kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #00653
[Bug 1189565] Re: Random CPU hard locks on Intel D101GGC w/12.04 Server
Are there any other tests which would be helpful for me to perform? Any
other information which may be of use?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1189565
Title:
Random CPU hard locks on Intel D101GGC w/12.04 Server
Status in “linux” package in Ubuntu:
Confirmed
Bug description:
itdept@toolbox:~$ lsb_release -rd
Description: Ubuntu 12.04.2 LTS
Release: 12.04
itdept@toolbox:/var/log$ apt-cache policy linux
linux:
Installed: (none)
Candidate: 3.2.0.45.54
Version table:
3.2.0.45.54 0
500 http://us.archive.ubuntu.com/ubuntu/ precise-updates/main amd64 Packages
500 http://security.ubuntu.com/ubuntu/ precise-security/main amd64 Packages
3.2.0.23.25 0
500 http://us.archive.ubuntu.com/ubuntu/ precise/main amd64 Packages
itdept@toolbox:/var/log$ apt-cache policy linux-generic-lts-quantal
linux-generic-lts-quantal:
Installed: 3.5.0.32.39
Candidate: 3.5.0.32.39
Version table:
*** 3.5.0.32.39 0
500 http://us.archive.ubuntu.com/ubuntu/ precise-updates/main amd64 Packages
500 http://security.ubuntu.com/ubuntu/ precise-security/main amd64 Packages
100 /var/lib/dpkg/status
Following a clean install of 12.04 Server, I was experiencing
seemingly random 'hard LOCKUP's on my machine. The computer would
become unresponsive for several minutes at a time, and something like
this would show up in dmesg:
[1509353.540014] ------------[ cut here ]------------
[1509353.540014] WARNING: at /build/buildd/linux-lts-quantal-3.5.0/kernel/watchdog.c:242 watchdog_overflow_callback+0x9a/0xc0()
[1509353.540014] Hardware name:
[1509353.540014] Watchdog detected hard LOCKUP on cpu 1
[1509353.540014] Modules linked in: btrfs zlib_deflate libcrc32c ufs qnx4 hfsplus hfs minix ntfs msdos jfs xfs reiserfs radeon snd_hda_codec_realtek snd_hda_intel snd_hda_codec ttm snd_hwdep drm_kms_helper snd_pcm drm snd_timer snd ext2 soundcore i2c_algo_bit i2c_piix4 snd_page_alloc serio_raw shpchp microcode mac_hid ppdev parport_pc lp parport hid_generic usbhid 8139too hid 8139cp sata_sil pata_atiixp
[1509353.540014] Pid: 21317, comm: kworker/1:0 Tainted: G W 3.5.0-30-generic #51~precise1-Ubuntu
[1509353.540014] Call Trace:
[1509353.540014] <NMI> [<ffffffff81052c8f>] warn_slowpath_common+0x7f/0xc0
[1509353.540014] [<ffffffff81052d86>] warn_slowpath_fmt+0x46/0x50
[1509353.540014] [<ffffffff810e1d2a>] watchdog_overflow_callback+0x9a/0xc0
[1509353.540014] [<ffffffff8111f79c>] __perf_event_overflow+0x9c/0x220
[1509353.540014] [<ffffffff8111c854>] ? perf_event_update_userpage+0x24/0x110
[1509353.540014] [<ffffffff8111fe84>] perf_event_overflow+0x14/0x20
[1509353.540014] [<ffffffff81027225>] p4_pmu_handle_irq+0x125/0x210
[1509353.540014] [<ffffffff8169e711>] perf_event_nmi_handler+0x21/0x30
[1509353.540014] [<ffffffff8169de51>] nmi_handle.isra.0+0x51/0x80
[1509353.540014] [<ffffffff8169df68>] default_do_nmi+0x58/0x240
[1509353.540014] [<ffffffff8169e1e0>] do_nmi+0x90/0xd0
[1509353.540014] [<ffffffff8169d47c>] end_repeat_nmi+0x1a/0x1e
[1509353.540014] [<ffffffff8139a819>] ? acpi_os_write_port+0x1e/0x30
[1509353.540014] [<ffffffff8139a819>] ? acpi_os_write_port+0x1e/0x30
[1509353.540014] [<ffffffff8139a819>] ? acpi_os_write_port+0x1e/0x30
[1509353.540014] <<EOE>> [<ffffffff8153248d>] do_drv_write+0x2d/0x70
[1509353.540014] [<ffffffff81532721>] acpi_cpufreq_target+0x251/0x2a0
[1509353.540014] [<ffffffff8152b5a2>] __cpufreq_driver_target+0x42/0x50
[1509353.540014] [<ffffffff8152f68f>] dbs_check_cpu+0x28f/0x330
[1509353.540014] [<ffffffff8152f7d1>] do_dbs_timer+0xa1/0x110
[1509353.540014] [<ffffffff81071af7>] process_one_work+0x127/0x470
[1509353.540014] [<ffffffff81072d35>] worker_thread+0x165/0x370
[1509353.540014] [<ffffffff81072bd0>] ? manage_workers.isra.29+0x130/0x130
[1509353.540014] [<ffffffff81077cd3>] kthread+0x93/0xa0
[1509353.540014] [<ffffffff816a6524>] kernel_thread_helper+0x4/0x10
[1509353.540014] [<ffffffff81077c40>] ? flush_kthread_worker+0xb0/0xb0
[1509353.540014] [<ffffffff816a6520>] ? gs_change+0x13/0x13
[1509353.540014] ---[ end trace 31bbfa84b207ef07 ]---
Following installation of a BIOS update, the logged lockups are less
frequent (twice in 20 days, as opposed to several times per day) and
far more brief (haven't caught one in progress since, as opposed to
being unable to do anything but wait for 5-10 minutes per occurrence)
but are still occurring.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1189565/+subscriptions