El Sat, 19 Apr 2008 02:39:45 +0400, Alexey Dobriyan <adobriyan@xxxxxxxxx> escribió:
------------[ cut here ]------------
WARNING: at arch/x86/kernel/genapic_64.c:86 read_apic_id+0x78/0x80()
Modules linked in:
Pid: 1, comm: swapper Not tainted 2.6.25-2cca775baecbfede2fec20c99add709232311fe7 #3
Call Trace:
[<ffffffff8023150f>] warn_on_slowpath+0x5f/0x80
[<ffffffff80299e9e>] ? open_namei+0x4e/0x6b0
[<ffffffff804594e5>] ? _spin_unlock_irqrestore+0x65/0x80
[<ffffffff80254105>] ? trace_hardirqs_on+0xd5/0x160
[<ffffffff804594c2>] ? _spin_unlock_irqrestore+0x42/0x80
[<ffffffff8021ed28>] read_apic_id+0x78/0x80
[<ffffffff805e7332>] verify_local_APIC+0xb2/0x1a0
[<ffffffff805e6193>] native_smp_prepare_cpus+0x1a3/0x390
[<ffffffff805e0713>] kernel_init+0x53/0x340
[<ffffffff80459536>] ? _spin_unlock_irq+0x36/0x60
[<ffffffff80458a92>] ? trace_hardirqs_on_thunk+0x35/0x3a
[<ffffffff80254105>] ? trace_hardirqs_on+0xd5/0x160
[<ffffffff8020c4b8>] child_rip+0xa/0x12
[<ffffffff8020bba3>] ? restore_args+0x0/0x30
[<ffffffff805e06c0>] ? kernel_init+0x0/0x340
[<ffffffff8020c4ae>] ? child_rip+0x0/0x12
I'm getting exactly the same backtrace (it's also a Intel Core 2 machine)