[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Oops: bitten by watchdog

Title: Message
You need to run this through ksymoops to make any sense for us.
If you have ksymoops-cris in tools/build/bin you can run that from the top level directory
and copy-paste the output from Oops. Otherwise you can run
ksymoops -v os/linux/vmlinux -K -L -O -m os/linux/System.map
and copy-paste the oops.
-----Original Message-----
From: owner-dev-etrax@xxxxxxx.com] On Behalf Of Cedric Stevens
Sent: Friday, December 19, 2003 7:36 AM
To: dev-etrax
Subject: Oops: bitten by watchdog

Can anybody please shed some light on the Axis Watchdog. When accessing port ttyS1 the devboard82 Panics as follows:
Oops: bitten by watchdog
IRP: c0083b9e SRP: c0083b90 DCCR: 00000400 USP: 9ffffc40 MOF: ffffee3c
 r0: c010d788  r1: c010d7be   r2: c010d7bd  r3: c0c301a8
 r4: c010d7b4  r5: c0cc1960   r6: c0c36a40  r7: c0c36a58
 r8: c0be911e  r9: 00000004  r10: c010d788 r11: 00000000
r12: c0100f80 r13: b00001f0 oR10: c010d788
R_MMU_CAUSE: 35579029
Process testport (pid: 233, stackpage=c0e78000)
Stack from 9ffffc40:
       355677c0 0000000b 00000000 9ffffcd8 00000080 0008180c 00091948 0009194c
       0008c7c8 0000000e 00000000 0000000e 00000010 3555e292 000860fe 00000000
       00000015 9ffffdd8 9ffffd58 9ffffcd8 00086186 00000000 00000000 00000000
Call Trace:
Stack from c0e79de8:
       c0008532 c0e79e64 c005b912 c005ba70 00000000 ffffee3c c010d7b4 c0c301a8
       c010d7bd c010d7be c0e79e20 c005baf0 c010d788 c005b7b4 00000000 c010d788
       b00001f0 c0100f80 00000000 c010d788 00000004 c0be911e c0c36a58 c0c36a40
Call Trace: [<c0008532>] [<c005b912>] [<c005ba70>] [<c005baf0>] [<c005b7b4>] [<c
0083b90>] [<c0083b9e>]
       [<c0083af6>] [<c008543e>] [<c005ffa2>] [<c0028746>] [<c0020758>] [<c001f6
ca>] [<c001f600>] [<c001f8d2>]
Code: 69 9a 44 d2 c9 db 14 01 6d da 4d 9a (07) 93 cf 9e 04 00 f7 30 0f 05 0c 01
Do I have a conflict in hardware?