-prefetchable) [size=4K] Capabilities: [40] Power Management version 2 Flags: PMEClk- DSI- D1+ D2+ AuxCurrent=0mA PME(D0+,D1+,D2+,D3hot+,D3cold-) Status: D0 PME-Enable- DSel=0 DScale=0 PME- 06:00.1 USB Controller: NEC Corporation USB (rev 41) (prog-if 10 [OHCI]) Subsystem: NetMos Technology: Unknown device 0035 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- Status: Cap+ 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- Latency: 64 (250ns min, 10500ns max) Interrupt: pin B routed to IRQ 9 Region 0: Memory at 11001000 (32-bit, non-prefetchable) [size=4K] Capabilities: [40] Power Management version 2 Flags: PMEClk- DSI- D1+ D2+ AuxCurrent=0mA PME(D0+,D1+,D2+,D3hot+,D3cold-) Status: D0 PME-Enable- DSel=0 DScale=0 PME- 06:00.2 USB Controller: NEC Corporation USB 2.0 (rev 02) (prog-if 20 [EHCI]) Subsystem: NetMos Technology: Unknown device 1906 Control: I/O- Mem+ BusMaster+ SpecCycle- MemWINV+ VGASnoop- ParErr- Stepping- SERR- FastB2B- Status: Cap+ 66Mhz- UDF- FastB2B- ParErr- DEVSEL=medium >TAbort- <TAbort- <MAbort- >SERR- <PERR- Latency: 68 (4000ns min, 8500ns max), cache line size 08 Interrupt: pin C routed to IRQ 9 Region 0: Memory at 11002000 (32-bit, non-prefetchable) [size=256] Capabilities: [40] Power Management version 2 Flags: PMEClk- DSI- D1+ D2+ AuxCurrent=0mA PME(D0+,D1+,D2+,D3hot+,D3cold-) Status: D0 PME-Enable- DSel=0 DScale=0 PME- --/var/log/messages bit-- Oct 13 11:57:43 tnw13_l kernel: usb.c: USB disconnect on device 06:00.0-0 address 1 Oct 13 11:57:43 tnw13_l kernel: usb.c: USB bus 3 deregistered Oct 13 11:57:43 tnw13_l kernel: usb.c: USB disconnect on device 06:00.1-0 address 1 Oct 13 11:57:43 tnw13_l kernel: usb.c: USB bus 4 deregistered Oct 13 11:57:43 tnw13_l kernel: ehci-hcd 06:00.2: remove state 0 Oct 13 11:57:43 tnw13_l kernel: usb.c: USB disconnect on device 06:00.2-0 address 1 Oct 13 11:57:43 tnw13_l kernel: usb.c: USB bus 2 deregistered Oct 13 11:57:44 tnw13_l kernel: cs: cb_free(bus 6) Oct 13 11:57:44 tnw13_l kernel: printing eip: Oct 13 11:57:44 tnw13_l kernel: d0d1312d Oct 13 11:57:44 tnw13_l kernel: Oops: 0000 Oct 13 11:57:44 tnw13_l kernel: CPU: 0 Oct 13 11:57:44 tnw13_l kernel: EIP: 0010:[<d0d1312d>] Not tainted Oct 13 11:57:44 tnw13_l kernel: EFLAGS: 00010282 Oct 13 11:57:44 tnw13_l kernel: eax: 00000000 ebx: cddb9800 ecx: cddb9800 edx: d0d02020 Oct 13 11:57:44 tnw13_l kernel: esi: cddb9864 edi: 00000000 ebp: c12ea000 esp: c12ebeb0 Oct 13 11:57:44 tnw13_l kernel: ds: 0018 es: 0018 ss: 0018 Oct 13 11:57:44 tnw13_l kernel: Process keventd (pid: 2, stackpage=c12eb000) Oct 13 11:57:44 tnw13_l kernel: Stack: c02c3df9 00000013 00002d59 00000046 c0265018 c12ebed0 00000046 ce4cbf7c Oct 13 11:57:44 tnw13_l kernel: c12ebef4 00000286 ce4ca000 00000000 00000001 00000286 c02c0c96 00000246 Oct 13 11:57:44 tnw13_l kernel: 00000016 cc5d4800 c011a670 0000000a 00000400 d0cf1804 00000246 cddb9800 Oct 13 11:57:44 tnw13_l kernel: Call Trace: [<c011a670>] [<d0cf1804>] [<d0d16786>] [<d0cf0a09>] [<d0cf17ed>] Oct 13 11:57:44 tnw13_l kernel: [<d0cecc7f>] [<d0ced11d>] [<d0ca3450>] [<c011ef7a>] [<d0cf7604>] [<c01273ea>] Oct 13 11:57:44 tnw13_l kernel: [<c0127230>] [<c0105000>] [<c01057de>] [<c0127230>] Oct 13 11:57:44 tnw13_l kernel: Oct 13 11:57:44 tnw13_l kernel: Code: 8b 02 83 c8 02 89 02 31 c0 89 81 00 01 00 00 c7 44 24 0c 90 --ksymoops output (I have no System.map. Sorry)-- ksymoops 2.4.9 on i686 2.4.21. Options used -V (default) -k /proc/ksyms (default) -l /proc/modules (default) -o /lib/modules/2.4.21/ (default) -m /boot/System.map-2.4.21 (default) Warning: You did not tell me where to find symbol information. I will assume that the log matches the kernel and modules that are running right now and I'll use the default options above for symbol resolution. If the current kernel and/or modules do not match the log, you can get more accurate output by telling me the kernel version and where to find map, modules, ksyms etc. ksymoops -h explains the options. Error (regular_file): read_system_map stat /boot/System.map-2.4.21 failed Oops: 0000 CPU: 0 EIP: 0010:[<d0d1312d>] Not tainted Using defaults from ksymoops -t elf32-i386 -a i386 EFLAGS: 00010282 eax: 00000000 ebx: cddb9800 ecx: cddb9800 edx: d0d02020 esi: cddb9864 edi: 00000000 ebp: c12ea000 esp: c12ebeb0 ds: 0018 es: 0018 ss: 0018 Process keventd (pid: 2, stackpage=c12eb000) Stack: c02c3df9 00000013 00002d59 00000046 c0265018 c12ebed0 00000046 ce4cbf7c c12ebef4 00000286 ce4ca000 00000000 00000001 00000286 c02c0c96 00000246 00000016 cc5d4800 c011a670 0000000a 00000400 d0cf1804 00000246 cddb9800 Call Trace: [<c011a670>] [<d0cf1804>] [<d0d16786>] [<d0cf0a09>] [<d0cf17ed>] [<d0cecc7f>] [<d0ced11d>] [<d0ca3450>] [<c011ef7a>] [<d0cf7604>] [<c01273ea>] [<c0127230>] [<c0105000>] [<c01057de>] [<c0127230>] Code: 8b 02 83 c8 02 89 02 31 c0 89 81 00 01 00 00 c7 44 24 0c 90 >>EIP; d0d1312d <[usb-ohci]ohci_mem_cleanup+1d/60> <===== >>ebx; cddb9800 <___strtok+dacd2f0/105e4b50> >>ecx; cddb9800 <___strtok+dacd2f0/105e4b50> >>edx; d0d02020 <[ds].data.end+34b9/c4f9> >>esi; cddb9864 <___strtok+dacd354/105e4b50> >>ebp; c12ea000 <___strtok+ffdaf0/105e4b50> >>esp; c12ebeb0 <___strtok+fff9a0/105e4b50> Trace; c011a670 <printk+110/140> Trace; d0cf1804 <[pcmcia_core]__kstrtab_pcmcia_resume_socket+2e4/1440> Trace; d0d16786 <[usb-ohci]hc_release_ohci+d6/f0> Trace; d0cf0a09 <[pcmcia_core]cb_free+69/80> Trace; d0cf17ed <[pcmcia_core]__kstrtab_pcmcia_resume_socket+2cd/1440> Trace; d0cecc7f <[pcmcia_core]shutdown_socket+af/100> Trace; d0ced11d <[pcmcia_core]parse_events+dd/140> Trace; d0ca3450 <[usbcore]hcd_panic+10/20> Trace; c011ef7a <__run_task_queue+5a/130> Trace; d0cf7604 <[yenta_socket].data.end+d5/5b31> Trace; c01273ea <schedule_task+22a/230> Trace; c0127230 <schedule_task+70/230> Trace; c0105000 <empty_zero_page+1000/13a0> Trace; c01057de <machine_power_off+1fe/410> Trace; c0127230 <schedule_task+70/230> Code; d0d1312d <[usb-ohci]ohci_mem_cleanup+1d/60> 00000000 <_EIP>: Code; d0d1312d <[usb-ohci]ohci_mem_cleanup+1d/60> <===== 0: 8b 02 mov (%edx),%eax <===== Code; d0d1312f <[usb-ohci]ohci_mem_cleanup+1f/60> 2: 83 c8 02 or $0x2,%eax Code; d0d13132 <[usb-ohci]ohci_mem_cleanup+22/60> 5: 89 02 mov %eax,(%edx) Code; d0d13134 <[usb-ohci]ohci_mem_cleanup+24/60> 7: 31 c0 xor %eax,%eax Code; d0d13136 <[usb-ohci]ohci_mem_cleanup+26/60> 9: 89 81 00 01 00 00 mov %eax,0x100(%ecx) Code; d0d1313c <[usb-ohci]ohci_mem_cleanup+2c/60> f: c7 44 24 0c 90 00 00 movl $0x90,0xc(%esp,1) Code; d0d13143 <[usb-ohci]ohci_mem_cleanup+33/60> 16: 00 1 warning and 1 error issued. Results may not be reliable. -- Tim Wright Assistant Lecturer Department of Computer Science University of Canterbury "Language, like terrorism, targets civilians and generates fear to effect political change." -- "Collateral Language" John Collins and Ross Glover ed.
signature.asc
Description: This is a digitally signed message part