[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-21 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 2.6.31-6.26

---
linux (2.6.31-6.26) karmic; urgency=low

  [ Andy Whitcroft ]

  * [Config] enable CONFIG_AUFS_BR_RAMFS
- LP: #414738
  * split out debian directory ready for abstraction
  * add printdebian target to find branch target
  * abstracted debian -- debian/files is not abstracted
  * abstracted debian -- packages must be built in debian/
  * abstracted debian -- kernel-wedge needs to work in debian/
  * abstracted debian -- ensure we install the copyright file
  * abstracted-debian -- drop the debian directories from headers
  * abstracted-debian -- drop the debian directories from headers part 2
  * SAUCE: ubuntu-insert-changes -- follow abstracted debian
  * [Upstream] aoe: ensure we initialise the request_queue correctly V2
- LP: #410198

  [ Luke Yelavich ]

  * [Config] Ports: Disable CONFIG_CPU_FREQ_DEBUG on powerpc-smp
  * [Config] Ports: Re-enable windfarm modules on powerpc64-smp
- LP: #413150
  * [Config] Ports: Build all cpu frequency scaling governors into ports
kernels
  * [Config] Ports: Build ext2 and ext3 modules into ports kernels
  * [Config] Ports: CONFIG_PACKET=y for all ports kernels
  * [Config] Ports: Enable PS3 network driver

  [ Stefan Bader ]

  * abstracted debian -- call $(DEBIAN)/rules using make

  [ Tim Gardner ]

  * [Config] Abstract the debian directory
  * SAUCE: Improve error reporting in postinst
- LP: #358564

 -- Tim GardnerSun, 16 Aug 2009 20:33:28
-0600

** Changed in: linux (Ubuntu Karmic)
   Status: In Progress => Fix Released

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-16 Thread Thierry Carrez
** Changed in: linux (Ubuntu Karmic)
   Status: Incomplete => In Progress

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-15 Thread Daniel Nurmi
Greetings,

I've tested (modprobe aoe with vblade running on another host), and it
looks good.  I was able to discover, mount read/write data from/to the
volume, and unmount.

Thank you again, it looks like this latest patch resolved the oops!

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-14 Thread Andy Whitcroft
Ok, I've respun the patch could you test the updated version for me and
report back here.  Thanks!  Kernels are at the URL below:

 http://people.ubuntu.com/~apw/lp410198-karmic/

** Changed in: linux (Ubuntu Karmic)
   Status: In Progress => Incomplete

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-14 Thread Steve Langasek
** Also affects: linux (Ubuntu Karmic)
   Importance: High
 Assignee: Andy Whitcroft (apw)
   Status: In Progress

** Changed in: linux (Ubuntu Karmic)
Milestone: None => karmic-alpha-5

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-13 Thread Thierry Carrez
Setting this to High as it is a blocker for Eucalyptus 1.6 delivery in
karmic.

** Changed in: linux (Ubuntu)
   Importance: Medium => High

** Changed in: linux (Ubuntu)
   Status: Incomplete => In Progress

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-12 Thread Daniel Nurmi
Greetings,

Thank you for tracking down and working on this issue; I've installed
the new kernel:

Linux foobar-desktop 2.6.31-6-generic #25~lp410198apw1 SMP Tue Aug 11
13:35:31 UTC 2009 x86_64 GNU/Linux

With a vblade running on another machine (on the same broadcast
network), ran 'modprobe aoe' and we're seeing an oops:

Aug 12 09:03:09 foobar-desktop kernel: [   73.109792] Modules linked in: aoe 
binfmt_misc lp ppdev i2c_piix4 psmouse virtio_console serio_raw virtio_balloon 
parport_pc parport e1000 virtio_pci virtio_ring virtio floppy fbcon tileblit 
font bitblit softcursor i915 drm i2c_algo_bit video output intel_agp
Aug 12 09:03:09 foobar-desktop kernel: [   73.109819] Pid: 6, comm: events/0 
Not tainted 2.6.31-6-generic #25~lp410198apw1 
Aug 12 09:03:09 foobar-desktop kernel: [   73.109822] RIP: 
0010:[]  [] blk_queue_make_request+0xc/0xa0
Aug 12 09:03:09 foobar-desktop kernel: [   73.109827] RSP: 
:88005bf83dc0  EFLAGS: 00010286
Aug 12 09:03:09 foobar-desktop kernel: [   73.109829] RAX: 88004ec15ba0 
RBX:  RCX: 880059ad7b00
Aug 12 09:03:09 foobar-desktop kernel: [   73.109832] RDX: 0010 
RSI: a01675d0 RDI: 
Aug 12 09:03:09 foobar-desktop kernel: [   73.109834] RBP: 88005bf83dd0 
R08: 8800019d34e0 R09: 0058
Aug 12 09:03:09 foobar-desktop kernel: [   73.109837] R10: 0056 
R11:  R12: 88004b43d800
Aug 12 09:03:09 foobar-desktop kernel: [   73.109839] R13: a01688c0 
R14: 8800019d9000 R15: 8800019d9008
Aug 12 09:03:09 foobar-desktop kernel: [   73.109844] FS:  
() GS:8800019c1000() knlGS:
Aug 12 09:03:09 foobar-desktop kernel: [   73.109847] CS:  0010 DS: 0018 ES: 
0018 CR0: 8005003b
Aug 12 09:03:09 foobar-desktop kernel: [   73.109850] CR2: 0078 
CR3: 4b467000 CR4: 06b0
Aug 12 09:03:09 foobar-desktop kernel: [   73.109856] DR0:  
DR1:  DR2: 
Aug 12 09:03:09 foobar-desktop kernel: [   73.109863] DR3:  
DR6: 0ff0 DR7: 0400
Aug 12 09:03:09 foobar-desktop kernel: [   73.109866] Process events/0 (pid: 6, 
threadinfo 88005bf82000, task 88005bf88000)
Aug 12 09:03:09 foobar-desktop kernel: [   73.109870]  88005bf83dd0 
88005a40ba00 88005bf83e00 a01672d3
Aug 12 09:03:09 foobar-desktop kernel: [   73.109877] <0> 88005a40ba28 
88005a40ba00 a01688c0 8800019d9000
Aug 12 09:03:09 foobar-desktop kernel: [   73.109885] <0> 88005bf83e30 
a0168998 88005a40ba28 8800019d9000
Aug 12 09:03:09 foobar-desktop kernel: [   73.109897]  [] 
aoeblk_gdalloc+0x73/0x1c0 [aoe]
Aug 12 09:03:09 foobar-desktop kernel: [   73.109904]  [] ? 
aoecmd_sleepwork+0x0/0xf0 [aoe]
Aug 12 09:03:09 foobar-desktop kernel: [   73.109909]  [] 
aoecmd_sleepwork+0xd8/0xf0 [aoe]
Aug 12 09:03:09 foobar-desktop kernel: [   73.109914]  [] ? 
aoecmd_sleepwork+0x0/0xf0 [aoe]
Aug 12 09:03:09 foobar-desktop kernel: [   73.109935]  [] 
run_workqueue+0x95/0x170
Aug 12 09:03:09 foobar-desktop kernel: [   73.109939]  [] 
worker_thread+0xa4/0x120
Aug 12 09:03:09 foobar-desktop kernel: [   73.109943]  [] ? 
autoremove_wake_function+0x0/0x40
Aug 12 09:03:09 foobar-desktop kernel: [   73.109947]  [] ? 
worker_thread+0x0/0x120
Aug 12 09:03:09 foobar-desktop kernel: [   73.109950]  [] 
kthread+0x96/0xa0
Aug 12 09:03:09 foobar-desktop kernel: [   73.109960]  [] 
child_rip+0xa/0x20
Aug 12 09:05:13 foobar-desktop kernel: [   73.109963]  [] ? 
kthread+0x0/0xa0
Aug 12 09:05:13 foobar-desktop kernel: [   73.109966]  [] ? 
child_rip+0x0/0x20
Aug 12 09:05:13 foobar-desktop kernel: [   73.110006]  RSP 
Aug 12 09:05:13 foobar-desktop kernel: [   73.110017] ---[ end trace 
4209c87efedfd3bc ]---

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-12 Thread Andy Whitcroft
Ok I have attempted to fix the driver to initialise the request_queue
structure correctly.  I do not have a simple way to test this fix.  I
have built fixed kernels and pushed them to the URL below.  If you could
test these and let me know if they work better for you that would be
helpful.  Kernels are here:

http://people.canonical.com/~apw/lp410198-karmic/

** Changed in: linux (Ubuntu)
   Status: In Progress => Incomplete

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-11 Thread Andy Whitcroft
We are panicing when trying to register the block queue:

  [ 2645.959090] kobject '' (880059ca22c0): tried to add an 
uninitialized object, something is seriously wrong.
  [ 2645.959104] Pid: 6, comm: events/0 Not tainted 2.6.31-5-generic #24-Ubuntu
  [ 2645.959107] Call Trace:
  [ 2645.959139]  [] kobject_add+0x5f/0x70
  [ 2645.959151]  [] blk_register_queue+0x8b/0xf0
  [ 2645.959155]  [] add_disk+0x8f/0x160
  [ 2645.959161]  [] aoeblk_gdalloc+0x164/0x1c0 [aoe]
  [...]


This implies we have not initialised the device queue object, which
is gen_disk->queue, this comes from the aoedev object:

  aoeblk_gdalloc(void *vp)
  {
  struct aoedev *d = vp;
  [...]
  gd->queue = &d->blkq;
  [...]
  }

It seems we do not ever initialise the blkq.  Looking at other drivers
this is typically allocated using blk_init_queue(), whereas in this driver
it is allocated directly in the aoedev structure and never initialised
appropriatly.


** Changed in: linux (Ubuntu)
   Status: New => In Progress

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Andy Whitcroft (apw)

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-11 Thread Andy Whitcroft
** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Tags added: regression-potential

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-10 Thread Daniel Nurmi
Some more info on reproducing this bug:

machine A running jaunty, with a number of vblade processes exporting
AOE devices:

# uname -a
Linux gibson 2.6.28-14-generic #47-Ubuntu SMP Sat Jul 25 01:19:55 UTC 2009 
x86_64 GNU/Linux

# apt-cache policy vblade
vblade:
  Installed: 16-1ubuntu2
  Candidate: 16-1ubuntu2
  Version table:
 *** 16-1ubuntu2 0
500 http://mirror.eucalyptus jaunty/main Packages
100 /var/lib/dpkg/status

machine B running karmic, attaching dmesg before running 'modprobe aoe'
and after running 'modprobe aoe' (the latter contains the oops):

# uname -a
Linux foobar-desktop 2.6.31-5-generic #24-Ubuntu SMP Sat Aug 1 12:47:58 UTC 
2009 x86_64 GNU/Linux
(see attached)


** Attachment added: "aoe-oops"
   http://launchpadlibrarian.net/30122692/aoe-oops

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 410198] Re: 'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty

2009-08-07 Thread Brian Murray
Thank you for taking the time to report this bug and helping to make Ubuntu 
better. This bug did not have a package associated with it, which is important 
for ensuring that it gets looked at by the proper developers.  You can learn 
more about finding the right package at 
https://wiki.ubuntu.com/Bugs/FindRightPackage.  I have classified this bug as a 
bug in linux which provides the kernel.
For future reference you might be interested to know that a lot of applications 
have bug reporting functionality built in to them.   This can be accessed via 
the Report a Problem option in the Help menu for the application with which you 
are having an issue.  You can learn more about this feature at 
https://wiki.ubuntu.com/ReportingBugs.

** Package changed: ubuntu => linux (Ubuntu)

-- 
'modprobe aoe' on Karmic kernel oopses with AOE device from Jaunty
https://bugs.launchpad.net/bugs/410198
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs