The framebuffer device was opened successfully etrackfb type 0x0 visua

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
The framebuffer device was opened successfully.
etrackfb
type:0x0
visual:1
line_length:75
kernel BUG at lib/radix-tree.c:474!
Unable to handle kernel NULL pointer dereference at virtual address 00000000
pgd = c3ee4000
[00000000] *pgd=0beff031, *pte=00000000, *ppte=00000000
Internal error: Oops: 817 [#12] PREEMPT
Modules linked in: etrackfb_new sony_prs_505
CPU: 0 Tainted: G D W (2.6.26-rc9-00055-g9baf245-dirty #3)
pc : [<c0021328>] lr : [<c003af50>] psr: 40000093
sp : c3edfd88 ip : c3edfcec fp : c3edfd94
r10: 0000000c r9 : 00000000 r8 : 00000000
r7 : c3811290 r6 : c3811294 r5 : 00000000 r4 : 00000000
r3 : 00000000 r2 : c3ede000 r1 : 80000093 r0 : 00000027
Flags: nZcv IRQs off FIQs on Mode SVC_32 ISA ARM Segment user
Control: c000717f Table: 0bee4000 DAC: 00000015
Process framebuff.ko (pid: 241, stack limit = 0xc3ede260)
Stack: (0xc3edfd88 to 0xc3ee0000)
fd80: c3edfdc4 c3edfd98 c0116574 c0021318 c3d03594 00000000
fda0: c022e3a8 c02d7740 c3811290 00000000 c3d2dc00 40141000 c3edfde4 c3edfdc8
fdc0: c00b02d4 c01164cc c02d7740 c3811290 c02d7740 c3d03594 c3edfdfc c3edfde8
fde0: c00b057c c00b0154 c02d7740 00000001 c3edfe14 c3edfe00 c006a020 c00b04a8
fe00: c02d7740 00000001 c3edfe2c c3edfe18 c006aba8 c0069fe4 0bd3a0ff c02d7740
fe20: c3edfe78 c3edfe30 c0071dc8 c006aba0 c3ee5000 00000001 00000000 00000001
fe40: 00000001 0000000c 40141000 c02d7740 c3d59800 00001000 00000000 c3d59d04
fe60: c3d03594 c3ee4000 40141000 c3edfecc c3edfe7c c0073608 c0071a20 0000000c
fe80: 00000001 00000000 00000800 c3d2dc00 c3edfecc 00000504 c3ee5000 c3ede000
fea0: c003359c ffffffff c3d03594 c3d2ac00 c3d2dc38 c3d2dc00 c3edffb0 40141000
fec0: c3edff04 c3edfed0 c002310c c0073318 00000000 c3c59914 00000817 ffffffff
fee0: c0228630 00000817 c3edffb0 40141000 00000000 4012f000 c3edffac c3edff08
ff00: c001d218 c0023024 c023e0b0 0000000a 00000000 00000000 c3edff3c c3edff28
ff20: c012c4e8 c00343b8 00000000 c023e0b0 c3edff4c c3edff40 c0135ffc c012c4a0
ff40: c3edff60 c3edff50 c003f6f0 c003359c 00000000 c3edff7c c3edff64 c003f8d8
ff60: c003f684 c022b3b8 00000017 c024c544 c3edff8c c3edff80 c003f938 c003359c
ff80: c3edffac c3edff90 c001d048 ffffffff 0000873c 00008748 00000001 000084c0
ffa0: 00000000 c3edffb0 c001da60 c001d1ec 0000003a 00000000 40141000 00000000
ffc0: be875ed4 0000873c 00008748 00000001 000084c0 00000000 4012f000 be875ea8
ffe0: 4012f018 be875d6c 0000869c 000086b8 80000010 ffffffff ffffffff ffffffff
Backtrace:
Function entered at [<c0021308>] from [<c0116574>]
Function entered at [<c01164bc>] from [<c00b02d4>]
Function entered at [<c00b0144>] from [<c00b057c>]
r7:c3d03594 r6:c02d7740 r5:c3811290 r4:c02d7740
Function entered at [<c00b0498>] from [<c006a020>]
r5:00000001 r4:c02d7740
Function entered at [<c0069fd4>] from [<c006aba8>]
r5:00000001 r4:c02d7740
Function entered at [<c006ab90>] from [<c0071dc8>]
r5:c02d7740 r4:0bd3a0ff
Function entered at [<c0071a10>] from [<c0073608>]
Function entered at [<c0073308>] from [<c002310c>]
Function entered at [<c0023014>] from [<c001d218>]
Function entered at [<c001d1dc>] from [<c001da60>]
Exception stack(0xc3edffb0 to 0xc3edfff8)
ffa0: 0000003a 00000000 40141000 00000000
ffc0: be875ed4 0000873c 00008748 00000001 000084c0 00000000 4012f000 be875ea8
ffe0: 4012f018 be875d6c 0000869c 000086b8 80000010 ffffffff
r8:000084c0 r7:00000001 r6:00008748 r5:0000873c r4:ffffffff
Code: e1a01000 e59f000c eb00672c e3a03000 (e5833000)
smem_start:0xbe00000,smem_len:4---[ end trace 1bdcf6ed52defa19 ]---
80000
mmio_start:0x0 ,mmio_len:note: framebuff.ko[241] exited with preempt_count 1
0
600x800, 1bpp
screensize:480BUG: scheduling while atomic: framebuff.ko/241/0x40000002
000
The framebuffer device was Function entered at [<c0021334>] from [<c0033680>]
mapped to memory successfully.
Function entered at [<c0033638>] from [<c01d9dc8>]
r4:c3ede000
Function entered at [<c01d9d5c>] from [<c0033b1c>]
Function entered at [<c0033afc>] from [<c01da178>]
r4:00000001
Function entered at [<c01da138>] from [<c00745fc>]
r4:c3d2dd30
Function entered at [<c0074090>] from [<c0076564>]
Function entered at [<c00764c8>] from [<c00380c0>]
r7:c01ed4a8 r6:c3d2dc44 r5:00000000 r4:c3d2dc00
Function entered at [<c003807c>] from [<c003bf90>]
r6:c3d2ac00 r5:c3d2dc38 r4:c3d2dc00
Function entered at [<c003bea8>] from [<c003ce54>]
r6:0000000b r5:c3d2ac00 r4:c3ede000
Function entered at [<c003cc80>] from [<c00219c4>]
Function entered at [<c00217f8>] from [<c0022eb8>]
r7:00000817 r6:c3d2dc00 r5:c3edfd40 r4:00000000
Function entered at [<c0022e4c>] from [<c0023228>]
r7:c3edfd40 r6:c3d2ac00 r5:c0228630 r4:ffffffff
Function entered at [<c0023014>] from [<c001d218>]
Function entered at [<c001d1dc>] from [<c001d6a0>]
Exception stack(0xc3edfd40 to 0xc3edfd88)
fd40: 00000027 80000093 c3ede000 00000000 00000000 00000000 c3811294 c3811290
fd60: 00000000 00000000 0000000c c3edfd94 c3edfcec c3edfd88 c003af50 c0021328
fd80: 40000093 ffffffff
r8:00000000 r7:c3811290 r6:c3811294 r5:c3edfd74 r4:ffffffff
Function entered at [<c0021308>] from [<c0116574>]
Function entered at [<c01164bc>] from [<c00b02d4>]
Function entered at [<c00b0144>] from [<c00b057c>]
r7:c3d03594 r6:c02d7740 r5:c3811290 r4:c02d7740
Function entered at [<c00b0498>] from [<c006a020>]
r5:00000001 r4:c02d7740
Function entered at [<c0069fd4>] from [<c006aba8>]
r5:00000001 r4:c02d7740
Function entered at [<c006ab90>] from [<c0071dc8>]
r5:c02d7740 r4:0bd3a0ff
Function entered at [<c0071a10>] from [<c0073608>]
Function entered at [<c0073308>] from [<c002310c>]
Function entered at [<c0023014>] from [<c001d218>]
Function entered at [<c001d1dc>] from [<c001da60>]
Exception stack(0xc3edffb0 to 0xc3edfff8)
ffa0: 0000003a 00000000 40141000 00000000
ffc0: be875ed4 0000873c 00008748 00000001 000084c0 00000000 4012f000 be875ea8
ffe0: 4012f018 be875d6c 0000869c 000086b8 80000010 ffffffff
r8:000084c0 r7:00000001 r6:00008748 r5:0000873c r4:ffffffff
Segmentation fault
/ # sendpic 0
config1cmd
wait_for_rdy
wait_for_rdy
wait_for_rdy
wait_for_rdy
wait_for_rdy
init1cmd
wait_for_rdy
init2cmd
before loadwaveform
before displaycmd 0
end diplay update 0
IMR(reg_D) is 0x200
ISR(reg_D) is 0x0