[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#638172: marked as done (BUG: soft lockup - CPU#0 stuck for 61s! [qemu-dm:3205])



Your message dated Tue, 17 Jan 2012 18:17:09 +0000
with message-id <E1RnDan-0004FP-6S@franck.debian.org>
and subject line Bug#638172: fixed in user-mode-linux 2.6.32-1um-4+41
has caused the Debian Bug report #638172,
regarding BUG: soft lockup - CPU#0 stuck for 61s! [qemu-dm:3205]
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
638172: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=638172
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.32-5-xen-686
Version: 2.6.32-35
Severity: important

Hi,
I am experiencing a few outages on a XEN server. Often I have to
poweroff the server, but last time I found some information in syslog.
Here it is:

Aug 17 12:35:45 centrum kernel: [ 1424.037532] Clocksource tsc unstable (delta = -103103328 ns)
Aug 17 12:35:45 centrum kernel: [ 1456.620463] BUG: soft lockup - CPU#0 stuck for 61s! [qemu-dm:3205]
Aug 17 12:35:45 centrum kernel: [ 1456.620463] Modules linked in: xt_state xt_physdev iptable_filter tun cpufreq_userspace cpufreq_powersave cpufreq_c
onservative cpufreq_stats dummy bridge stp xen_evtchn xenfs xt_tcpudp iptable_nat nf_nat nf_conntrack_ipv4 nf_conntrack nf_defrag_ipv4 ip_tables x_tab
les xfs exportfs loop snd_hda_codec_atihdmi snd_hda_intel snd_hda_codec radeon snd_hwdep ttm snd_pcm snd_timer drm_kms_helper drm snd soundcore snd_pa
ge_alloc i2c_algo_bit shpchp i2c_piix4 pcspkr k8temp pci_hotplug i2c_core evdev button ext3 jbd mbcache dm_mod aacraid 3w_9xxx 3w_xxxx raid10 raid456 
async_raid6_recov async_pq raid6_pq async_xor xor async_memcpy async_tx raid1 raid0 md_mod sata_nv sata_sil sata_via sd_mod crc_t10dif ata_generic ahc
i pata_atiixp ohci_hcd libata processor ehci_hcd r8169 mii scsi_mod thermal usbcore nls_base thermal_sys acpi_processor [last unloaded: dummy]
Aug 17 12:35:45 centrum kernel: [ 1456.620463] 
Aug 17 12:35:45 centrum kernel: [ 1456.620463] Pid: 3205, comm: qemu-dm Tainted: G        W  (2.6.32-5-xen-686 #1) MS-7368
Aug 17 12:35:45 centrum kernel: [ 1456.620463] EIP: 0061:[<c1002227>] EFLAGS: 00200246 CPU: 0
Aug 17 12:35:45 centrum kernel: [ 1456.620463] EIP is at hypercall_page+0x227/0x1001
Aug 17 12:35:45 centrum kernel: [ 1456.620463] EAX: 00040000 EBX: 00000000 ECX: 00000000 EDX: ec8fa828
Aug 17 12:35:45 centrum kernel: [ 1456.620463] ESI: ec8fa800 EDI: c24d9600 EBP: c27d4800 ESP: e4207d64
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0069
Aug 17 12:35:45 centrum kernel: [ 1456.620463] CR0: 8005003b CR2: b7712200 CR3: 241f0000 CR4: 00000660
Aug 17 12:35:45 centrum kernel: [ 1456.620463] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
Aug 17 12:35:45 centrum kernel: [ 1456.620463] DR6: ffff0ff0 DR7: 00000400
Aug 17 12:35:45 centrum kernel: [ 1456.620463] Call Trace:
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006034>] ? xen_force_evtchn_callback+0xc/0x10
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006764>] ? check_events+0x8/0xc
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006723>] ? xen_irq_enable_direct_end+0x0/0x1
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93f457>] ? scsi_request_fn+0x440/0x47a [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1132541>] ? __blk_run_queue+0x2e/0x5a
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c11325f3>] ? blk_run_queue+0x18/0x27
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93eaca>] ? scsi_run_queue+0x281/0x308 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93f639>] ? scsi_next_command+0x25/0x2f [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93ffa1>] ? scsi_io_completion+0x383/0x3a4 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93a723>] ? scsi_finish_command+0xaa/0xc2 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1135bb3>] ? blk_done_softirq+0x53/0x5f
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103c8ea>] ? __do_softirq+0xaa/0x156
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103c9c7>] ? do_softirq+0x31/0x3c
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103caa1>] ? irq_exit+0x26/0x58
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1199be6>] ? xen_evtchn_do_upcall+0x22/0x2c
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1009b3f>] ? xen_do_upcall+0x7/0xc
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1002407>] ? hypercall_page+0x407/0x1001
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<eda10015>] ? HYPERVISOR_event_channel_op+0x15/0x4c [xen_evtchn]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10937c6>] ? __alloc_pages_nodemask+0xf3/0x4d9
Aug 17 12:35:45 centrum kernel: [ 1456.620463] EIP is at hypercall_page+0x227/0x1001
Aug 17 12:35:45 centrum kernel: [ 1456.620463] EAX: 00040000 EBX: 00000000 ECX: 00000000 EDX: ec8fa828
Aug 17 12:35:45 centrum kernel: [ 1456.620463] ESI: ec8fa800 EDI: c24d9600 EBP: c27d4800 ESP: e4207d64
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0069
Aug 17 12:35:45 centrum kernel: [ 1456.620463] CR0: 8005003b CR2: b7712200 CR3: 241f0000 CR4: 00000660
Aug 17 12:35:45 centrum kernel: [ 1456.620463] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
Aug 17 12:35:45 centrum kernel: [ 1456.620463] DR6: ffff0ff0 DR7: 00000400
Aug 17 12:35:45 centrum kernel: [ 1456.620463] Call Trace:
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006034>] ? xen_force_evtchn_callback+0xc/0x10
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006764>] ? check_events+0x8/0xc
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1006723>] ? xen_irq_enable_direct_end+0x0/0x1
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93f457>] ? scsi_request_fn+0x440/0x47a [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1132541>] ? __blk_run_queue+0x2e/0x5a
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c11325f3>] ? blk_run_queue+0x18/0x27
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93eaca>] ? scsi_run_queue+0x281/0x308 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93f639>] ? scsi_next_command+0x25/0x2f [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93ffa1>] ? scsi_io_completion+0x383/0x3a4 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<ed93a723>] ? scsi_finish_command+0xaa/0xc2 [scsi_mod]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1135bb3>] ? blk_done_softirq+0x53/0x5f
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103c8ea>] ? __do_softirq+0xaa/0x156
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103c9c7>] ? do_softirq+0x31/0x3c
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c103caa1>] ? irq_exit+0x26/0x58
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1199be6>] ? xen_evtchn_do_upcall+0x22/0x2c
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1009b3f>] ? xen_do_upcall+0x7/0xc
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1002407>] ? hypercall_page+0x407/0x1001
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<eda10015>] ? HYPERVISOR_event_channel_op+0x15/0x4c [xen_evtchn]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10937c6>] ? __alloc_pages_nodemask+0xf3/0x4d9
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<eda10484>] ? evtchn_ioctl+0x22e/0x28c [xen_evtchn]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<eda10256>] ? evtchn_ioctl+0x0/0x28c [xen_evtchn]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10c6520>] ? vfs_ioctl+0x1c/0x5f
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10c6ab4>] ? do_vfs_ioctl+0x4aa/0x4e5
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10bb8e6>] ? fsnotify_modify+0x5a/0x61
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<eda104e2>] ? evtchn_write+0x0/0xda [xen_evtchn]
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10bc4c4>] ? vfs_write+0x9e/0xd6
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c10c6b30>] ? sys_ioctl+0x41/0x58
Aug 17 12:35:45 centrum kernel: [ 1456.620463]  [<c1008f7c>] ? syscall_call+0x7/0xb

Bye,
Giuseppe




--- End Message ---
--- Begin Message ---
Source: user-mode-linux
Source-Version: 2.6.32-1um-4+41

We believe that the bug you reported is fixed in the latest version of
user-mode-linux, which is due to be installed in the Debian FTP archive:

user-mode-linux_2.6.32-1um-4+41.diff.gz
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41.diff.gz
user-mode-linux_2.6.32-1um-4+41.dsc
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41.dsc
user-mode-linux_2.6.32-1um-4+41_amd64.deb
  to main/u/user-mode-linux/user-mode-linux_2.6.32-1um-4+41_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 638172@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
dann frazier <dannf@debian.org> (supplier of updated user-mode-linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Mon, 16 Jan 2012 15:10:25 -0700
Source: user-mode-linux
Binary: user-mode-linux
Architecture: source amd64
Version: 2.6.32-1um-4+41
Distribution: stable
Urgency: high
Maintainer: User Mode Linux Maintainers <pkg-uml-pkgs@lists.alioth.debian.org>
Changed-By: dann frazier <dannf@debian.org>
Description: 
 user-mode-linux - User-mode Linux (kernel)
Closes: 586494 633526 637234 637308 638172 641661 645308 647624 650160 650652 651255 651367 652857 653398 655049
Changes: 
 user-mode-linux (2.6.32-1um-4+41) stable; urgency=high
 .
   * Rebuild against linux-source-2.6.32 (2.6.32-41):
     * Add longterm releases 2.6.32.47 and 2.6.32.48, including:
       - atm: br2684: Fix oops due to skb->dev being NULL
       - md/linear: avoid corrupting structure while waiting for rcu_free to
         complete.
       - xen/smp: Warn user why they keel over - nosmp or noapic and what to use
         instead. (Closes: #637308)
       - md: Fix handling for devices from 2TB to 4TB in 0.90 metadata.
       - net/9p: fix client code to fail more gracefully on protocol error
       - fs/9p: Fid is not valid after a failed clunk.
       - TPM: Call tpm_transmit with correct size (CVE-2011-1161)
       - TPM: Zero buffer after copying to userspace (CVE-2011-1162)
       - libiscsi_tcp: fix LLD data allocation
       - cfg80211: Fix validation of AKM suites
       - USB: pid_ns: ensure pid is not freed during kill_pid_info_as_uid
       - kobj_uevent: Ignore if some listeners cannot handle message
         (Closes: #641661)
       - nfsd4: ignore WANT bits in open downgrade
       - [s390] KVM: check cpu_id prior to using it
       - cfq: merge cooperating cfq_queues
       - [x86] KVM: Reset tsc_timestamp on TSC writes (fixes guest performance
         regression introduced in 2.6.32-35)
       - ext4: fix BUG_ON() in ext4_ext_insert_extent()
       - ext2,ext3,ext4: don't inherit APPEND_FL or IMMUTABLE_FL for new inodes
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.47
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.48
       and the bug report which this closes: #647624.
     * tg3: Fix I/O failures after chip reset (Closes: #645308; regression in
       2.6.32-36)
     * Add longterm release 2.6.32.49, including:
       - SCSI: st: fix race in st_scsi_execute_end
       - NFS/sunrpc: don't use a credential with extra groups.
       - netlink: validate NLA_MSECS length
       - hfs: add sanity check for file name length (CVE-2011-4330)
       - md/raid5: abort any pending parity operations when array fails.
       - mm: avoid null pointer access in vm_struct via /proc/vmallocinfo
       - ipv6: udp: fix the wrong headroom check (CVE-2011-4326)
       - USB: Fix Corruption issue in USB ftdi driver ftdi_sio.c
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.49
       and the bug report which this closes: #650160.
     * ipv6: Allow inet6_dump_addr() to handle more than 64 addresses
       (Closes: #651255)
     * Add longterm release 2.6.32.50, including:
       - PCI hotplug: shpchp: don't blindly claim non-AMD 0x7450 device IDs
         (see #638863)
       - sched, x86: Avoid unnecessary overflow in sched_clock
       - [x86] mpparse: Account for bus types other than ISA and PCI
         (Closes: #586494)
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.50
       and the bug report which this closes: #651367.
     * [vserver] Update patch to 2.6.32.48-vs2.3.0.36.29.8
       - nfs: Fix client uid/gid caching (Closes: #633526)
     * [x86] Add isci driver from Linux 3.1 (Closes: #652857)
       - libsas: fix definition of wideport, include local sas address
       - [x86] Introduce pci_map_biosrom()
     * Add longterm release 2.6.32.51, including:
       - percpu: fix chunk range calculation
       - xfrm: Fix key lengths for rfc3686(ctr(aes)) (Closes: #650652)
       - jbd/jbd2: validate sb->s_first in journal_get_superblock()
         (CVE-2011-4132)
       - Make taskstats require root access (CVE-2011-2494)
       - hfs: fix hfs_find_init() sb->ext_tree NULL ptr oops (CVE-2011-2203)
       - oprofile, x86: Fix nmi-unsafe callgraph support
       - ext4: avoid hangs in ext4_da_should_update_i_disksize()
     * xen: backport upstream (xen.git#xen/stable-2.6.32.y) fixes to event
       handling:
       - multiple fixes to PIRQ event channel handling (Closes: #638172)
       - setup IRQ before binding VIRQ to it.
       - correctly setup event channel mask for secondary CPUs on restore.
       - use locked set/clear bit when manipulating event channel masks.
       - ensure event channels are handled in a fair/round-robin order preventing
         lower numbered event channels from starving higher.
     * xen: blkback: don't fail empty barrier requests (Closes: #637234)
     * ipv6: make fragment identifications less predictable (CVE-2011-2699)
       - fix NULL dereference in udp6_ufo_fragment (see #643817)
     * Add longterm release 2.6.32.52:
       - Revert "clockevents: Set noop handler in clockevents_exchange_device()",
         included in stable update 2.6.32.50 (Closes: #653398)
     * Add longterm release 2.6.32.53, including:
       - cfq-iosched: fix cfq_cic_link() race confition
       For the complete list of changes, see:
        http://www.kernel.org/pub/linux/kernel/v2.6/longterm/ChangeLog-2.6.32.53
       and the bug report which this closes: #655049.
Checksums-Sha1: 
 f494d27c53a7b37ca3a4347b436edd3524e68c02 2030 user-mode-linux_2.6.32-1um-4+41.dsc
 b488267ef63e4218f70c47ee51b40502007b5233 19896 user-mode-linux_2.6.32-1um-4+41.diff.gz
 9f7914a7a62777ecf85299f2b72ede31753c8afd 7082050 user-mode-linux_2.6.32-1um-4+41_amd64.deb
Checksums-Sha256: 
 ba2f5619cd4026bd17a83d3b6a0eaed47b9c62bc0cf46ec3ddf56f1d23f5593b 2030 user-mode-linux_2.6.32-1um-4+41.dsc
 5ccf08629fadd90d1083e938c8000fa2499028bfb91f0914b673e4b031214942 19896 user-mode-linux_2.6.32-1um-4+41.diff.gz
 f84c0799d02381f79ccbf1b78d2704011eb5a1158b63d4a724cbbf6e771c3e67 7082050 user-mode-linux_2.6.32-1um-4+41_amd64.deb
Files: 
 99409f5e1cce01848a20d64c09487d7c 2030 kernel extra user-mode-linux_2.6.32-1um-4+41.dsc
 80d12b694c2947277796884f1d9c36cd 19896 kernel extra user-mode-linux_2.6.32-1um-4+41.diff.gz
 491732fc5e1e2a828e84767f691059a1 7082050 kernel extra user-mode-linux_2.6.32-1um-4+41_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=JLYM
-----END PGP SIGNATURE-----



--- End Message ---

Reply to: