Comment 2 for bug 1023896

Revision history for this message
Colin 't Hart (colinthart) wrote :

OK, this is a problem with 12.04 server i386 not behaving well with the virtual hardware presented to it.

If I enable a serial console, I get the following output:

[ 28.020109] Process udevd (pid: 147, ti=ece82000 task=ece8cbc0 task.ti=ece82000)
[ 28.028119] Process modprobe (pid: 134, ti=eceb0000 task=ed454bc0 task.ti=eceb0000)
[ 28.028121] Stack:
[ 28.028162] Call Trace:
[ 28.028251] Code: 00 55 89 e5 3e 8d 74 26 00 89 48 04 89 10 5d c3 90 55 89 e5 83 ec 08 89 5d f8 89 75 fc 3e 8d 74 26 00 89 c6 89 d3 8b 00 8b 56 04 <f0> 0f c7 0e 75 fa 8b 5d f8 8b 75 fc 89 ec 5d c3 8d b6 00 00 00
[ 28.024004] Stack:
[ 28.024004] Call Trace:
[ 28.024004] Code: 90 b8 73 62 03 c1 b9 70 62 03 c1 e9 49 ff ff ff 90 55 ba 00 01 00 00 89 e5 f0 66 0f c1 10 0f b6 ce 38 d1 74 0d 8d 74 26 00 f3 90 <0f> b6 10 38 ca 75 f7 5d c3 8d b6 00 00 00 00 8d bc 27 00 00 00
[ 56.020047] Process udevd (pid: 147, ti=ece82000 task=ece8cbc0 task.ti=ece82000)
[ 56.021935] Stack:
[ 56.022459] Call Trace:
[ 56.023114] Code: 90 b8 73 62 03 c1 b9 70 62 03 c1 e9 49 ff ff ff 90 55 ba 00 01 00 00 89 e5 f0 66 0f c1 10 0f b6 ce 38 d1 74 0d 8d 74 26 00 f3 90 <0f> b6 10 38 ca 75 f7 5d c3 8d b6
[ 56.028729] Process modprobe (pid: 134, ti=eceb0000 task=ed454bc0 task.ti=eceb0000)
[ 56.028730] Stack:
[ 56.028745] Call Trace:
[ 56.028847] Code: 00 55 89 e5 3e 8d 74 26 00 89 48 04 89 10 5d c3 90 55 89 e5 83 ec 08 89 5d f8 89 75 fc 3e 8d 74 26 00 89 c6 89 d3 8b 00 8b 56 04 <f0> 0f c7 0e 75 fa 8b 5d f8 8b 75 fc 89 ec 5d c3 8d b6 00 00 00
[ 61.364006] Process modprobe (pid: 134, ti=eceb0000 task=ed454bc0 task.ti=eceb0000)
[ 61.364006] Stack:
[ 61.364006] Call Trace:
[ 61.364006] Code: 00 c3 ff ff 80 e5 10 75 ee c1 e6 18 89 b0 10 c3 ff ff 89 d8 09 d0 80 ce 04 83 fb 02 0f 44 c2 8b 15 04 1a 81 c1 89 82 00 c3 ff ff <89> f8 50 9d 8d 74 26 00 83 c4 10 5b 5e 5f 5d c3 80 3d 9c 4c 94
[ 61.368003] Process udevd (pid: 147, ti=ece82000 task=ece8cbc0 task.ti=ece82000)
[ 61.368003] Stack:
[ 61.368003] Call Trace:
[ 61.368003] Code: 90 b8 73 62 03 c1 b9 70 62 03 c1 e9 49 ff ff ff 90 55 ba 00 01 00 00 89 e5 f0 66 0f c1 10 0f b6 ce 38 d1 74 0d 8d 74 26 00 f3 90 <0f> b6 10 38 ca 75 f7 5d c3 8d b6 00 00 00 00 8d bc 27 00 00 00
[ 88.020049] Process udevd (pid: 147, ti=ece82000 task=ece8cbc0 task.ti=ece82000)
[ 88.028371] Process modprobe (pid: 134, ti=eceb0000 task=ed454bc0 task.ti=eceb0000)
[ 88.028372] Stack:
[ 88.028386] Call Trace:
[ 88.028489] Code: 00 55 89 e5 3e 8d 74 26 00 89 48 04 89 10 5d c3 90 55 89 e5 83 ec 08 89 5d f8 89 75 fc 3e 8d 74 26 00 89 c6 89 d3 8b 00 8b 56 04 <f0> 0f c7 0e 75 fa 8b 5d f8 8b 75 fc 89 ec 5d c3 8d b6 00 00 00
[ 88.024004] Stack:
[ 88.024004] Call Trace:
[ 88.024004] Code: 62 03 c1 b9 70 62 03 c1 e9 49 ff ff ff 90 55 ba 00 01 00 00 89 e5 f0 66 0f c1 10 0f b6 ce 38 d1 74 0d 8d 74 26 00 f3 90 0f b6 10 <38> ca 75 f7 5d c3 8d b6 00 00 00 00 8d bc 27 00 00 00 00 55 89
[ 116.020066] Process udevd (pid: 147, ti=ece82000 task=ece8cbc0 task.ti=ece82000)
[ 116.028064] Process modprobe (pid: 134, ti=eceb0000 task=ed454bc0 task.ti=eceb0000)
[ 116.028066] Stack:
[ 116.028079] Call Trace:
[ 116.028139] Code: 00 55 89 e5 3e 8d 74 26 00 89 48 04 89 10 5d c3 90 55 89 e5 83 ec 08 89 5d f8 89 75 fc 3e 8d 74 26 00 89 c6 89 d3 8b 00 8b 56 04 <f0> 0f c7 0e 75 fa 8b 5d f8 8b 75 fc 89 ec 5d c3 8d b6 00 00 00
[ 116.024021] Stack:
[ 116.024021] Call Trace:
[ 116.024021] Code: ff ff 90 b8 73 62 03 c1 b9 70 62 03 c1 e9 49 ff ff ff 90 55 ba 00 01 00 00 89 e5 f0 66 0f c1 10 0f b6 ce 38 d1 74 0d 8d 74 26 00 <f3> 90 0f b6 10 38 ca 75 f7 5d c3 8d b6 00 00 00 00 8d bc 27 00