Greetings,
This looks like a pretty old bug and dates back to v2.6.39.
(older kernels cannot be tested due to build problems)
[ 6.100211] ------------[ cut here ]------------
[ 6.101009] Kernel BUG at b144dd6f [verbose debug info unavailable]
[ 6.101189] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC
[ 6.101189] Pid: 1, comm: swapper Not tainted 3.7.0-rc5 #1 Bochs Bochs
[ 6.101189] EIP: 0060:[<b144dd6f>] EFLAGS: 00010286 CPU: 0
[ 6.101189] EIP is at mtd_do_chip_probe+0xb/0x10
[ 6.101189] EAX: b1c4b71c EBX: b1c4b338 ECX: 00000001 EDX: b1c4b330
[ 6.101189] ESI: b1c4b71c EDI: b1b8f3d9 EBP: bbc2bf3c ESP: bbc2bf00
[ 6.101189] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[ 6.101189] CR0: 8005003b CR2: 00000000 CR3: 01f51000 CR4: 00000690
[ 6.101189] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 6.101189] DR6: ffff0ff0 DR7: 00000400
[ 6.101189] Process swapper (pid: 1, ti=bbc2a000 task=bbc60000 task.ti=bbc2a000)
[ 6.101189] Stack:
[ 6.101189] 00000002 00000000 00000000 00000000 bbc60000 00000000 00000000 b1c4b308
[ 6.101189] 00000000 b1b8f3d9 bbc2bf38 b11bb431 b1c4b308 b1c4b71c bbc2bf44 bbc2bf44
[ 6.101189] b144abb6 bbc2bf58 b144ab5c 00000000 b1ee1540 00000000 bbc2bf7c b1ee162b
[ 6.101189] Call Trace:
[ 6.101189] [<b11bb431>] ? do_raw_spin_unlock+0xd1/0x108
[ 6.101189] [<b144abb6>] cfi_probe+0x12/0x14
[ 6.101189] [<b144ab5c>] do_map_probe+0x8c/0x95
[ 6.101189] [<b1ee1540>] ? physmap_init+0x61/0x61
[ 6.101189] [<b1ee162b>] init_sbc_gxx+0xeb/0x13d
[ 6.101189] [<b1eb6c79>] do_one_initcall+0x74/0x16e
[ 6.101189] [<b1783ed2>] ? kernel_init+0xcf/0x2d5
[ 6.101189] [<b1783ee8>] kernel_init+0xe5/0x2d5
[ 6.101189] [<b17f8cf7>] ret_from_kernel_thread+0x1b/0x28
[ 6.101189] [<b1783e03>] ? rest_init+0xab/0xab
[ 6.101189] Code: 8c 53 fe ff ff 8b 45 e0 c7 40 44 e8 b3 c4 b1 89 f8 e8 cb ee ff ff 8d 65 f4 5b 5e 5f 5d c3 90 90 55 89 e5 83 ec 3c 3e 8d 74 26 00 <0f> 0b 90 90 90 55 89 e5 3e 8d 74 26 00 8b 80 dc 00 00 00 5d 03
[ 6.101189] EIP: [<b144dd6f>] mtd_do_chip_probe+0xb/0x10 SS:ESP 0068:bbc2bf00
Thanks,
Fengguang
Forwarding this message to mtd devlist.
I'll try to take a look a this when I'll more spare time, sorry.
---------- Forwarded message ----------
From: Fengguang Wu <[email protected]>
Date: 2012/11/13
Subject: [cfi_probe, mtd_do_chip_probe] invalid opcode: 0000 [#1]
DEBUG_PAGEALLOC
To: [email protected], [email protected]
Cc : Guillaume LECERF <[email protected]>
Greetings,
This looks like a pretty old bug and dates back to v2.6.39.
(older kernels cannot be tested due to build problems)
[ 6.100211] ------------[ cut here ]------------
[ 6.101009] Kernel BUG at b144dd6f [verbose debug info unavailable]
[ 6.101189] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC
[ 6.101189] Pid: 1, comm: swapper Not tainted 3.7.0-rc5 #1 Bochs Bochs
[ 6.101189] EIP: 0060:[<b144dd6f>] EFLAGS: 00010286 CPU: 0
[ 6.101189] EIP is at mtd_do_chip_probe+0xb/0x10
[ 6.101189] EAX: b1c4b71c EBX: b1c4b338 ECX: 00000001 EDX: b1c4b330
[ 6.101189] ESI: b1c4b71c EDI: b1b8f3d9 EBP: bbc2bf3c ESP: bbc2bf00
[ 6.101189] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[ 6.101189] CR0: 8005003b CR2: 00000000 CR3: 01f51000 CR4: 00000690
[ 6.101189] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 6.101189] DR6: ffff0ff0 DR7: 00000400
[ 6.101189] Process swapper (pid: 1, ti=bbc2a000 task=bbc60000
task.ti=bbc2a000)
[ 6.101189] Stack:
[ 6.101189] 00000002 00000000 00000000 00000000 bbc60000 00000000
00000000 b1c4b308
[ 6.101189] 00000000 b1b8f3d9 bbc2bf38 b11bb431 b1c4b308 b1c4b71c
bbc2bf44 bbc2bf44
[ 6.101189] b144abb6 bbc2bf58 b144ab5c 00000000 b1ee1540 00000000
bbc2bf7c b1ee162b
[ 6.101189] Call Trace:
[ 6.101189] [<b11bb431>] ? do_raw_spin_unlock+0xd1/0x108
[ 6.101189] [<b144abb6>] cfi_probe+0x12/0x14
[ 6.101189] [<b144ab5c>] do_map_probe+0x8c/0x95
[ 6.101189] [<b1ee1540>] ? physmap_init+0x61/0x61
[ 6.101189] [<b1ee162b>] init_sbc_gxx+0xeb/0x13d
[ 6.101189] [<b1eb6c79>] do_one_initcall+0x74/0x16e
[ 6.101189] [<b1783ed2>] ? kernel_init+0xcf/0x2d5
[ 6.101189] [<b1783ee8>] kernel_init+0xe5/0x2d5
[ 6.101189] [<b17f8cf7>] ret_from_kernel_thread+0x1b/0x28
[ 6.101189] [<b1783e03>] ? rest_init+0xab/0xab
[ 6.101189] Code: 8c 53 fe ff ff 8b 45 e0 c7 40 44 e8 b3 c4 b1 89
f8 e8 cb ee ff ff 8d 65 f4 5b 5e 5f 5d c3 90 90 55 89 e5 83 ec 3c 3e
8d 74 26 00 <0f> 0b 90 90 90 55 89 e5 3e 8d 74 26 00 8b 80 dc 00 00 00
5d 03
[ 6.101189] EIP: [<b144dd6f>] mtd_do_chip_probe+0xb/0x10 SS:ESP 0068:bbc2bf00
Thanks,
Fengguang
--
Guillaume LECERF
OpenBricks developer - http://www.openbricks.org
Forwarding this message to mtd devlist.
I'll try to take a look a this when I'll more spare time, sorry.
Please include me in your replies as I'm not subscribed to linux-kernel.
---------- Forwarded message ----------
From: Fengguang Wu <[email protected]>
Date: 2012/11/13
Subject: [cfi_probe, mtd_do_chip_probe] invalid opcode: 0000 [#1]
DEBUG_PAGEALLOC
To: [email protected], [email protected]
Cc : Guillaume LECERF <[email protected]>
Greetings,
This looks like a pretty old bug and dates back to v2.6.39.
(older kernels cannot be tested due to build problems)
[ 6.100211] ------------[ cut here ]------------
[ 6.101009] Kernel BUG at b144dd6f [verbose debug info unavailable]
[ 6.101189] invalid opcode: 0000 [#1] DEBUG_PAGEALLOC
[ 6.101189] Pid: 1, comm: swapper Not tainted 3.7.0-rc5 #1 Bochs Bochs
[ 6.101189] EIP: 0060:[<b144dd6f>] EFLAGS: 00010286 CPU: 0
[ 6.101189] EIP is at mtd_do_chip_probe+0xb/0x10
[ 6.101189] EAX: b1c4b71c EBX: b1c4b338 ECX: 00000001 EDX: b1c4b330
[ 6.101189] ESI: b1c4b71c EDI: b1b8f3d9 EBP: bbc2bf3c ESP: bbc2bf00
[ 6.101189] DS: 007b ES: 007b FS: 0000 GS: 00e0 SS: 0068
[ 6.101189] CR0: 8005003b CR2: 00000000 CR3: 01f51000 CR4: 00000690
[ 6.101189] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 6.101189] DR6: ffff0ff0 DR7: 00000400
[ 6.101189] Process swapper (pid: 1, ti=bbc2a000 task=bbc60000
task.ti=bbc2a000)
[ 6.101189] Stack:
[ 6.101189] 00000002 00000000 00000000 00000000 bbc60000 00000000
00000000 b1c4b308
[ 6.101189] 00000000 b1b8f3d9 bbc2bf38 b11bb431 b1c4b308 b1c4b71c
bbc2bf44 bbc2bf44
[ 6.101189] b144abb6 bbc2bf58 b144ab5c 00000000 b1ee1540 00000000
bbc2bf7c b1ee162b
[ 6.101189] Call Trace:
[ 6.101189] [<b11bb431>] ? do_raw_spin_unlock+0xd1/0x108
[ 6.101189] [<b144abb6>] cfi_probe+0x12/0x14
[ 6.101189] [<b144ab5c>] do_map_probe+0x8c/0x95
[ 6.101189] [<b1ee1540>] ? physmap_init+0x61/0x61
[ 6.101189] [<b1ee162b>] init_sbc_gxx+0xeb/0x13d
[ 6.101189] [<b1eb6c79>] do_one_initcall+0x74/0x16e
[ 6.101189] [<b1783ed2>] ? kernel_init+0xcf/0x2d5
[ 6.101189] [<b1783ee8>] kernel_init+0xe5/0x2d5
[ 6.101189] [<b17f8cf7>] ret_from_kernel_thread+0x1b/0x28
[ 6.101189] [<b1783e03>] ? rest_init+0xab/0xab
[ 6.101189] Code: 8c 53 fe ff ff 8b 45 e0 c7 40 44 e8 b3 c4 b1 89
f8 e8 cb ee ff ff 8d 65 f4 5b 5e 5f 5d c3 90 90 55 89 e5 83 ec 3c 3e
8d 74 26 00 <0f> 0b 90 90 90 55 89 e5 3e 8d 74 26 00 8b 80 dc 00 00 00
5d 03
[ 6.101189] EIP: [<b144dd6f>] mtd_do_chip_probe+0xb/0x10 SS:ESP 0068:bbc2bf00
Thanks,
Fengguang
--
Guillaume LECERF
GeeXboX developer - http://www.geexbox.org