Comment 2 for bug 681083

Revision history for this message
Luiz Ozaki (luiz-ozaki) wrote :

Updated to the new kernel release 2.6.32-26-generic

[1285568.771462] ------------[ cut here ]------------
[1285568.771473] kernel BUG at /build/buildd/linux-2.6.32/arch/x86/xen/spinlock.c:343!
[1285568.771486] invalid opcode: 0000 [#1] SMP
[1285568.771500] last sysfs file: /sys/power/pm_trace
[1285568.771508] CPU 0
[1285568.771517] Modules linked in: xenfs lp parport xen_netfront xen_blkfront
[1285568.771554] Pid: 41, comm: xenwatch Not tainted 2.6.32-26-generic #47-Ubuntu
[1285568.771567] RIP: e030:[<ffffffff8100fca4>] [<ffffffff8100fca4>] dummy_handler+0x4/0x10
[1285568.771590] RSP: e02b:ffff880003669e88 EFLAGS: 00010046
[1285568.771594] RAX: ffffffffff57b000 RBX: ffff88007fc1b060 RCX: 0000000000000000
[1285568.771600] RDX: 0000000000400200 RSI: 0000000000000000 RDI: 0000000000000001
[1285568.771605] RBP: ffff880003669e88 R08: 0000000000000000 R09: 0000000000000000
[1285568.771612] R10: ffff880003671028 R11: 0000000000012eb0 R12: 0000000000000000
[1285568.771617] R13: 0000000000000000 R14: 0000000000000001 R15: 0000000000000100
[1285568.771626] FS: 00007fae6666c700(0000) GS:ffff880003666000(0000) knlGS:0000000000000000
[1285568.771632] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[1285568.771637] CR2: 0000000000000000 CR3: 000000007d7f7000 CR4: 0000000000002660
[1285568.771645] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1285568.771653] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[1285568.771663] Process xenwatch (pid: 41, threadinfo ffff88007d50c000, task ffff88007d4cadc0)
[1285568.771669] Stack:
[1285568.771672] ffff880003669ed8 ffffffff810c4550 0000000000000000 0000000000000000
[1285568.771681] <0> 0000000000000000 ffffffff817b1300 0000000000000001 0000000000000000
[1285568.771690] <0> 0000000000000001 0000000000000100 ffff880003669ef8 ffffffff810c6882
[1285568.771702] Call Trace:
[1285568.771705] <IRQ>
[1285568.771713] [<ffffffff810c4550>] handle_IRQ_event+0x60/0x170
[1285568.771723] [<ffffffff810c6882>] handle_percpu_irq+0x42/0x80
[1285568.771734] [<ffffffff81014d12>] handle_irq+0x22/0x30
[1285568.771743] [<ffffffff8131da99>] xen_evtchn_do_upcall+0x199/0x1c0
[1285568.771749] [<ffffffff8101333e>] xen_do_hypervisor_callback+0x1e/0x30
[1285568.771754] <EOI>
[1285568.771763] [<ffffffff8100922a>] ? hypercall_page+0x22a/0x1010
[1285568.771769] [<ffffffff8100922a>] ? hypercall_page+0x22a/0x1010
[1285568.771776] [<ffffffff8100eb6d>] ? xen_force_evtchn_callback+0xd/0x10
[1285568.771783] [<ffffffff8100f302>] ? check_events+0x12/0x20
[1285568.771791] [<ffffffff8100f2a9>] ? xen_irq_enable_direct_end+0x0/0x7
[1285568.771800] [<ffffffff810578b9>] ? finish_task_switch+0x59/0xe0
[1285568.771808] [<ffffffff815417a8>] ? thread_return+0x48/0x420
[1285568.771815] [<ffffffff8106240a>] ? __cond_resched+0x2a/0x40
[1285568.771823] [<ffffffff81543e5e>] ? _spin_unlock_irqrestore+0x1e/0x30
[1285568.771829] [<ffffffff81541c80>] ? _cond_resched+0x30/0x40
[1285568.771836] [<ffffffff81080726>] ? flush_workqueue+0x36/0x80
[1285568.771843] [<ffffffff810b5b34>] ? __stop_machine+0xf4/0x120
[1285568.771850] [<ffffffff8131eda0>] ? xen_suspend+0x0/0xf0
[1285568.771855] [<ffffffff810b5d8e>] ? stop_machine+0x3e/0x60
[1285568.771862] [<ffffffff8131eb9a>] ? do_suspend+0x7a/0x120
[1285568.771868] [<ffffffff8131ed49>] ? shutdown_handler+0x109/0x160
[1285568.771874] [<ffffffff813200c2>] ? xenwatch_thread+0xc2/0x190
[1285568.771882] [<ffffffff81084570>] ? autoremove_wake_function+0x0/0x40
[1285568.771888] [<ffffffff81320000>] ? xenwatch_thread+0x0/0x190
[1285568.771894] [<ffffffff810841f6>] ? kthread+0x96/0xa0
[1285568.771900] [<ffffffff810131ea>] ? child_rip+0xa/0x20
[1285568.771906] [<ffffffff810123d1>] ? int_ret_from_sys_call+0x7/0x1b
[1285568.771912] [<ffffffff81012b5d>] ? retint_restore_args+0x5/0x6
[1285568.771918] [<ffffffff810131e0>] ? child_rip+0x0/0x20
[1285568.771923] Code: 89 e5 c9 0f 95 c0 c3 55 b8 01 00 00 00 86 07 84 c0 48 89 e5 0f 94 c0 c9 0f b6 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 <0f> 0b eb fe 0f 1f 84 00 00 00 00 00 55 ba ff ff ff ff 48 89 e5
[1285568.771994] RIP [<ffffffff8100fca4>] dummy_handler+0x4/0x10
[1285568.772001] RSP <ffff880003669e88>

I`m trying apport and all the kernel debug stuffs in Wiki, got a better stack trace.