[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1229622223.3374.9.camel@localhost.localdomain>
Date: Thu, 18 Dec 2008 12:43:43 -0500
From: Eric Paris <eparis@...hat.com>
To: linux-kernel@...r.kernel.org
Subject: kernel BUG at arch/x86/mm/ioremap.c:39 from
2.6.28-rc8-next-20081218 on x86_64 vmware guest
I also saw this yesterday with 2.6.28-rc8-next-20081217 (which
incidentally was the first time I tried to boot a linux-next kernel so
that's pretty useless information). This is a guest on an x86_64 vmware
server virtual machine. This is very early in the boot cycle the last
thing before the bug was messages about serial 8250 initialization. I
will attach the full dmesg and config. I'm going to start poking
around, but I'm hoping someone will know it or will give me an idea
where to poke. I took my working config from 2.6.28-rc8 and just
answered questions for linux next including turning on some of the debug
options but typically taking the defaults.
[ 2.489258] ------------[ cut here ]------------
[ 2.490031] kernel BUG at arch/x86/mm/ioremap.c:39!
[ 2.490031] invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC
[ 2.490031] last sysfs file:
[ 2.490031] CPU 1
[ 2.490031] Modules linked in:
[ 2.490031] Pid: 1, comm: swapper Not tainted 2.6.28-rc8-next-20081218 #160
[ 2.490031] RIP: 0010:[<ffffffff8103488e>] [<ffffffff8103488e>] __phys_addr+0x7e/0xe2
[ 2.490031] RSP: 0018:ffff880017609800 EFLAGS: 00010202
[ 2.490031] RAX: ffff87ffffffffff RBX: 0000000000000001 RCX: 0000000000000003
[ 2.490031] RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffffff8164ac30
[ 2.490031] RBP: ffff880017609810 R08: 0000000000000000 R09: ffff8800159148d8
[ 2.490031] R10: 000000000000005a R11: ffffffff811ccd2d R12: 6b6b6b6b6b6b6b6b
[ 2.490031] R13: 6b6b6b6b6b6b6b6b R14: ffff880015920820 R15: ffffffff81612e80
[ 2.490031] FS: 0000000000000000(0000) GS:ffff880016fe2320(0000) knlGS:0000000000000000
[ 2.490031] CS: 0010 DS: 0018 ES: 0018 CR0: 000000008005003b
[ 2.490031] CR2: 0000000000000000 CR3: 0000000000201000 CR4: 00000000000006e0
[ 2.490031] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 2.490031] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[ 2.490031] Process swapper (pid: 1, threadinfo ffff880017608000, task ffff880017600000)
[ 2.490031] Stack:
[ 2.490031] 0000000000000000 ffff880015914720 ffff880017609830 ffffffff810e6abc
[ 2.490031] 0000000000000000 ffff880015914720 ffff880017609880 ffffffff810e7dc7
[ 2.490031] ffff8800159146d8 ffffffff816150c0 ffff880015920820 ffff8800159146d8
[ 2.490031] Call Trace:
[ 2.490031] [<ffffffff810e6abc>] virt_to_head_page+0x11/0x5d
[ 2.490031] [<ffffffff810e7dc7>] kfree+0x43/0x19e
[ 2.490031] [<ffffffff81253dba>] device_release+0x73/0x77
[ 2.490031] [<ffffffff811c255a>] kobject_release+0xcb/0xf2
[ 2.490031] [<ffffffff811c248f>] ? kobject_release+0x0/0xf2
[ 2.490031] [<ffffffff811c34d4>] kref_put+0xb9/0xc9
[ 2.490031] [<ffffffff811c23e7>] kobject_put+0x47/0x4b
[ 2.490031] [<ffffffff81252b41>] put_device+0x17/0x19
[ 2.490031] [<ffffffff81253635>] device_unregister+0x83/0x88
[ 2.490031] [<ffffffff81253675>] device_destroy+0x3b/0x3f
[ 2.490031] [<ffffffff8122a4f6>] tty_unregister_device+0x26/0x28
[ 2.490031] [<ffffffff8124e74f>] uart_remove_one_port+0xc9/0x132
[ 2.490031] [<ffffffff81250be4>] serial8250_register_port+0xdd/0x212
[ 2.490031] [<ffffffff813a03dc>] serial_pnp_probe+0x189/0x1cb
[ 2.490031] [<ffffffff8121dd4b>] ? match_device+0x2a/0x41
[ 2.490031] [<ffffffff8121de05>] pnp_device_probe+0x80/0xa5
[ 2.490031] [<ffffffff81256e0b>] driver_probe_device+0x1f8/0x2f6
[ 2.490031] [<ffffffff81256f66>] __driver_attach+0x5d/0x80
[ 2.490031] [<ffffffff81256f09>] ? __driver_attach+0x0/0x80
[ 2.490031] [<ffffffff81255fe0>] bus_for_each_dev+0x54/0x83
[ 2.490031] [<ffffffff81256a0a>] driver_attach+0x21/0x23
[ 2.490031] [<ffffffff81255a5e>] bus_add_driver+0x124/0x279
[ 2.490031] [<ffffffff817085d0>] ? serial8250_pnp_init+0x0/0x12
[ 2.490031] [<ffffffff8125715e>] driver_register+0x98/0x10f
[ 2.490031] [<ffffffff817085d0>] ? serial8250_pnp_init+0x0/0x12
[ 2.490031] [<ffffffff8121db78>] pnp_register_driver+0x21/0x23
[ 2.490031] [<ffffffff817085e0>] serial8250_pnp_init+0x10/0x12
[ 2.490031] [<ffffffff8100a075>] do_one_initcall+0x75/0x18c
[ 2.490031] [<ffffffff810740b9>] ? mark_lock+0x1c/0x35b
[ 2.490031] [<ffffffff8107444a>] ? mark_held_locks+0x52/0x72
[ 2.490031] [<ffffffff810740b9>] ? mark_lock+0x1c/0x35b
[ 2.490031] [<ffffffff81074ee7>] ? __lock_acquire+0x44b/0xb2a
[ 2.490031] [<ffffffff811c174f>] ? ida_get_new_above+0x167/0x188
[ 2.490031] [<ffffffff81018cdc>] ? native_sched_clock+0x53/0x57
[ 2.490031] [<ffffffff81018b60>] ? sched_clock+0x9/0xc
[ 2.490031] [<ffffffff81072ddc>] ? lock_release_holdtime+0x4e/0x53
[ 2.490031] [<ffffffff811cc0f9>] ? _raw_spin_unlock+0xf5/0xfb
[ 2.490031] [<ffffffff813ae35a>] ? _spin_unlock+0x2b/0x2f
[ 2.490031] [<ffffffff81140c91>] ? proc_register+0x189/0x19d
[ 2.490031] [<ffffffff81140dc2>] ? create_proc_entry+0x79/0x8f
[ 2.490031] [<ffffffff8109fc22>] ? register_irq_proc+0xb3/0xcf
[ 2.490031] [<ffffffff81140000>] ? proc_pid_lookup+0xfd/0x15e
[ 2.490031] [<ffffffff816dd92d>] kernel_init+0x12d/0x17e
[ 2.490031] [<ffffffff813ae00d>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 2.490031] [<ffffffff81013aaa>] child_rip+0xa/0x20
[ 2.490031] [<ffffffff810133be>] ? restore_args+0x0/0x30
[ 2.490031] [<ffffffff816dd800>] ? kernel_init+0x0/0x17e
[ 2.490031] [<ffffffff81013aa0>] ? child_rip+0x0/0x20
View attachment "config" of type "text/plain" (56514 bytes)
View attachment "serial0.txt" of type "text/plain" (24303 bytes)
Powered by blists - more mailing lists