Updated to the new kernel release 2.6.32-26-generic
[1285568.771462] ------------[ cut here ]------------ [1285568.771473] kernel BUG at /build/buildd/linux-2.6.32/arch/x86/xen/spinlock.c:343! [1285568.771486] invalid opcode: 0000 [#1] SMP [1285568.771500] last sysfs file: /sys/power/pm_trace [1285568.771508] CPU 0 [1285568.771517] Modules linked in: xenfs lp parport xen_netfront xen_blkfront [1285568.771554] Pid: 41, comm: xenwatch Not tainted 2.6.32-26-generic #47-Ubuntu [1285568.771567] RIP: e030:[<ffffffff8100fca4>] [<ffffffff8100fca4>] dummy_handler+0x4/0x10 [1285568.771590] RSP: e02b:ffff880003669e88 EFLAGS: 00010046 [1285568.771594] RAX: ffffffffff57b000 RBX: ffff88007fc1b060 RCX: 0000000000000000 [1285568.771600] RDX: 0000000000400200 RSI: 0000000000000000 RDI: 0000000000000001 [1285568.771605] RBP: ffff880003669e88 R08: 0000000000000000 R09: 0000000000000000 [1285568.771612] R10: ffff880003671028 R11: 0000000000012eb0 R12: 0000000000000000 [1285568.771617] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000100 [1285568.771626] FS: 00007fae6666c700(0000) GS:ffff880003666000(0000) knlGS:0000000000000000 [1285568.771632] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [1285568.771637] CR2: 0000000000000000 CR3: 000000007d7f7000 CR4: 0000000000002660 [1285568.771645] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [1285568.771653] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [1285568.771663] Process xenwatch (pid: 41, threadinfo ffff88007d50c000, task ffff88007d4cadc0) [1285568.771669] Stack: [1285568.771672] ffff880003669ed8 ffffffff810c4550 0000000000000000 0000000000000000 [1285568.771681] <0> 0000000000000000 ffffffff817b1300 0000000000000001 0000000000000000 [1285568.771690] <0> 0000000000000001 0000000000000100 ffff880003669ef8 ffffffff810c6882 [1285568.771702] Call Trace: [1285568.771705] <IRQ> [1285568.771713] [<ffffffff810c4550>] handle_IRQ_event+0x60/0x170 [1285568.771723] [<ffffffff810c6882>] handle_percpu_irq+0x42/0x80 [1285568.771734] [<ffffffff81014d12>] handle_irq+0x22/0x30 [1285568.771743] [<ffffffff8131da99>] xen_evtchn_do_upcall+0x199/0x1c0 [1285568.771749] [<ffffffff8101333e>] xen_do_hypervisor_callback+0x1e/0x30 [1285568.771754] <EOI> [1285568.771763] [<ffffffff8100922a>] ? hypercall_page+0x22a/0x1010 [1285568.771769] [<ffffffff8100922a>] ? hypercall_page+0x22a/0x1010 [1285568.771776] [<ffffffff8100eb6d>] ? xen_force_evtchn_callback+0xd/0x10 [1285568.771783] [<ffffffff8100f302>] ? check_events+0x12/0x20 [1285568.771791] [<ffffffff8100f2a9>] ? xen_irq_enable_direct_end+0x0/0x7 [1285568.771800] [<ffffffff810578b9>] ? finish_task_switch+0x59/0xe0 [1285568.771808] [<ffffffff815417a8>] ? thread_return+0x48/0x420 [1285568.771815] [<ffffffff8106240a>] ? __cond_resched+0x2a/0x40 [1285568.771823] [<ffffffff81543e5e>] ? _spin_unlock_irqrestore+0x1e/0x30 [1285568.771829] [<ffffffff81541c80>] ? _cond_resched+0x30/0x40 [1285568.771836] [<ffffffff81080726>] ? flush_workqueue+0x36/0x80 [1285568.771843] [<ffffffff810b5b34>] ? __stop_machine+0xf4/0x120 [1285568.771850] [<ffffffff8131eda0>] ? xen_suspend+0x0/0xf0 [1285568.771855] [<ffffffff810b5d8e>] ? stop_machine+0x3e/0x60 [1285568.771862] [<ffffffff8131eb9a>] ? do_suspend+0x7a/0x120 [1285568.771868] [<ffffffff8131ed49>] ? shutdown_handler+0x109/0x160 [1285568.771874] [<ffffffff813200c2>] ? xenwatch_thread+0xc2/0x190 [1285568.771882] [<ffffffff81084570>] ? autoremove_wake_function+0x0/0x40 [1285568.771888] [<ffffffff81320000>] ? xenwatch_thread+0x0/0x190 [1285568.771894] [<ffffffff810841f6>] ? kthread+0x96/0xa0 [1285568.771900] [<ffffffff810131ea>] ? child_rip+0xa/0x20 [1285568.771906] [<ffffffff810123d1>] ? int_ret_from_sys_call+0x7/0x1b [1285568.771912] [<ffffffff81012b5d>] ? retint_restore_args+0x5/0x6 [1285568.771918] [<ffffffff810131e0>] ? child_rip+0x0/0x20 [1285568.771923] Code: 89 e5 c9 0f 95 c0 c3 55 b8 01 00 00 00 86 07 84 c0 48 89 e5 0f 94 c0 c9 0f b6 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 <0f> 0b eb fe 0f 1f 84 00 00 00 00 00 55 ba ff ff ff ff 48 89 e5 [1285568.771994] RIP [<ffffffff8100fca4>] dummy_handler+0x4/0x10 [1285568.772001] RSP <ffff880003669e88>
I`m trying apport and all the kernel debug stuffs in Wiki, got a better stack trace.
Updated to the new kernel release 2.6.32-26-generic
[1285568.771462] ------------[ cut here ]------------ buildd/ linux-2. 6.32/arch/ x86/xen/ spinlock. c:343! ffffffff8100fca 4>] [<ffffffff8100f ca4>] dummy_handler+ 0x4/0x10 669e88 EFLAGS: 00010046 0(0000) GS:ffff88000366 6000(0000) knlGS:000000000 0000000 550>] handle_ IRQ_event+ 0x60/0x170 882>] handle_ percpu_ irq+0x42/ 0x80 d12>] handle_ irq+0x22/ 0x30 a99>] xen_evtchn_ do_upcall+ 0x199/0x1c0 33e>] xen_do_ hypervisor_ callback+ 0x1e/0x30 22a>] ? hypercall_ page+0x22a/ 0x1010 22a>] ? hypercall_ page+0x22a/ 0x1010 b6d>] ? xen_force_ evtchn_ callback+ 0xd/0x10 302>] ? check_events+ 0x12/0x20 2a9>] ? xen_irq_ enable_ direct_ end+0x0/ 0x7 8b9>] ? finish_ task_switch+ 0x59/0xe0 7a8>] ? thread_ return+ 0x48/0x420 40a>] ? __cond_ resched+ 0x2a/0x40 e5e>] ? _spin_unlock_ irqrestore+ 0x1e/0x30 c80>] ? _cond_resched+ 0x30/0x40 726>] ? flush_workqueue +0x36/0x80 b34>] ? __stop_ machine+ 0xf4/0x120 da0>] ? xen_suspend+ 0x0/0xf0 d8e>] ? stop_machine+ 0x3e/0x60 b9a>] ? do_suspend+ 0x7a/0x120 d49>] ? shutdown_ handler+ 0x109/0x160 0c2>] ? xenwatch_ thread+ 0xc2/0x190 570>] ? autoremove_ wake_function+ 0x0/0x40 000>] ? xenwatch_ thread+ 0x0/0x190 1f6>] ? kthread+0x96/0xa0 1ea>] ? child_rip+0xa/0x20 3d1>] ? int_ret_ from_sys_ call+0x7/ 0x1b b5d>] ? retint_ restore_ args+0x5/ 0x6 1e0>] ? child_rip+0x0/0x20 ca4>] dummy_handler+ 0x4/0x10
[1285568.771473] kernel BUG at /build/
[1285568.771486] invalid opcode: 0000 [#1] SMP
