apport information
** Tags added: apport-collected natty
** Description changed:
Got the following errors (listed below) when trying to enter a KVM Guest
running Ubuntu desktop 11.04 on top of a KVM Host running Ubuntu server 11.04
install.
This was done from a virt-manager running on a 11.04 desktop using ssh over
to the server.
The "entering" mentioned was merely to move the mouse to within the VM viewer.
I could still login to the KVM guest with ssh, though.
I tried shutting down the KVM guest from within using 'shutdown -h NOW',
but while this took down the OS, it apparently didn't properly shut down
the actual VM instance.
When trying to use virt-manager (remotely, as mentioned) to forcefully
shut it down, this didn't work out either - just hanging the GUI for a
little while, then stating that the operation timed out.
When using virsh when logged into the Host, I get:
virsh # destroy Store
error: Failed to destroy domain Store
error: Timed out during operation: cannot acquire state change lock
Then, after following some ideas from..
https://bugzilla.redhat.com/show_bug.cgi?id=676205
.. I now have a situation where virsh list doesn't even return:
endre@SixCore:~$ virsh
Welcome to virsh, the virtualization interactive terminal.
..
virsh # list
Id Name State
----------------------------------
17 NewDisk running
[.. hanging .. "Store" should have been printed here ..]
Today (the next day), I tried virsh list again, and this time it worked out,
with Store listed as "running". I then tried connecting via virt-manager, but
when trying to go into the machine (virt-viewer?) I get "Connecting to to
graphical console for Guest", just hanging.
I then tried to forcefully kill the VM again ("Force off" in virt-
manager), but this yields the following traceback. Notice the
"libvirtError: Timed out during operation: cannot acquire state change
lock".
Traceback (most recent call last):
File "/usr/share/virt-manager/virtManager/engine.py", line 908, in
_do_destroy_domain
vm.destroy()
File "/usr/share/virt-manager/virtManager/domain.py", line 1087, in destroy
self._backend.destroy()
File "/usr/lib/python2.7/dist-packages/libvirt.py", line 346, in destroy
if ret == -1: raise libvirtError ('virDomainDestroy() failed', dom=self)
libvirtError: Timed out during operation: cannot acquire state change lock
Aug 27 11:10:36 Store kernel: [36104.328903] general protection fault: 0000
[#2] SMP
Aug 27 11:10:36 Store kernel: [36104.328915] last sysfs file:
/sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:36 Store kernel: [36104.328923] CPU 1
Aug 27 11:10:36 Store kernel: [36104.328926] Modules linked in: binfmt_misc
parport_pc ppdev vesafb joydev psmouse virtio_balloon seri
o_raw i2c_piix4 lp parport usbhid hid virtio_net virtio_blk floppy virtio_pci
virtio_ring virtio
Aug 27 11:10:36 Store kernel: [36104.328965]
Aug 27 11:10:36 Store kernel: [36104.328972] Pid: 873, comm: Xorg Tainted: G
D 2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:36 Store kernel: [36104.328983] RIP: 0010:[<ffffffff8104ba86>]
[<ffffffff8104ba86>] __wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329002] RSP: 0018:ffff880078701b08
EFLAGS: 00010096
Aug 27 11:10:36 Store kernel: [36104.329008] RAX: ffff880053cf1c18 RBX:
d4d5281e29fedeed RCX: 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329014] RDX: 0000000000000001 RSI:
0000000000000001 RDI: ffff880053cf1c18
Aug 27 11:10:36 Store kernel: [36104.329020] RBP: ffff880078701b48 R08:
00000000000000c3 R09: 0000000000000246
Aug 27 11:10:36 Store kernel: [36104.329025] R10: ffff88007d00c800 R11:
0000000000000000 R12: 00000000627812c6
Aug 27 11:10:36 Store kernel: [36104.329031] R13: ffff880054826148 R14:
00000000000000c3 R15: 0000000000000001
Aug 27 11:10:36 Store kernel: [36104.329052] FS: 00007f55818758a0(0000)
GS:ffff88007fc40000(0000) knlGS:00000000f69a4880
Aug 27 11:10:36 Store kernel: [36104.329058] CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
Aug 27 11:10:36 Store kernel: [36104.329064] CR2: 00007f5b0ad2aa30 CR3:
000000007844d000 CR4: 00000000000006e0
Aug 27 11:10:36 Store kernel: [36104.329085] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Aug 27 11:10:36 Store kernel: [36104.329105] DR3: 0000000000000000 DR6:
00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:36 Store kernel: [36104.329113] Process Xorg (pid: 873,
threadinfo ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:36 Store kernel: [36104.329118] Stack:
Aug 27 11:10:36 Store kernel: [36104.329121] ffff880017e39f00
0000000100000001 ffff880078701b28 ffff880054826140
Aug 27 11:10:36 Store kernel: [36104.329130] 0000000000000001
0000000000000282 0000000000000001 00000000000000c3
Aug 27 11:10:36 Store kernel: [36104.329140] ffff880078701b88
ffffffff8104e373 ffff880078701b78 ffff880054bc49c0
Aug 27 11:10:36 Store kernel: [36104.329148] Call Trace:
Aug 27 11:10:36 Store kernel: [36104.329160] [<ffffffff8104e373>]
__wake_up_sync_key+0x53/0x80
Aug 27 11:10:36 Store kernel: [36104.329172] [<ffffffff814c15fe>]
sock_def_readable+0x3e/0x70
Aug 27 11:10:36 Store kernel: [36104.329254] [<ffffffff8155e32c>]
unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:36 Store kernel: [36104.329265] [<ffffffff814bafee>]
sock_aio_write+0x14e/0x160
Aug 27 11:10:36 Store kernel: [36104.329274] [<ffffffff814baea0>] ?
