Bug#599615: marked as done (linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!)

2016-05-29 Thread Debian Bug Tracking System
Your message dated Sun, 29 May 2016 21:24:52 +0100
with message-id bb988196-8498-43db-9385-1ade81a51...@decadent.org.uk
and subject line Closing bugs assigned to linux-2.6 package
has caused the Debian Bug report #599615,
regarding linux-image-2.6.32-5-xen-686: kernel BUG at 
/buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi 
an/build/source_i386_xen/drivers/md/md.c: 6192!
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
599615: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599615
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: linux-image-2.6.32-5-xen-686
Version: 2.6.32-24

I am experiencing various problems with I/O of domU's and dom0 choking when
using drbd-backed Xen VMs.

I saw this message on console after a failed attempt to reboot:

(hand-transcribed)
kernel BUG at 
/buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192!
invalid opcode:  [#1] SMP


--- End Message ---
--- Begin Message ---
Version: 3.4.1-1~experimental.1+rm

Debian 6.0 Long Term Support has ended, and the 'linux-2.6' source
package will no longer be updated.  This bug was reassigned to the
'linux' source package earlier today, but I am now closing it on the
assumption that it does not affect the kernel versions in newer Debian
releases.

If you can still reproduce this bug in a newer release, please reopen
the bug report and reassign it to 'src:linux' and the affected version
of the package.  You can find the package version for the running
kernel by running:

uname -v

or the versions of all installed kernel packages by running:

dpkg -l 'linux-image-[34]*' | grep ^.i

and looking at the third column.

I apologise that we weren't able to provide a specific resolution for
this bug.

Ben.

-- 
Ben Hutchings - Debian developer, member of Linux kernel and LTS teams--- End Message ---


Bug#599615:

2011-03-20 Thread Marcus Furlong
Also seeing the exact same thing on two newly installed squeeze boxes.
Both hit this bug on reboot. (raid10 md+xen+drbd backends)

-- 
Marcus Furlong



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/AANLkTi=k9mv5ycolezjaxpzqa4eum-uu3-a2eqc+t...@mail.gmail.com



Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!

2011-01-26 Thread Maciej Gałkiewicz
I think that I have the same problem with 2.6.32-5-xen-amd64
(2.6.32-30). When I try to reboot the server:

Jan 26 10:48:18 cc kernel: [43467.083492] [ cut here ]
Jan 26 10:48:18 cc kernel: [43467.083526] kernel BUG at
/build/buildd-linux-2.6_2.6.32-30-amd64-d4MbNM/linu
x-2.6-2.6.32/debian/build/source_amd64_xen/drivers/md/md.c:6195!
Jan 26 10:48:18 cc kernel: [43467.083584] invalid opcode:  [#1] SMP
Jan 26 10:48:18 cc kernel: [43467.083618] last sysfs file:
/sys/hypervisor/version/minor
Jan 26 10:48:18 cc kernel: [43467.083647] CPU 6
Jan 26 10:48:18 cc kernel: [43467.083673] Modules linked in: ext2
act_police cls_flow cls_fw cls_u32 sch_htb sch_hfsc sch_ingress
sch_sfq xt_time xt_connlimit xt_realm iptable_raw xt_comment xt_recent
xt_policy ipt_ULOG ipt_REJECT ipt_REDIRECT ipt_NETMAP ipt_MASQUERADE
ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp
nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc
nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda
nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip
nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre
nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc
nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss
xt_pkttype xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport
xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper
xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK
xt_connmark xt_CLASSIFY iptable_nat nf_nat iptable_mangle nfnetlink
ipt_LOG xt_tcpudp nf_conntrack_ipv4 nf_defrag_ip
Jan 26 10:48:18 cc kernel: v4 xt_state nf_conntrack xt_physdev
ip6table_filter ip6_tables xen_evtchn xenfs ccm ecb sha512_generic
xfrm_user ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4
xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport
xfrm6_mode_ro xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6
xfrm_ipcomp xfrm6_tunnel tunnel6 acpi_cpufreq cpufreq_userspace
iptable_filter cpufreq_stats ip_tables cpufreq_powersave
openvswitch_mod rng_core x_tables cpufreq_conservative deflate
zlib_deflate ctr twofish twofish_common camellia serpent blowfish
cast5 des_generic cbc aes_x86_64 aes_generic xcbc rmd160
sha256_generic sha1_generic hmac crypto_null af_key ext3 jbd mbcache
loop snd_pcm snd_timer snd soundcore snd_page_alloc i2c_i801 pcspkr
psmouse i2c_core serio_raw evdev xfs exportfs dm_mod processor
thermal_sys acpi_processor raid10 raid456 async_raid6_recov async_pq
raid6_pq async_xor xor async_memcpy async_tx raid1 raid0 md_mod
sata_nv sata_sil sata_via 3w_9xxx 3w_ sd_mod crc_t10dif ahci r81
Jan 26 10:48:18 cc kernel: 69 uhci_hcd mii libata ehci_hcd scsi_mod
usbcore nls_base [last unloaded: scsi_transport_iscsi]
Jan 26 10:48:18 cc kernel: [43467.085090] Pid: 2993, comm: xenstored
Tainted: P   2.6.32-5-xen-amd64 #1 MS-7522
Jan 26 10:48:18 cc kernel: [43467.085139] RIP:
e030:[a00c1e08]  [a00c1e08]
md_write_start+0x1d/0x15c [md_mod]
Jan 26 10:48:18 cc kernel: [43467.085200] RSP: e02b:8801c5ce98f8
EFLAGS: 00010246
Jan 26 10:48:18 cc kernel: [43467.085229] RAX: 0001 RBX:
8801ecea3400 RCX: 12c0675c
Jan 26 10:48:18 cc kernel: [43467.085261] RDX:  RSI:
88014a4a8180 RDI: 8801ecea3400
Jan 26 10:48:18 cc kernel: [43467.085294] RBP: 8801ecea3400 R08:
 R09: 00ff
Jan 26 10:48:18 cc kernel: [43467.085326] R10: 8100ecf2 R11:
003f R12: 00ff
Jan 26 10:48:18 cc kernel: [43467.085359] R13: 8801ec7511a0 R14:
88014a4a8180 R15: 8801ec799240
Jan 26 10:48:18 cc kernel: [43467.085394] FS:  7f91f689a700()
GS:88000abbf000() knlGS:
Jan 26 10:48:18 cc kernel: [43467.085444] CS:  e033 DS:  ES: 
CR0: 8005003b
Jan 26 10:48:18 cc kernel: [43467.085473] CR2: 00618d50 CR3:
0001c5cb2000 CR4: 2660
Jan 26 10:48:18 cc kernel: [43467.085506] DR0:  DR1:
 DR2: 
Jan 26 10:48:18 cc kernel: [43467.085539] DR3:  DR6:
0ff0 DR7: 0400
Jan 26 10:48:18 cc kernel: [43467.085571] Process xenstored (pid:
2993, threadinfo 8801c5ce8000, task 8801c8233880)
Jan 26 10:48:18 cc kernel: [43467.085621] Stack:
Jan 26 10:48:18 cc kernel: [43467.085643]  0006
 8801c8233b78 000100a4a915
Jan 26 10:48:18 cc kernel: [43467.085686] 0 0040
fffe 0021 8801ecea3400
Jan 26 10:48:18 cc kernel: [43467.085751] 0 00ff
a00db12c  
Jan 26 10:48:18 cc kernel: [43467.085834] Call Trace:
Jan 26 10:48:18 cc kernel: [43467.085863]  [a00db12c] ?
make_request+0x2e/0x7aa [raid1]
Jan 26 10:48:18 cc kernel: [43467.085897]  [812c0cf8] ?
unix_poll+0x0/0x8d
Jan 26 10:48:18 cc kernel: [43467.085928]  [8100e63d] ?
xen_force_evtchn_callback+0x9/0xa
Jan 26 

Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!

2010-10-11 Thread dann frazier
On Sat, Oct 09, 2010 at 04:03:49PM +, Clint Adams wrote:
 Package: linux-image-2.6.32-5-xen-686
 Version: 2.6.32-24
 
 I am experiencing various problems with I/O of domU's and dom0 choking when
 using drbd-backed Xen VMs.
 
 I saw this message on console after a failed attempt to reboot:
 
 (hand-transcribed)
 kernel BUG at 
 /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192!
 invalid opcode:  [#1] SMP


hm.. wonder if it is related to:
  http://www.spinics.net/lists/raid/msg21823.html

Upstream was pondering removal of this BUG_ON():
  http://www.spinics.net/lists/raid/msg28563.html

But no fix has gone upstream for this, afaict. 



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101011165703.gc31...@lackof.org



Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!

2010-10-09 Thread Clint Adams
Package: linux-image-2.6.32-5-xen-686
Version: 2.6.32-24

I am experiencing various problems with I/O of domU's and dom0 choking when
using drbd-backed Xen VMs.

I saw this message on console after a failed attempt to reboot:

(hand-transcribed)
kernel BUG at 
/buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192!
invalid opcode:  [#1] SMP



-- 
To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/20101009160349.ga12...@scru.org