Bug 359671
Summary: | RHEL4: Hald causes system deadlock on ia64 | ||||||
---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise Linux 4 | Reporter: | Norm Murray <nmurray> | ||||
Component: | kernel | Assignee: | Prarit Bhargava <prarit> | ||||
Status: | CLOSED ERRATA | QA Contact: | Martin Jenner <mjenner> | ||||
Severity: | low | Docs Contact: | |||||
Priority: | low | ||||||
Version: | 4.5 | CC: | cward, jbaron, tao | ||||
Target Milestone: | --- | Keywords: | OtherQA | ||||
Target Release: | --- | ||||||
Hardware: | ia64 | ||||||
OS: | Linux | ||||||
Whiteboard: | |||||||
Fixed In Version: | RHSA-2008-0665 | Doc Type: | Bug Fix | ||||
Doc Text: | Story Points: | --- | |||||
Clone Of: | Environment: | ||||||
Last Closed: | 2008-07-24 19:19:04 UTC | Type: | --- | ||||
Regression: | --- | Mount Type: | --- | ||||
Documentation: | --- | CRM: | |||||
Verified Versions: | Category: | --- | |||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
Cloudforms Team: | --- | Target Upstream Version: | |||||
Embargoed: | |||||||
Bug Depends On: | |||||||
Bug Blocks: | 430698 | ||||||
Attachments: |
|
Description
Wade Mealing
2007-10-31 05:41:27 UTC
>Hald attempts to invalidate a block device ( invalidate_bdev ) which in turn
>calls lock_kernel, if other CPU's are attempting to handle IPI events, the
>kernel becomes deadlocked.
lock_kernel should be safe to do when smp_call_function is called.
Wade, is the customer ejecting the CD and seeing a hang?
P.
From the discussion of the patch on http://readlist.com/lists/vger.kernel.org/linux-kernel/49/245359.html, the problem seems to be altix specific. Prarit, what's your plan on the bug? re: comment 8 - please note that this is a Unisys system. This is a tough one -- I've tried to reproduce it here on a 64p/128G box but so far have been unable to. I'll ping gbeshers (on site SGI engineer) as well as jes (who acked the patch upstream) to see if they have any ideas on reproducers. P. Spoke with Jes regarding the patch -- he agrees with me that the patch is safe to take in and shouldn't require any other patches. I will post to RHKL shortly. P. Created attachment 295293 [details]
RHEL4 patch for this issue
Since this is in POST, can we get a DEV ACK? This request was evaluated by Red Hat Product Management for inclusion in a Red Hat Enterprise Linux maintenance release. Product Management has requested further review of this request by Red Hat Engineering, for potential inclusion in a Red Hat Enterprise Linux Update release for currently deployed products. This request is not yet committed for inclusion in an Update release. Committed in 68.15.EL . RPMS are available at http://people.redhat.com/vgoyal/rhel4/ ~~~~~~~~~~~~~~ ~ Attention: ~ Feedback requested regarding this **High Priority** bug. ~~~~~~~~~~~~~~ A fix for this issue should be included in the latest packages contained in RHEL4.7-Snapshot1--available now on partners.redhat.com. After you (Red Hat Partner) have verified that this issue has been addressed, submit a comment describing the passing results of your test in appropriate detail, along with which snapshot and package version tested. The bugzilla will be updated by Red Hat Quality Engineering for you when this information has been received. If you believe this issue has not properly fixed or you are unable to verify the issue for any reason, please add a comment describing the most recent issues you are experiencing, along with which snapshot and package version tested. If you believe the bug has not been fixed, change the status of the bug to ASSIGNED. If you are receiving this message in Issue Tracker, please reply with a message to Issue Tracker about your results and bugzilla will be updated for you. If you need assistance accessing ftp://partners.redhat.com, please contact your Partner Manager. Thank you Red Hat QE Partner Management Correction: This bug is **Low Priority**. Sorry. ~~~~~~~~~~~~~~ ~ Attention: ~ ~~~~~~~~~~~~~~ A fix for this issue should be included in the latest kernel packages contained in **kernel 2.6.9-73.EL**, accessible now on http://partners.redhat.com. After you (Red Hat Partner) have verified that this issue has been addressed, submit a comment describing the results of your test in appropriate detail, along with which snapshot and package version tested. The bugzilla will be updated by Red Hat Quality Engineering for you when this information has been received. If this issue has not been properly fixed or you are unable to verify the issue for any reason, please add a comment describing the most recent issues you are experiencing, along with which snapshot and package version tested. If you are sure the bug has not been fixed, change the status of the bug to ASSIGNED. For IssueTracker users, submit verification results as usual; Bugzilla will be updated by Red Hat Quality Engineering for you. For additional information, contact your Partner Manager. Thank you, Red Hat QE Partner Management ~ Attention ~ Testing Feedback Deadlines are approaching! This bug should fixed in Partner Snapshot 4, which is now available on partners.redhat.com, ready for testing. We are approaching the end of RHEL 4.7 testing cycle. It is important to let us know of your testing results *as soon as possible*. If any issues are found once the testing phase deadline has passed, you might lose your opportunity to include the fix in this RHEL update. If you have verified that this bug has been properly fixed or have discovered any issues, please provide detailed feedback of your testing results, including the package version and snapshot tested. The bug status will be updated for you, based on testing results. Contact your Partner Manager with any additional questions. ~ Final Notice ~ Testing Phase Ending Soon This bug should have been fixed in the latest RHEL 4.7 Release Candidate, available **now** on partners.redhat.com. If you have already verified that this bug has been properly fixed or have found any issues, please provide detailed feedback of your testing results, including the package version and snapshot tested. The bug status will be updated for you, based on the returned testing results. Contact your Partner Manager with any additional questions. An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2008-0665.html Partners, I would like to thank you all for your participation in assuring the quality of this RHEL 4.7 Update Release. My hat's off to you all. Thanks. |