sock_aio_write+0x0/0x160
Aug 27 11:10:36 Store kernel: [36104.329284] [<ffffffff811653d3>]
do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:36 Store kernel: [36104.329319] [<ffffffff812ae958>] ?
apparmor_file_permission+0x18/0x20
Aug 27 11:10:36 Store kernel: [36104.329331] [<ffffffff81279c8c>] ?
security_file_permission+0x2c/0xb0
Aug 27 11:10:36 Store kernel: [36104.329339] [<ffffffff81164b01>] ?
rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329347] [<ffffffff811656a4>]
do_readv_writev+0xd4/0x1e0
Aug 27 11:10:36 Store kernel: [36104.329356] [<ffffffff81279cf3>] ?
security_file_permission+0x93/0xb0
Aug 27 11:10:36 Store kernel: [36104.329364] [<ffffffff81164b01>] ?
rw_verify_area+0x61/0xf0
Aug 27 11:10:36 Store kernel: [36104.329372] [<ffffffff811657f8>]
vfs_writev+0x48/0x60
Aug 27 11:10:36 Store kernel: [36104.329379] [<ffffffff81165981>]
sys_writev+0x51/0xc0
Aug 27 11:10:36 Store kernel: [36104.329387] [<ffffffff81086251>] ?
posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:36 Store kernel: [36104.329396] [<ffffffff8100c002>]
system_call_fastpath+0x16/0x1b
Aug 27 11:10:36 Store kernel: [36104.329401] Code: 39 d5 48 8d 42 e8 48 8b 1a
74 40 48 83 eb 18 eb 0b 0f 1f 40 00 48 89 d8 48 8d 5a e8 44 8b 20 4c 89 f1 44
89 fa 8b 75 cc 48 89 c7 <ff> 50 10 85 c0 74 0c 41 83 e4 01 74 06 83 6d c8 01 74
0d 48 8d
Aug 27 11:10:36 Store kernel: [36104.329468] RIP [<ffffffff8104ba86>]
__wake_up_common+0x56/0x90
Aug 27 11:10:36 Store kernel: [36104.329478] RSP <ffff880078701b08>
Aug 27 11:10:36 Store kernel: [36104.329486] ---[ end trace 6a7ca2093395d464
]---
Aug 27 11:10:37 Store kernel: [36104.872159] general protection fault: 0000
[#3] SMP
Aug 27 11:10:37 Store kernel: [36104.872173] last sysfs file:
/sys/devices/system/cpu/cpu5/cache/index2/shared_cpu_map
Aug 27 11:10:37 Store kernel: [36104.872182] CPU 0
Aug 27 11:10:37 Store kernel: [36104.872187] Modules linked in: binfmt_misc
parport_pc ppdev vesafb joydev psmouse virtio_balloon serio_raw i2c_piix4 lp
parport usbhid hid virtio_net virtio_blk floppy virtio_pci virtio_ring virtio
Aug 27 11:10:37 Store kernel: [36104.872223]
Aug 27 11:10:37 Store kernel: [36104.872230] Pid: 873, comm: Xorg Tainted: G
D 2.6.38-11-generic #48-Ubuntu Bochs Bochs
Aug 27 11:10:37 Store kernel: [36104.872280] RIP: 0010:[<ffffffff814c017c>]
[<ffffffff814c017c>] sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872301] RSP: 0000:ffff880078701798
EFLAGS: 00010286
Aug 27 11:10:37 Store kernel: [36104.872307] RAX: fffb880054826508 RBX:
ffff880054bc5040 RCX: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872313] RDX: ffff880054bc42c8 RSI:
0000000000000286 RDI: fffb880054826500
Aug 27 11:10:37 Store kernel: [36104.872319] RBP: ffff880078701798 R08:
0000000000000000 R09: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872324] R10: ffff880078265c10 R11:
0000000000000008 R12: ffff880054bc50b0
Aug 27 11:10:37 Store kernel: [36104.872330] R13: 0000000000000001 R14:
ffff880054bc4000 R15: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872348] FS: 00007f55818758a0(0000)
GS:ffff88007fc00000(0000) knlGS:00000000f69a4880
Aug 27 11:10:37 Store kernel: [36104.872355] CS: 0010 DS: 0000 ES: 0000 CR0:
0000000080050033
Aug 27 11:10:37 Store kernel: [36104.872361] CR2: 00000000004002a8 CR3:
0000000079ad4000 CR4: 00000000000006f0
Aug 27 11:10:37 Store kernel: [36104.872382] DR0: 0000000000000000 DR1:
0000000000000000 DR2: 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872403] DR3: 0000000000000000 DR6:
00000000ffff0ff0 DR7: 0000000000000400
Aug 27 11:10:37 Store kernel: [36104.872411] Process Xorg (pid: 873,
threadinfo ffff880078700000, task ffff8800792cadc0)
Aug 27 11:10:37 Store kernel: [36104.872416] Stack:
Aug 27 11:10:37 Store kernel: [36104.872420] ffff880078701808
ffffffff8155bf78 ffff8800787017c8 ffffffff81178d3f
Aug 27 11:10:37 Store kernel: [36104.872429] ffff8800390d1600
ffff880054bc42c8 00000000787017e8 0000000000000000
Aug 27 11:10:37 Store kernel: [36104.872439] ffff880078265c10
ffff8800626a9e40 0000000000000000 ffff88004b7d2180
Aug 27 11:10:37 Store kernel: [36104.872448] Call Trace:
Aug 27 11:10:37 Store kernel: [36104.872462] [<ffffffff8155bf78>]
unix_release_sock+0x208/0x250
Aug 27 11:10:37 Store kernel: [36104.872474] [<ffffffff81178d3f>] ?
__d_free+0x4f/0x70
Aug 27 11:10:37 Store kernel: [36104.872484] [<ffffffff8155bfe6>]
unix_release+0x26/0x30
Aug 27 11:10:37 Store kernel: [36104.872492] [<ffffffff814bb8d9>]
sock_release+0x29/0x90
Aug 27 11:10:37 Store kernel: [36104.872499] [<ffffffff814bb957>]
sock_close+0x17/0x30
Aug 27 11:10:37 Store kernel: [36104.872508] [<ffffffff811661fe>]
__fput+0xbe/0x200
Aug 27 11:10:37 Store kernel: [36104.872515] [<ffffffff81166365>]
fput+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872523] [<ffffffff81162c40>]
filp_close+0x60/0x90
Aug 27 11:10:37 Store kernel: [36104.872534] [<ffffffff81069e08>]
put_files_struct+0x88/0xf0
Aug 27 11:10:37 Store kernel: [36104.872542] [<ffffffff81069f34>]
exit_files+0x54/0x70
Aug 27 11:10:37 Store kernel: [36104.872576] [<ffffffff8106a425>]
do_exit+0x175/0x410
Aug 27 11:10:37 Store kernel: [36104.872588] [<ffffffff815c484f>]
oops_end+0xaf/0xf0
Aug 27 11:10:37 Store kernel: [36104.872597] [<ffffffff810100eb>]
die+0x5b/0x90
Aug 27 11:10:37 Store kernel: [36104.872605] [<ffffffff815c4342>]
do_general_protection+0x162/0x170
Aug 27 11:10:37 Store kernel: [36104.872613] [<ffffffff815c3b65>]
general_protection+0x25/0x30
Aug 27 11:10:37 Store kernel: [36104.872624] [<ffffffff8104ba86>] ?
__wake_up_common+0x56/0x90
Aug 27 11:10:37 Store kernel: [36104.872633] [<ffffffff8104ba89>] ?