[1285568.771500] last sysfs file: /sys/power/pm_trace
[1285568.771508] CPU 0
[1285568.771517] Modules linked in: xenfs lp parport xen_netfront xen_blkfront
[1285568.771554] Pid: 41, comm: xenwatch Not tainted 2.6.32-26-generic #47-Ubuntu
[1285568.771567] RIP: e030:[<
[1285568.771590] RSP: e02b:ffff880003
[1285568.771594] RAX: ffffffffff57b000 RBX: ffff88007fc1b060 RCX: 0000000000000000
[1285568.771600] RDX: 0000000000400200 RSI: 0000000000000000 RDI: 0000000000000001
[1285568.771605] RBP: ffff880003669e88 R08: 0000000000000000 R09: 0000000000000000
[1285568.771612] R10: ffff880003671028 R11: 0000000000012eb0 R12: 0000000000000000
[1285568.771617] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000100
[1285568.771626] FS: 00007fae6666c70
[1285568.771632] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[1285568.771637] CR2: 0000000000000000 CR3: 000000007d7f7000 CR4: 0000000000002660
[1285568.771645] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1285568.771653] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[1285568.771663] Process xenwatch (pid: 41, threadinfo ffff88007d50c000, task ffff88007d4cadc0)
[1285568.771669] Stack:
[1285568.771672] ffff880003669ed8 ffffffff810c4550 0000000000000000 0000000000000000
[1285568.771681] <0> 0000000000000000 ffffffff817b1300 0000000000000001 0000000000000000
[1285568.771690] <0> 0000000000000001 0000000000000100 ffff880003669ef8 ffffffff810c6882
[1285568.771702] Call Trace:
[1285568.771705] <IRQ>
[1285568.771713] [<ffffffff810c4
[1285568.771723] [<ffffffff810c6
[1285568.771734] [<ffffffff81014
[1285568.771743] [<ffffffff8131d
[1285568.771749] [<ffffffff81013
[1285568.771754] <EOI>
[1285568.771763] [<ffffffff81009
[1285568.771769] [<ffffffff81009
[1285568.771776] [<ffffffff8100e
[1285568.771783] [<ffffffff8100f
[1285568.771791] [<ffffffff8100f
[1285568.771800] [<ffffffff81057
[1285568.771808] [<ffffffff81541
[1285568.771815] [<ffffffff81062
[1285568.771823] [<ffffffff81543
[1285568.771829] [<ffffffff81541
[1285568.771836] [<ffffffff81080
[1285568.771843] [<ffffffff810b5
[1285568.771850] [<ffffffff8131e
[1285568.771855] [<ffffffff810b5
[1285568.771862] [<ffffffff8131e
[1285568.771868] [<ffffffff8131e
[1285568.771874] [<ffffffff81320
[1285568.771882] [<ffffffff81084
[1285568.771888] [<ffffffff81320
[1285568.771894] [<ffffffff81084
[1285568.771900] [<ffffffff81013
[1285568.771906] [<ffffffff81012
[1285568.771912] [<ffffffff81012
[1285568.771918] [<ffffffff81013
[1285568.771923] Code: 89 e5 c9 0f 95 c0 c3 55 b8 01 00 00 00 86 07 84 c0 48 89 e5 0f 94 c0 c9 0f b6 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 <0f> 0b eb fe 0f 1f 84 00 00 00 00 00 55 ba ff ff ff ff 48 89 e5
[1285568.771994] RIP [<ffffffff8100f
[1285568.772001] RSP <ffff880003669e88>
I`m trying apport and all the kernel debug stuffs in Wiki, got a better stack trace.