Comment 3 for bug 681083

Revision history for this message
Luiz Ozaki (luiz-ozaki) wrote :

Using 2.6.32-26-server, I think is the same problem, but got in swapper process, anyways here goes:

[1286941.792445] ------------[ cut here ]------------
[1286941.792454] kernel BUG at /build/buildd/linux-2.6.32/arch/x86/xen/spinlock.c:343!
[1286941.792462] invalid opcode: 0000 [#1] SMP
[1286941.792469] last sysfs file: /sys/power/pm_trace
[1286941.792473] CPU 1
[1286941.792477] Modules linked in: xenfs lp xen_netfront parport xen_blkfront
[1286941.792490] Pid: 0, comm: swapper Not tainted 2.6.32-26-server #47-Ubuntu
[1286941.792495] RIP: e030:[<ffffffff8100fca4>] [<ffffffff8100fca4>] dummy_handler+0x4/0x10
[1286941.792507] RSP: e02b:ffff880003680e88 EFLAGS: 00010046
[1286941.792511] RAX: ffffffffff57b000 RBX: ffff88007fc1b2a0 RCX: 0000000000000000
[1286941.792520] RDX: 0000000000400200 RSI: 0000000000000000 RDI: 0000000000000007
[1286941.792527] RBP: ffff880003680e88 R08: 0000000000000000 R09: 0000000000000000
[1286941.792535] R10: ffff880003688028 R11: 0000000000012eb0 R12: 0000000000000000
[1286941.792541] R13: 0000000000000000 R14: 0000000000000007 R15: 0000000000000100
[1286941.792550] FS: 00007f639b1fa700(0000) GS:ffff88000367d000(0000) knlGS:0000000000000000
[1286941.792557] CS: e033 DS: 002b ES: 002b CR0: 000000008005003b
[1286941.792562] CR2: 0000000000000000 CR3: 0000000001001000 CR4: 0000000000002660
[1286941.792568] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[1286941.792574] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[1286941.792580] Process swapper (pid: 0, threadinfo ffff88007dfc8000, task ffff88007dfb2dc0)
[1286941.792585] Stack:
[1286941.792588] ffff880003680ed8 ffffffff810c4060 ffff880003680ec8 ffffffff8108e553
[1286941.792597] <0> ffff88000368d400 ffffffff817cb780 0000000000000007 0000000000000200
[1286941.792607] <0> 0000000000000001 0000000000000100 ffff880003680ef8 ffffffff810c6392
[1286941.792618] Call Trace:
[1286941.792622] <IRQ>
[1286941.792628] [<ffffffff810c4060>] handle_IRQ_event+0x60/0x170
[1286941.792637] [<ffffffff8108e553>] ? ktime_get+0x63/0xe0
[1286941.792643] [<ffffffff810c6392>] handle_percpu_irq+0x42/0x80
[1286941.792650] [<ffffffff81014d12>] handle_irq+0x22/0x30
[1286941.792658] [<ffffffff8131f189>] xen_evtchn_do_upcall+0x199/0x1c0
[1286941.792665] [<ffffffff8101333e>] xen_do_hypervisor_callback+0x1e/0x30
[1286941.792669] <EOI>
[1286941.792675] [<ffffffff810093aa>] ? hypercall_page+0x3aa/0x1010
[1286941.792681] [<ffffffff810093aa>] ? hypercall_page+0x3aa/0x1010
[1286941.792688] [<ffffffff8100ebd0>] ? xen_safe_halt+0x10/0x20
[1286941.792693] [<ffffffff8100c285>] ? xen_idle+0x35/0x50
[1286941.792699] [<ffffffff81010e63>] ? cpu_idle+0xb3/0x110
[1286941.792704] [<ffffffff8100f2a9>] ? xen_irq_enable_direct_end+0x0/0x7
[1286941.792711] [<ffffffff8154d2e5>] ? cpu_bringup_and_idle+0x13/0x15
[1286941.792716] Code: 89 e5 c9 0f 95 c0 c3 55 b8 01 00 00 00 86 07 84 c0 48 89 e5 0f 94 c0 c9 0f b6 c0 c3 66 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 <0f> 0b eb fe 0f 1f 84 00 00 00 00 00 55 ba ff ff ff ff 48 89 e5
[1286941.792788] RIP [<ffffffff8100fca4>] dummy_handler+0x4/0x10
[1286941.792794] RSP <ffff880003680e88>