__wake_up_common+0x59/0x90
Aug 27 11:10:37 Store kernel: [36104.872642] [<ffffffff8104e373>]
__wake_up_sync_key+0x53/0x80
Aug 27 11:10:37 Store kernel: [36104.872651] [<ffffffff814c15fe>]
sock_def_readable+0x3e/0x70
Aug 27 11:10:37 Store kernel: [36104.872661] [<ffffffff8155e32c>]
unix_stream_sendmsg+0x2cc/0x470
Aug 27 11:10:37 Store kernel: [36104.872670] [<ffffffff814bafee>]
sock_aio_write+0x14e/0x160
Aug 27 11:10:37 Store kernel: [36104.872679] [<ffffffff814baea0>] ?
sock_aio_write+0x0/0x160
Aug 27 11:10:37 Store kernel: [36104.872687] [<ffffffff811653d3>]
do_sync_readv_writev+0xd3/0x110
Aug 27 11:10:37 Store kernel: [36104.872700] [<ffffffff812ae958>] ?
apparmor_file_permission+0x18/0x20
Aug 27 11:10:37 Store kernel: [36104.872710] [<ffffffff81279c8c>] ?
security_file_permission+0x2c/0xb0
Aug 27 11:10:37 Store kernel: [36104.872719] [<ffffffff81164b01>] ?
rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872727] [<ffffffff811656a4>]
do_readv_writev+0xd4/0x1e0
Aug 27 11:10:37 Store kernel: [36104.872736] [<ffffffff81279cf3>] ?
security_file_permission+0x93/0xb0
Aug 27 11:10:37 Store kernel: [36104.872744] [<ffffffff81164b01>] ?
rw_verify_area+0x61/0xf0
Aug 27 11:10:37 Store kernel: [36104.872752] [<ffffffff811657f8>]
vfs_writev+0x48/0x60
Aug 27 11:10:37 Store kernel: [36104.872759] [<ffffffff81165981>]
sys_writev+0x51/0xc0
Aug 27 11:10:37 Store kernel: [36104.872767] [<ffffffff81086251>] ?
posix_ktime_get_ts+0x11/0x20
Aug 27 11:10:37 Store kernel: [36104.872775] [<ffffffff8100c002>]
system_call_fastpath+0x16/0x1b
Aug 27 11:10:37 Store kernel: [36104.872780] Code: 5c 41 5d c9 c3 66 2e 0f 1f
84 00 00 00 00 00 55 48 89 e5 66 66 66 66 90 48 8b bf b8 00 00 00 0f ae f0 48
85 ff 74 18 48 8d 47 08 <48> 39 47 08 74 0e 31 c9 31 d2 be 01 00 00 00 e8 30 e2
b8 ff c9
Aug 27 11:10:37 Store kernel: [36104.872848] RIP [<ffffffff814c017c>]
sock_def_wakeup+0x1c/0x40
Aug 27 11:10:37 Store kernel: [36104.872857] RSP <ffff880078701798>
Aug 27 11:10:37 Store kernel: [36104.872866] ---[ end trace 6a7ca2093395d465
]---
Aug 27 11:10:37 Store kernel: [36104.872872] Fixing recursive fault but
reboot is needed!
+ ---
+ Architecture: amd64
+ DistroRelease: Ubuntu 11.04
+ InstallationMedia: Ubuntu-Server 11.04 "Natty Narwhal" - Release amd64
(20110426)
+ KvmCmdLine:
+ UID PID PPID C SZ RSS PSR STIME TTY TIME CMD
+ 103 1787 1 1 325928 293584 2 Aug30 ? 00:01:37 /usr/bin/kvm
-S -M pc-0.14 -cpu
phenom,+wdt,+skinit,+osvw,+3dnowprefetch,+misalignsse,+sse4a,+abm,+cr8legacy,+extapic,+cmp_legacy,+lahf_lm,+rdtscp,+pdpe1gb,+popcnt,+cx16,+ht,+vme
-enable-nesting -enable-kvm -m 1024 -smp 4,sockets=4,cores=1,threads=1 -name
NewDisk -uuid e8248de8-adde-3f92-37ef-29846c155803 -nodefconfig -nodefaults
-chardev
socket,id=charmonitor,path=/var/lib/libvirt/qemu/NewDisk.monitor,server,nowait
-mon chardev=charmonitor,id=monitor,mode=readline -rtc base=utc -boot
order=c,menu=off -drive
file=/dev/SixCoreVG/NewDisk_Root,if=none,id=drive-virtio-disk0,boot=on,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x4,drive=drive-virtio-disk0,id=virtio-disk0
-drive
file=/dev/SixCoreVG/NewDisk_Data,if=none,id=drive-virtio-disk2,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x7,drive=drive-virtio-disk2,id=virtio-disk2
-drive
file=/dev/SixCoreVG/NewDisk_Swap,if=none,id=drive-virtio-disk1,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x6,drive=drive-virtio-disk1,id=virtio-disk1
-drive if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device
ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0 -netdev
