[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#630031: linux-image-2.6.39-2-686-pae: Kernel boots, but dmesg contains kernel bug trace



# affects wheezy, too
tags 630031 - sid
quit

Hi Frank,

Frank McCormick wrote:

> Kernel would not boot first thing this morning (June 10) but yesterday it
> seemed OK after aptitude upgrade. Now after another upgrade it boots, but there
> is a bug trace in logs

Thanks for reporting it.  Is this reproducible?  If so, is the
backtrace the same every time, and what's the latest kernel version
that works and the latest version you've tested that doesn't work?

Oops left unsnipped for reference.

[...]
> *pdpt = 0000000001492001 *pde = 00000000019fc067 *pte = 0000000000000000 
> Oops: 0000 [#1] SMP 
> last sysfs file: /sys/devices/LNXSYSTM:00/device:00/PNP0A03:00/device:12/PNP0C04:00/uevent
> Modules linked in: video processor parport thermal_sys button ext3 jbd mbcache usb_storage uas sg sd_mod sr_mod cdrom crc_t10dif ata_generic uhci_hcd ata_piix libata ehci_hcd e100 usbcore scsi_mod mii [last unloaded: scsi_wait_scan]
> 
> Pid: 275, comm: modprobe Not tainted 2.6.39-2-686-pae #1                  /D865GBF                        
> EIP: 0000:[<000000c3>] EFLAGS: f7280b04 CPU: 0
> EIP is at 0xc3
> EAX: c10f47dc EBX: f716bd3c ECX: 00000000 EDX: f5c29774
> ESI: 33380000 EDI: 00000002 EBP: 00000002 ESP: f716bd34
>  DS: ab94 ES: 0af8 FS: 0001 GS: 00e0 SS: 0068
> Process modprobe (pid: 275, ti=f716a000 task=f7055a00 task.ti=f70dc000)
> Stack:
>  c1413a68 c1413a64 00000282 00000000 f7004780 c102dfbb 00000000 00000000
>  00000001 00000003 f7048000 00000000 00000282 f7048000 00000000 c122c8ee
>  00000000 f5c29774 00000001 c115430c 00000000 f716bdcc 00000000 f5c29774
> Call Trace:
>  [<c102dfbb>] ? __wake_up+0x2c/0x3b
>  [<c122c8ee>] ? netlink_broadcast_filtered+0x22b/0x254
>  [<c115430c>] ? idr_get_empty_slot+0x149/0x217
>  [<c115430c>] ? idr_get_empty_slot+0x149/0x217
>  [<c11586d1>] ? number+0x176/0x279
>  [<c11544ab>] ? ida_get_new_above+0xd1/0x16c
>  [<c101aacb>] ? native_send_call_func_single_ipi+0x1f/0x20
>  [<c105c446>] ? generic_exec_single+0x4d/0x65
>  [<c1026817>] ? leave_mm+0x29/0x29
>  [<c105c5d0>] ? smp_call_function_single+0xd1/0xe2
>  [<c1026817>] ? leave_mm+0x29/0x29
>  [<c1026817>] ? leave_mm+0x29/0x29
>  [<c105c806>] ? smp_call_function+0x17/0x1b
>  [<c105c817>] ? on_each_cpu+0xd/0x30
>  [<c10b62ab>] ? __purge_vmap_area_lazy+0xf6/0x13c
>  [<c10b730b>] ? vm_unmap_aliases+0x121/0x12a
>  [<f8219000>] ? 0xf8218fff
>  [<c10241a4>] ? change_page_attr_set_clr+0xfc/0x338
>  [<c1050447>] ? down_timeout+0x36/0x3d
>  [<c12b122a>] ? mutex_lock+0xb/0x24
>  [<c12b122a>] ? mutex_lock+0xb/0x24
>  [<c12b50c7>] ? kprobes_module_callback+0xf5/0x109
>  [<c11ac989>] ? acpi_ut_release_read_lock+0x40/0x45
>  [<c1051815>] ? lowest_in_progress+0x5d/0x66
>  [<c10245f0>] ? change_page_attr_set+0x22/0x26
>  [<c1024607>] ? set_memory_rw+0x13/0x17
>  [<f8219000>] ? 0xf8218fff
>  [<c1060cbd>] ? sys_init_module+0xdca/0xe7d
>  [<c12b715f>] ? sysenter_do_call+0x12/0x28
> Code:  Bad EIP value.
> EIP: [<0000099c>] 0x99c SS:ESP 0068:f716bd34
> CR2: 00000000ffffff82
> ---[ end trace 935545f4eeaa95f8 ]---
> input: PC Speaker as /devices/platform/pcspkr/input/input3



Reply to: