Bug#599615: marked as done (linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!)
Your message dated Sun, 29 May 2016 21:24:52 +0100 with message-id bb988196-8498-43db-9385-1ade81a51...@decadent.org.uk and subject line Closing bugs assigned to linux-2.6 package has caused the Debian Bug report #599615, regarding linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192! to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 599615: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=599615 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems --- Begin Message --- Package: linux-image-2.6.32-5-xen-686 Version: 2.6.32-24 I am experiencing various problems with I/O of domU's and dom0 choking when using drbd-backed Xen VMs. I saw this message on console after a failed attempt to reboot: (hand-transcribed) kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192! invalid opcode: [#1] SMP --- End Message --- --- Begin Message --- Version: 3.4.1-1~experimental.1+rm Debian 6.0 Long Term Support has ended, and the 'linux-2.6' source package will no longer be updated. This bug was reassigned to the 'linux' source package earlier today, but I am now closing it on the assumption that it does not affect the kernel versions in newer Debian releases. If you can still reproduce this bug in a newer release, please reopen the bug report and reassign it to 'src:linux' and the affected version of the package. You can find the package version for the running kernel by running: uname -v or the versions of all installed kernel packages by running: dpkg -l 'linux-image-[34]*' | grep ^.i and looking at the third column. I apologise that we weren't able to provide a specific resolution for this bug. Ben. -- Ben Hutchings - Debian developer, member of Linux kernel and LTS teams--- End Message ---
Bug#599615:
Also seeing the exact same thing on two newly installed squeeze boxes. Both hit this bug on reboot. (raid10 md+xen+drbd backends) -- Marcus Furlong -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/AANLkTi=k9mv5ycolezjaxpzqa4eum-uu3-a2eqc+t...@mail.gmail.com
Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!
I think that I have the same problem with 2.6.32-5-xen-amd64 (2.6.32-30). When I try to reboot the server: Jan 26 10:48:18 cc kernel: [43467.083492] [ cut here ] Jan 26 10:48:18 cc kernel: [43467.083526] kernel BUG at /build/buildd-linux-2.6_2.6.32-30-amd64-d4MbNM/linu x-2.6-2.6.32/debian/build/source_amd64_xen/drivers/md/md.c:6195! Jan 26 10:48:18 cc kernel: [43467.083584] invalid opcode: [#1] SMP Jan 26 10:48:18 cc kernel: [43467.083618] last sysfs file: /sys/hypervisor/version/minor Jan 26 10:48:18 cc kernel: [43467.083647] CPU 6 Jan 26 10:48:18 cc kernel: [43467.083673] Modules linked in: ext2 act_police cls_flow cls_fw cls_u32 sch_htb sch_hfsc sch_ingress sch_sfq xt_time xt_connlimit xt_realm iptable_raw xt_comment xt_recent xt_policy ipt_ULOG ipt_REJECT ipt_REDIRECT ipt_NETMAP ipt_MASQUERADE ipt_ECN ipt_ecn ipt_CLUSTERIP ipt_ah ipt_addrtype nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda ts_kmp nf_conntrack_amanda nf_conntrack_sane nf_conntrack_tftp nf_conntrack_sip nf_conntrack_proto_sctp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_netlink nf_conntrack_netbios_ns nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp xt_TPROXY nf_tproxy_core xt_tcpmss xt_pkttype xt_owner xt_NFQUEUE xt_NFLOG nfnetlink_log xt_multiport xt_MARK xt_mark xt_mac xt_limit xt_length xt_iprange xt_helper xt_hashlimit xt_DSCP xt_dscp xt_dccp xt_conntrack xt_CONNMARK xt_connmark xt_CLASSIFY iptable_nat nf_nat iptable_mangle nfnetlink ipt_LOG xt_tcpudp nf_conntrack_ipv4 nf_defrag_ip Jan 26 10:48:18 cc kernel: v4 xt_state nf_conntrack xt_physdev ip6table_filter ip6_tables xen_evtchn xenfs ccm ecb sha512_generic xfrm_user ah6 ah4 esp6 esp4 xfrm4_mode_beet xfrm4_tunnel tunnel4 xfrm4_mode_tunnel xfrm4_mode_transport xfrm6_mode_transport xfrm6_mode_ro xfrm6_mode_beet xfrm6_mode_tunnel ipcomp ipcomp6 xfrm_ipcomp xfrm6_tunnel tunnel6 acpi_cpufreq cpufreq_userspace iptable_filter cpufreq_stats ip_tables cpufreq_powersave openvswitch_mod rng_core x_tables cpufreq_conservative deflate zlib_deflate ctr twofish twofish_common camellia serpent blowfish cast5 des_generic cbc aes_x86_64 aes_generic xcbc rmd160 sha256_generic sha1_generic hmac crypto_null af_key ext3 jbd mbcache loop snd_pcm snd_timer snd soundcore snd_page_alloc i2c_i801 pcspkr psmouse i2c_core serio_raw evdev xfs exportfs dm_mod processor thermal_sys acpi_processor raid10 raid456 async_raid6_recov async_pq raid6_pq async_xor xor async_memcpy async_tx raid1 raid0 md_mod sata_nv sata_sil sata_via 3w_9xxx 3w_ sd_mod crc_t10dif ahci r81 Jan 26 10:48:18 cc kernel: 69 uhci_hcd mii libata ehci_hcd scsi_mod usbcore nls_base [last unloaded: scsi_transport_iscsi] Jan 26 10:48:18 cc kernel: [43467.085090] Pid: 2993, comm: xenstored Tainted: P 2.6.32-5-xen-amd64 #1 MS-7522 Jan 26 10:48:18 cc kernel: [43467.085139] RIP: e030:[a00c1e08] [a00c1e08] md_write_start+0x1d/0x15c [md_mod] Jan 26 10:48:18 cc kernel: [43467.085200] RSP: e02b:8801c5ce98f8 EFLAGS: 00010246 Jan 26 10:48:18 cc kernel: [43467.085229] RAX: 0001 RBX: 8801ecea3400 RCX: 12c0675c Jan 26 10:48:18 cc kernel: [43467.085261] RDX: RSI: 88014a4a8180 RDI: 8801ecea3400 Jan 26 10:48:18 cc kernel: [43467.085294] RBP: 8801ecea3400 R08: R09: 00ff Jan 26 10:48:18 cc kernel: [43467.085326] R10: 8100ecf2 R11: 003f R12: 00ff Jan 26 10:48:18 cc kernel: [43467.085359] R13: 8801ec7511a0 R14: 88014a4a8180 R15: 8801ec799240 Jan 26 10:48:18 cc kernel: [43467.085394] FS: 7f91f689a700() GS:88000abbf000() knlGS: Jan 26 10:48:18 cc kernel: [43467.085444] CS: e033 DS: ES: CR0: 8005003b Jan 26 10:48:18 cc kernel: [43467.085473] CR2: 00618d50 CR3: 0001c5cb2000 CR4: 2660 Jan 26 10:48:18 cc kernel: [43467.085506] DR0: DR1: DR2: Jan 26 10:48:18 cc kernel: [43467.085539] DR3: DR6: 0ff0 DR7: 0400 Jan 26 10:48:18 cc kernel: [43467.085571] Process xenstored (pid: 2993, threadinfo 8801c5ce8000, task 8801c8233880) Jan 26 10:48:18 cc kernel: [43467.085621] Stack: Jan 26 10:48:18 cc kernel: [43467.085643] 0006 8801c8233b78 000100a4a915 Jan 26 10:48:18 cc kernel: [43467.085686] 0 0040 fffe 0021 8801ecea3400 Jan 26 10:48:18 cc kernel: [43467.085751] 0 00ff a00db12c Jan 26 10:48:18 cc kernel: [43467.085834] Call Trace: Jan 26 10:48:18 cc kernel: [43467.085863] [a00db12c] ? make_request+0x2e/0x7aa [raid1] Jan 26 10:48:18 cc kernel: [43467.085897] [812c0cf8] ? unix_poll+0x0/0x8d Jan 26 10:48:18 cc kernel: [43467.085928] [8100e63d] ? xen_force_evtchn_callback+0x9/0xa Jan 26
Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!
On Sat, Oct 09, 2010 at 04:03:49PM +, Clint Adams wrote: Package: linux-image-2.6.32-5-xen-686 Version: 2.6.32-24 I am experiencing various problems with I/O of domU's and dom0 choking when using drbd-backed Xen VMs. I saw this message on console after a failed attempt to reboot: (hand-transcribed) kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192! invalid opcode: [#1] SMP hm.. wonder if it is related to: http://www.spinics.net/lists/raid/msg21823.html Upstream was pondering removal of this BUG_ON(): http://www.spinics.net/lists/raid/msg28563.html But no fix has gone upstream for this, afaict. -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20101011165703.gc31...@lackof.org
Bug#599615: linux-image-2.6.32-5-xen-686: kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debi an/build/source_i386_xen/drivers/md/md.c: 6192!
Package: linux-image-2.6.32-5-xen-686 Version: 2.6.32-24 I am experiencing various problems with I/O of domU's and dom0 choking when using drbd-backed Xen VMs. I saw this message on console after a failed attempt to reboot: (hand-transcribed) kernel BUG at /buildd/buildd-linux-2.6_2.6.32-24-i386-JPvGSk/linux-2.6-2.6.32/debian/build/source_i386_xen/drivers/md/md.c:6192! invalid opcode: [#1] SMP -- To UNSUBSCRIBE, email to debian-kernel-requ...@lists.debian.org with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/20101009160349.ga12...@scru.org