tap,fd=14,id=hostnet0 -device
virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:e7:c4:03,bus=pci.0,addr=0x3
-chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0
-usb -device usb-tablet,id=input0 -vnc 127.0.0.1:0 -vga std -device
virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x5
+ 103 1836 1 0 592299 401676 4 Aug30 ? 00:01:10 /usr/bin/kvm
-S -M pc-0.14 -cpu
phenom,+wdt,+skinit,+osvw,+3dnowprefetch,+misalignsse,+sse4a,+abm,+cr8legacy,+extapic,+cmp_legacy,+lahf_lm,+rdtscp,+pdpe1gb,+popcnt,+cx16,+ht,+vme
-enable-nesting -enable-kvm -m 2048 -smp 6,sockets=6,cores=1,threads=1 -name
Store -uuid 843a7cad-5c09-06a8-c0a2-df163897448e -nodefconfig -nodefaults
-chardev
socket,id=charmonitor,path=/var/lib/libvirt/qemu/Store.monitor,server,nowait
-mon chardev=charmonitor,id=monitor,mode=readline -rtc base=utc -boot
order=c,menu=off -drive
file=/dev/SixCoreVG/Store_Root,if=none,id=drive-virtio-disk0,boot=on,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x4,drive=drive-virtio-disk0,id=virtio-disk0
-drive file=/dev/SixCoreVG/Store_Swap,if=none,id=drive-virtio-disk1,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x5,drive=drive-virtio-disk1,id=virtio-disk1
-drive file=/dev/SixCoreVG/Store_Data,if=none,id=drive-virtio-disk2,format=raw
-device
virtio-blk-pci,bus=pci.0,addr=0x6,drive=drive-virtio-disk2,id=virtio-disk2
-drive if=none,media=cdrom,id=drive-ide0-1-0,readonly=on,format=raw -device
ide-drive,bus=ide.1,unit=0,drive=drive-ide0-1-0,id=ide0-1-0 -netdev
tap,fd=14,id=hostnet0 -device
virtio-net-pci,netdev=hostnet0,id=net0,mac=52:54:00:e1:14:d4,bus=pci.0,addr=0x3
-chardev pty,id=charserial0 -device isa-serial,chardev=charserial0,id=serial0
-usb -device usb-tablet,id=input0 -vnc 127.0.0.1:1 -vga std -device
virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x7
+ MachineType: System manufacturer System Product Name
+ Package: kvm 1:84+dfsg-0ubuntu16+0.14.0+noroms+0ubuntu4.4
+ PackageArchitecture: amd64
+ ProcEnviron:
+ LANGUAGE=en_US:en
+ PATH=(custom, user)
+ LANG=en_US.UTF-8
+ SHELL=/bin/bash
+ ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-2.6.38-11-server
root=/dev/mapper/hostnameVG-hostnameLV_Root ro
+ ProcVersionSignature: Ubuntu 2.6.38-11.48-server 2.6.38.8
+ Tags: natty
+ Uname: Linux 2.6.38-11-server x86_64
+ UpgradeStatus: No upgrade log present (probably fresh install)
+ UserGroups: adm admin cdrom dialout libvirtd lpadmin plugdev sambashare
+ dmi.bios.date: 06/13/2011
+ dmi.bios.vendor: American Megatrends Inc.
+ dmi.bios.version: 2201
+ dmi.board.asset.tag: To Be Filled By O.E.M.
+ dmi.board.name: M4A89GTD-PRO/USB3
+ dmi.board.vendor: ASUSTeK Computer INC.
+ dmi.board.version: Rev 1.xx
+ dmi.chassis.asset.tag: Asset-1234567890
+ dmi.chassis.type: 3
+ dmi.chassis.vendor: Chassis Manufacture
+ dmi.chassis.version: Chassis Version
+ dmi.modalias:
dmi:bvnAmericanMegatrendsInc.:bvr2201:bd06/13/2011:svnSystemmanufacturer:pnSystemProductName:pvrSystemVersion:rvnASUSTeKComputerINC.:rnM4A89GTD-PRO/USB3:rvrRev1.xx:cvnChassisManufacture:ct3:cvrChassisVersion:
+ dmi.product.name: System Product Name
+ dmi.product.version: System Version
+ dmi.sys.vendor: System manufacturer
** Attachment added: "BootDmesg.txt"
https://bugs.launchpad.net/bugs/836119/+attachment/2334917/+files/BootDmesg.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/836119
Title:
KVM Guest gets general protection fault on two CPUs
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kvm/+bug/836119/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs