[DRBD-user] Online Verify and Kernel Panic

Roland Friedwagner roland.friedwagner at wu.ac.at
Tue Oct 12 15:19:25 CEST 2010


Hello,

Am Montag 11 Oktober 2010 schrieb Fabrice Charlier:
> Hi all,
>
> We are running a web cluster based on dual primary drbd configuration
> and ocfs2. During each week-end we run a online verify on the drbd
> volume by executing "/sbin/drbdadm verify all" on one node. Last w-e,
> one node (not the one executing the verify command) completely crash
> and we found it this morning with a nice kernel panic message on the
> console.
>
> Anybody else already observed this behavior?
>

Yes, we (and Michael) did at Sep  2 00:18:01.

The DRBD-User thread concerning this is 
"8.3.8 Online Verify Oops on kernel 2.6.34"


DRBD Version: 8.3.8.1
HW: HP DL380G6 (1 x Xeon X5570)
OS: RHEL 5.5 x86_64
Kernel: 2.6.18-194.11.3.el5 #1 SMP Mon Aug 23 15:51:38 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux

It was nearly the same address (:drbd:w_e_end_ov_req+0x29/0x136) here
and michael had w_e_end_ov_req+0x36/0x154.

 $ gdb drbd.ko -ex 'l *(w_e_end_ov_req+0x29)' -ex q
GNU gdb (GDB) Red Hat Enterprise Linux (7.0.1-23.el5_5.2)
Copyright (C) 2009 Free Software Foundation, Inc.
License GPLv3+: GNU GPL version 3 or later <http://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.  Type "show copying"
and "show warranty" for details.
This GDB was configured as "x86_64-redhat-linux-gnu".
For bug reporting instructions, please see:
<http://www.gnu.org/software/gdb/bugs/>...
Reading symbols from /opt/wu-wien/src/drbd/rpm/centos/drbd8381/BUILD/drbd-8.3.8.1/drbd/drbd.ko...done.
0x5fbf is in w_e_end_ov_req (include/linux/crypto.h:286).
281             return module_name(tfm->__crt_alg->cra_module);
282     }
283
284     static inline u32 crypto_tfm_alg_type(struct crypto_tfm *tfm)
285     {
286             return tfm->__crt_alg->cra_flags & CRYPTO_ALG_TYPE_MASK;
287     }
288
289     static inline unsigned int crypto_tfm_alg_min_keysize(struct crypto_tfm *tfm)
290     {

We do an online verify each night.
Does not reproduce since.

Slightly changed config now.
Switched csums-alg and verify-alg from md5 to sha1
(But the reason was concerning lower hash collisions probability by nearly same speed) 

Kind Regards,
Roland

-- 
Roland.Friedwagner at wu.ac.at            Phone: +43 1 31336 5377
IT Services - WU (Vienna University of Economics and Business) 


More information about the drbd-user mailing list