Package: redhat-cluster-modules-2.6.18-5-686-bigmem Version: 2.6.18+1.03.00-7+etch3 Severity: important
n a 3 machine cluster, we experienced kernel Oopses in GFS, resulting in software locks. Traces look like this : Oops: 0000 [#2] SMP Modules linked in: ip_vs_rr linear md_mod lock_dlm dlm gfs lock_harness cman dm_round_robin dm_emc ib_iser rdma_cm ib_addr ib_cm ib_sa ib_mad ib_core iscsi_tcp libiscsi scsi_transport_iscsi iptable_mangle iptable_nat ip_nat xt_tcpudp xt_state ip_conntrack nfnetlink xt_limit iptable_filter ip_tables x_tables ipmi_devintf ipmi_si ipmi_msghandler 8021q ipv6 bonding ext2 dm_snapshot dm_mirror ip_vs ide_floppy rtc psmouse serio_raw pcspkr e752x_edac floppy edac_mc shpchp pci_hotplug tsdev evdev sg dm_multipath dm_mod ext3 jbd mbcache ide_cd cdrom sd_mod usbhid megaraid_mbox scsi_mod megaraid_mm e1000 siimage ehci_hcd piix uhci_hcd generic usbcore ide_core thermal processor fan CPU: 1 EIP: 0060:[<f8c0d451>] Not tainted VLI EFLAGS: 00210206 (2.6.18-5-686-bigmem #1) EIP is at gfs_glock_dq+0x93/0x12e [gfs] eax: e612a3e4 ebx: e612a3c0 ecx: 00000000 edx: 00000000 esi: f6d11a58 edi: 000c202b ebp: f13bc158 esp: d6013efc ds: 007b es: 007b ss: 0068 Process apache (pid: 7985, ti=d6012000 task=d3d52aa0 task.ti=d6012000) Stack: f8c3d4c0 f6d11a58 f6d11a40 00000001 dff54bc0 f8c0d6a5 f6d11a58 f8c1bd67 dfc2a2fc 00000007 dff54bc0 e39f54fc dff54bc0 d6013f30 d6013f30 00000000 d3d52aa0 00000003 00000200 00000000 000000c2 00000000 00000000 00000000 Call Trace: [<f8c0d6a5>] gfs_glock_dq_uninit+0x8/0x10 [gfs] [<f8c1bd67>] gfs_flock+0x9b/0x1e1 [gfs] [<c01599db>] vfs_read+0x101/0x141 [<f8c1bccc>] gfs_flock+0x0/0x1e1 [gfs] [<c016c037>] sys_flock+0x114/0x147 [<c0102c0d>] sysenter_past_esp+0x56/0x79 Code: a7 bc c2 f8 e8 09 c5 01 00 5f 5d f6 46 15 08 74 06 f0 0f ba 6b 08 04 f6 46 15 04 74 2b 8b 4b 24 31 ed 31 ff eb 05 89 cd 47 89 d1 <8b> 11 0f 18 02 90 8d 43 24 39 c1 75 ee 39 f5 75 0c 4f 75 09 31 EIP: [<f8c0d451>] gfs_glock_dq+0x93/0x12e [gfs] SS:ESP 0068:d6013efc It looks like this bug has been fixed upstream at the beginning of this year : http://webui.sourcelabs.com/rhel/issues/426291 This is an important bug, as it may result in a Denial of Service, due to services hanging in uninterruptible sleep. Regards, Vincent Riquer -- System Information: Debian Release: 4.0 APT prefers stable APT policy: (500, 'stable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-5-686-bigmem Locale: LANG=fr_FR, LC_CTYPE=fr_FR (charmap=ISO-8859-1) Versions of packages redhat-cluster-modules-2.6.18-5-686-bigmem depends on: ii linux-image-2.6.18 2.6.18.dfsg.1-13etch1 Linux 2.6.18 image on PPro/Celeron redhat-cluster-modules-2.6.18-5-686-bigmem recommends no packages. -- no debconf information -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]