SHARE
TWEET

Oops LXDE Raspberry Pi (Logout Action)

clickykbd Jul 6th, 2012 32 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. [  235.030033] kernel BUG at drivers/video/bcm2708_fb.c:251!
  3. [  235.055009] Unable to handle kernel NULL pointer dereference at virtual address 00000000
  4. [  235.063183] pgd = c94ec000
  5. [  235.074978] [00000000] *pgd=00000000
  6. [  235.078660] Internal error: Oops: 805 [#1] PREEMPT
  7.  
  8. Entering kdb (current=0xcac212e0, pid 2046) Oops: (null)
  9. due to oops @ 0xc0012150
  10.  
  11. Pid: 2046, comm:                 Xorg
  12. CPU: 0    Tainted: G        W    (3.1.9+ #149)
  13. PC is at __bug+0x2c/0x38
  14. LR is at __schedule+0x320/0x670
  15. pc : [<c0012150>]    lr : [<c03fcb50>]    psr: 60000113
  16. sp : caf81b10  ip : c05ca008  fp : caf81b1c
  17. r10: 000005a0  r9 : cb8e5424  r8 : 00000010
  18. r7 : caf81b3c  r6 : 00000000  r5 : ffdff000  r4 : cb8e5400
  19. r3 : 00000000  r2 : 0942b081  r1 : 00000000  r0 : 00000043
  20. Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment user
  21. Control: 00c5387d  Table: 094ec008  DAC: 00000015
  22. [<c000f804>] (show_regs+0x0/0x58) from [<c0083554>] (kdb_dumpregs+0x38/0x60)
  23.  r4:c0630af8 r3:00000001
  24. [<c008351c>] (kdb_dumpregs+0x0/0x60) from [<c00862c4>] (kdb_main_loop+0x56c/0x7ac)
  25.  r6:00000005 r5:caf81ac8 r4:c0630d04 r3:0942b081
  26. [<c0085d58>] (kdb_main_loop+0x0/0x7ac) from [<c0088c78>] (kdb_stub+0x280/0x3f8)
  27. [<c00889f8>] (kdb_stub+0x0/0x3f8) from [<c007f1bc>] (kgdb_handle_exception+0x154/0x6bc)
  28. [<c007f068>] (kgdb_handle_exception+0x0/0x6bc) from [<c0014a20>] (kgdb_notify+0x3c/0x74)
  29. [<c00149e4>] (kgdb_notify+0x0/0x74) from [<c0401820>] (notifier_call_chain+0x54/0x94)
  30.  r6:00000000 r5:00000000 r4:fffffffc r3:c00149e4
  31. [<c04017cc>] (notifier_call_chain+0x0/0x94) from [<c04018ac>] (__atomic_notifier_call_chain+0x4c/0x84)
  32.  r8:cac212e0 r7:00000001 r6:caf8188c r5:ffffffff r4:c061c1f8
  33. r3:ffffffffmore>
  34. [<c0401860>] (__atomic_notifier_call_chain+0x0/0x84) from [<c040190c>] (atomic_notifier_call_chain+0x28/0x30)
  35.  r7:00000805 r6:c04d5904 r5:caf81ac8 r4:caf80000
  36. [<c04018e4>] (atomic_notifier_call_chain+0x0/0x30) from [<c0401954>] (notify_die+0x40/0x4c)
  37. [<c0401914>] (notify_die+0x0/0x4c) from [<c0012570>] (die+0xb8/0x388)
  38. [<c00124b8>] (die+0x0/0x388) from [<c0019054>] (__do_kernel_fault+0x74/0x94)
  39. [<c0018fe0>] (__do_kernel_fault+0x0/0x94) from [<c040134c>] (do_page_fault+0x80/0x3ac)
  40.  r8:c94bf7b0 r7:00000805 r6:00000000 r5:cac860c0 r4:caf81ac8
  41. r3:caf81ac8more>
  42. [<c04012cc>] (do_page_fault+0x0/0x3ac) from [<c0401724>] (do_translation_fault+0xac/0xb4)
  43. [<c0401678>] (do_translation_fault+0x0/0xb4) from [<c000836c>] (do_DataAbort+0x40/0xa8)
  44.  r7:00000005 r6:c05cf8f4 r5:00000000 r4:00000805
  45. [<c000832c>] (do_DataAbort+0x0/0xa8) from [<c03ff7bc>] (__dabt_svc+0x3c/0x60)
  46. Exception stack(0xcaf81ac8 to 0xcaf81b10)
  47. 1ac0:                   00000043 00000000 0942b081 00000000 cb8e5400 ffdff000
  48. 1ae0: 00000000 caf81b3c 00000010 cb8e5424 000005a0 caf81b1c c05ca008 caf81b10
  49. 1b00: c03fcb50 c0012150 60000113 ffffffff
  50.  r8:00000010 r7:caf81afc r6:ffffffff r5:60000113 r4:c0012150
  51. [<c0012124>] (__bug+0x0/0x38) from [<c0274338>] (bcm2708_fb_set_par+0x190/0x19c)
  52. [<c02741a8>] (bcm2708_fb_set_par+0x0/0x19c) from [<c02663f8>] (fb_set_var+0x140/0x2b0)
  53. [<c02662b8>] (fb_set_var+0x0/0x2b0) from [<c026d9d0>] (fbcon_blank+0x1c0/0x290)
  54. [<c026d810>] (fbcon_blank+0x0/0x290) from [<c028d870>] (do_unblank_screen+0xa4/0x1cc)
  55. [<c028d7cc>] (do_unblank_screen+0x0/0x1cc) from [<c028511c>] (vt_ioctl+0x2008/0x204c)
  56.  r6:00000006 r5:caf87800 r4:00000000 r3:c05fa658
  57. [<c0283114>] (vt_ioctl+0x0/0x204c) from [<c02789cc>] (tty_ioctl+0x198/0xbf0)
  58. [<c0278834>] (tty_ioctl+0x0/0xbf0) from [<c01082dc>] (do_vfs_ioctl+0x8c/0x5f0)
  59. [<c0108250>] (do_vfs_ioctl+0x0/0x5f0) from [<c0108888>] (sys_ioctl+0x48/0x70)
  60. [<c0108840>] (sys_ioctl+0x0/0x70) from [<c000e140>] (ret_fast_syscall+0x0/0x48)
  61.  r7:00000036 r6:401ee000 r5:00000000 r4:401f2320
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top