[Kernel-packages] [Bug 1683699] Re: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection.
** Tags added: cscc -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683699 Title: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection. Status in linux package in Ubuntu: Triaged Bug description: == Comment: #0 - Pridhiviraj Paidipeddi - 2016-08-13 08:28:54 == ---Problem Description--- Install P8 PowerNV 8284-22A Hardware with latest FW860 firmware having build SV860_028, and install a ubuntu 16.10 on top of it. During EEH FrozenPE error injection, observed a "Oops: Kernel access of bad area, sig: 11 [#1]" Contact Information = ppaid...@in.ibm.com ---uname output--- Linux lep8b 4.4.0-34-generic #53-Ubuntu SMP Wed Jul 27 16:04:07 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux Machine Type = PowerNV 8284-22A ---System Hang--- system is hung and need to do a Hard Power OFF/ON to bring the system up again. ---Debugger--- A debugger is not configured ---Steps to Reproduce--- 1. Install a FW860 SV860_028 level of firmware on a P8 PowerNV 8284-22A Hardware. 2. Install a ubuntu 16.10 on top of it. 3. Inject below frozenPE EEH Error. echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? 4. Immediately we can observe a kernel Oops. *Additional Instructions for ppaid...@in.ibm.com: -Post a private note with access information to the machine that the bug is occuring on. Call Traces: root@lep8b:~# echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? [ 271.110859] EEH: Frozen PE#0 on PHB#4 detected [ 271.110967] EEH: PE location: N/A, PHB location: N/A 0004:00:00.0 0604: 1014:03dc 0 root@lep8b:~# [ 277.108098] Unable to handle kernel paging request for data at address 0x0010 [ 277.108183] Faulting instruction address: 0xc0083c7c [ 277.108198] Oops: Kernel access of bad area, sig: 11 [#1] [ 277.108253] SMP NR_CPUS=2048 NUMA PowerNV [ 277.108310] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables leds_powernv ibmpowernv powernv_rng ipmi_powernv uio_pdrv_genirq ipmi_msghandler uio ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ses enclosure be2net lpfc vxlan ip6_udp_tunnel udp_tunnel scsi_transport_fc ipr [ 277.109391] CPU: 9 PID: 973 Comm: eehd Not tainted 4.4.0-34-generic #53-Ubuntu [ 277.109467] task: c00feb3c2a20 ti: c00feb408000 task.ti: c00feb408000 [ 277.109542] NIP: c0083c7c LR: c0083c78 CTR: c0083c20 [ 277.109617] REGS: c00feb40b760 TRAP: 0300 Not tainted (4.4.0-34-generic) [ 277.109691] MSR: 90019033 CR: 28008822 XER: [ 277.109880] CFAR: c0008468 DAR: 0010 DSISR: 4000 SOFTE: 1 GPR00: c0083c78 c00feb40b9e0 c15b5d00 GPR04: 0001 c00feb40bac0 c02d74b54220 0f9f GPR08: 0026 GPR12: c0083c20 c7b45580 c00e63d8 c02d74c40100 GPR16: GPR20: c0d42468 GPR24: c0d42440 0100 c0036460 GPR28: c161a3f0 0001 c0281000 c000fe44 [ 277.110878] NIP [c0083c7c] pnv_eeh_reset+0x5c/0x170 [ 277.110931] LR [c0083c78] pnv_eeh_reset+0x58/0x170 [ 277.110981] Call Trace: [ 277.111009] [c00feb40b9e0] [c0083c78] pnv_eeh_reset+0x58/0x170 (unreliable) [ 277.111098] [c00feb40ba60] [c0038250] eeh_reset_pe+0xb0/0x1c0 [ 277.75] [c00feb40bb00] [c0af472c] eeh_reset_device+0xd8/0x228 [ 277.111255] [c00feb40bba0] [c003c4c0] eeh_handle_normal_event+0x390/0x440 [ 277.111429] [c00feb40bc20] [c003c964] eeh_handle_event+0x184/0x370 [ 277.111601] [c00feb40bcd0] [c003cd28] eeh_event_handler+0x1d8/0x1e0 [ 277.111772] [c00feb40bd80] [c00e64e0] kthread+0x110/0x130 [ 277.111910] [c00feb40be30] [c0009538] ret_from_kernel_thread+0x5c/0xa4 [ 277.112068] Instruction dump: [ 277.112143] 6000 813f ebdf0010 792affe3 408200d4 e95e0250 812a000c 2f890002 [
[Kernel-packages] [Bug 1683699] Re: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection.
** Changed in: linux (Ubuntu) Status: New => Triaged ** Changed in: linux (Ubuntu) Assignee: Taco Screen team (taco-screen-team) => Canonical Kernel Team (canonical-kernel-team) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683699 Title: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection. Status in linux package in Ubuntu: Triaged Bug description: == Comment: #0 - Pridhiviraj Paidipeddi- 2016-08-13 08:28:54 == ---Problem Description--- Install P8 PowerNV 8284-22A Hardware with latest FW860 firmware having build SV860_028, and install a ubuntu 16.10 on top of it. During EEH FrozenPE error injection, observed a "Oops: Kernel access of bad area, sig: 11 [#1]" Contact Information = ppaid...@in.ibm.com ---uname output--- Linux lep8b 4.4.0-34-generic #53-Ubuntu SMP Wed Jul 27 16:04:07 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux Machine Type = PowerNV 8284-22A ---System Hang--- system is hung and need to do a Hard Power OFF/ON to bring the system up again. ---Debugger--- A debugger is not configured ---Steps to Reproduce--- 1. Install a FW860 SV860_028 level of firmware on a P8 PowerNV 8284-22A Hardware. 2. Install a ubuntu 16.10 on top of it. 3. Inject below frozenPE EEH Error. echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? 4. Immediately we can observe a kernel Oops. *Additional Instructions for ppaid...@in.ibm.com: -Post a private note with access information to the machine that the bug is occuring on. Call Traces: root@lep8b:~# echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? [ 271.110859] EEH: Frozen PE#0 on PHB#4 detected [ 271.110967] EEH: PE location: N/A, PHB location: N/A 0004:00:00.0 0604: 1014:03dc 0 root@lep8b:~# [ 277.108098] Unable to handle kernel paging request for data at address 0x0010 [ 277.108183] Faulting instruction address: 0xc0083c7c [ 277.108198] Oops: Kernel access of bad area, sig: 11 [#1] [ 277.108253] SMP NR_CPUS=2048 NUMA PowerNV [ 277.108310] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables leds_powernv ibmpowernv powernv_rng ipmi_powernv uio_pdrv_genirq ipmi_msghandler uio ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ses enclosure be2net lpfc vxlan ip6_udp_tunnel udp_tunnel scsi_transport_fc ipr [ 277.109391] CPU: 9 PID: 973 Comm: eehd Not tainted 4.4.0-34-generic #53-Ubuntu [ 277.109467] task: c00feb3c2a20 ti: c00feb408000 task.ti: c00feb408000 [ 277.109542] NIP: c0083c7c LR: c0083c78 CTR: c0083c20 [ 277.109617] REGS: c00feb40b760 TRAP: 0300 Not tainted (4.4.0-34-generic) [ 277.109691] MSR: 90019033 CR: 28008822 XER: [ 277.109880] CFAR: c0008468 DAR: 0010 DSISR: 4000 SOFTE: 1 GPR00: c0083c78 c00feb40b9e0 c15b5d00 GPR04: 0001 c00feb40bac0 c02d74b54220 0f9f GPR08: 0026 GPR12: c0083c20 c7b45580 c00e63d8 c02d74c40100 GPR16: GPR20: c0d42468 GPR24: c0d42440 0100 c0036460 GPR28: c161a3f0 0001 c0281000 c000fe44 [ 277.110878] NIP [c0083c7c] pnv_eeh_reset+0x5c/0x170 [ 277.110931] LR [c0083c78] pnv_eeh_reset+0x58/0x170 [ 277.110981] Call Trace: [ 277.111009] [c00feb40b9e0] [c0083c78] pnv_eeh_reset+0x58/0x170 (unreliable) [ 277.111098] [c00feb40ba60] [c0038250] eeh_reset_pe+0xb0/0x1c0 [ 277.75] [c00feb40bb00] [c0af472c] eeh_reset_device+0xd8/0x228 [ 277.111255] [c00feb40bba0] [c003c4c0] eeh_handle_normal_event+0x390/0x440 [ 277.111429] [c00feb40bc20] [c003c964] eeh_handle_event+0x184/0x370 [ 277.111601] [c00feb40bcd0] [c003cd28] eeh_event_handler+0x1d8/0x1e0 [ 277.111772] [c00feb40bd80] [c00e64e0] kthread+0x110/0x130 [
[Kernel-packages] [Bug 1683699] Re: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection.
** Tags added: kernel-da-key ** Changed in: linux (Ubuntu) Importance: Undecided => High -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683699 Title: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection. Status in linux package in Ubuntu: New Bug description: == Comment: #0 - Pridhiviraj Paidipeddi- 2016-08-13 08:28:54 == ---Problem Description--- Install P8 PowerNV 8284-22A Hardware with latest FW860 firmware having build SV860_028, and install a ubuntu 16.10 on top of it. During EEH FrozenPE error injection, observed a "Oops: Kernel access of bad area, sig: 11 [#1]" Contact Information = ppaid...@in.ibm.com ---uname output--- Linux lep8b 4.4.0-34-generic #53-Ubuntu SMP Wed Jul 27 16:04:07 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux Machine Type = PowerNV 8284-22A ---System Hang--- system is hung and need to do a Hard Power OFF/ON to bring the system up again. ---Debugger--- A debugger is not configured ---Steps to Reproduce--- 1. Install a FW860 SV860_028 level of firmware on a P8 PowerNV 8284-22A Hardware. 2. Install a ubuntu 16.10 on top of it. 3. Inject below frozenPE EEH Error. echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? 4. Immediately we can observe a kernel Oops. *Additional Instructions for ppaid...@in.ibm.com: -Post a private note with access information to the machine that the bug is occuring on. Call Traces: root@lep8b:~# echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? [ 271.110859] EEH: Frozen PE#0 on PHB#4 detected [ 271.110967] EEH: PE location: N/A, PHB location: N/A 0004:00:00.0 0604: 1014:03dc 0 root@lep8b:~# [ 277.108098] Unable to handle kernel paging request for data at address 0x0010 [ 277.108183] Faulting instruction address: 0xc0083c7c [ 277.108198] Oops: Kernel access of bad area, sig: 11 [#1] [ 277.108253] SMP NR_CPUS=2048 NUMA PowerNV [ 277.108310] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables leds_powernv ibmpowernv powernv_rng ipmi_powernv uio_pdrv_genirq ipmi_msghandler uio ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ses enclosure be2net lpfc vxlan ip6_udp_tunnel udp_tunnel scsi_transport_fc ipr [ 277.109391] CPU: 9 PID: 973 Comm: eehd Not tainted 4.4.0-34-generic #53-Ubuntu [ 277.109467] task: c00feb3c2a20 ti: c00feb408000 task.ti: c00feb408000 [ 277.109542] NIP: c0083c7c LR: c0083c78 CTR: c0083c20 [ 277.109617] REGS: c00feb40b760 TRAP: 0300 Not tainted (4.4.0-34-generic) [ 277.109691] MSR: 90019033 CR: 28008822 XER: [ 277.109880] CFAR: c0008468 DAR: 0010 DSISR: 4000 SOFTE: 1 GPR00: c0083c78 c00feb40b9e0 c15b5d00 GPR04: 0001 c00feb40bac0 c02d74b54220 0f9f GPR08: 0026 GPR12: c0083c20 c7b45580 c00e63d8 c02d74c40100 GPR16: GPR20: c0d42468 GPR24: c0d42440 0100 c0036460 GPR28: c161a3f0 0001 c0281000 c000fe44 [ 277.110878] NIP [c0083c7c] pnv_eeh_reset+0x5c/0x170 [ 277.110931] LR [c0083c78] pnv_eeh_reset+0x58/0x170 [ 277.110981] Call Trace: [ 277.111009] [c00feb40b9e0] [c0083c78] pnv_eeh_reset+0x58/0x170 (unreliable) [ 277.111098] [c00feb40ba60] [c0038250] eeh_reset_pe+0xb0/0x1c0 [ 277.75] [c00feb40bb00] [c0af472c] eeh_reset_device+0xd8/0x228 [ 277.111255] [c00feb40bba0] [c003c4c0] eeh_handle_normal_event+0x390/0x440 [ 277.111429] [c00feb40bc20] [c003c964] eeh_handle_event+0x184/0x370 [ 277.111601] [c00feb40bcd0] [c003cd28] eeh_event_handler+0x1d8/0x1e0 [ 277.111772] [c00feb40bd80] [c00e64e0] kthread+0x110/0x130 [ 277.111910] [c00feb40be30] [c0009538] ret_from_kernel_thread+0x5c/0xa4 [ 277.112068]
[Kernel-packages] [Bug 1683699] Re: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection.
** Package changed: kerneloops (Ubuntu) => linux (Ubuntu) -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683699 Title: [LTCTest][Opal][FW860] Oops: Kernel access of bad area, sig: 11 [#1] during frozen PE EEH error injection. Status in linux package in Ubuntu: New Bug description: == Comment: #0 - Pridhiviraj Paidipeddi- 2016-08-13 08:28:54 == ---Problem Description--- Install P8 PowerNV 8284-22A Hardware with latest FW860 firmware having build SV860_028, and install a ubuntu 16.10 on top of it. During EEH FrozenPE error injection, observed a "Oops: Kernel access of bad area, sig: 11 [#1]" Contact Information = ppaid...@in.ibm.com ---uname output--- Linux lep8b 4.4.0-34-generic #53-Ubuntu SMP Wed Jul 27 16:04:07 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux Machine Type = PowerNV 8284-22A ---System Hang--- system is hung and need to do a Hard Power OFF/ON to bring the system up again. ---Debugger--- A debugger is not configured ---Steps to Reproduce--- 1. Install a FW860 SV860_028 level of firmware on a P8 PowerNV 8284-22A Hardware. 2. Install a ubuntu 16.10 on top of it. 3. Inject below frozenPE EEH Error. echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? 4. Immediately we can observe a kernel Oops. *Additional Instructions for ppaid...@in.ibm.com: -Post a private note with access information to the machine that the bug is occuring on. Call Traces: root@lep8b:~# echo 0:0:4:0:0 > /sys/kernel/debug/powerpc/PCI0004/err_injct && lspci -ns 0004:00:00.0; echo $? [ 271.110859] EEH: Frozen PE#0 on PHB#4 detected [ 271.110967] EEH: PE location: N/A, PHB location: N/A 0004:00:00.0 0604: 1014:03dc 0 root@lep8b:~# [ 277.108098] Unable to handle kernel paging request for data at address 0x0010 [ 277.108183] Faulting instruction address: 0xc0083c7c [ 277.108198] Oops: Kernel access of bad area, sig: 11 [#1] [ 277.108253] SMP NR_CPUS=2048 NUMA PowerNV [ 277.108310] Modules linked in: xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables leds_powernv ibmpowernv powernv_rng ipmi_powernv uio_pdrv_genirq ipmi_msghandler uio ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ses enclosure be2net lpfc vxlan ip6_udp_tunnel udp_tunnel scsi_transport_fc ipr [ 277.109391] CPU: 9 PID: 973 Comm: eehd Not tainted 4.4.0-34-generic #53-Ubuntu [ 277.109467] task: c00feb3c2a20 ti: c00feb408000 task.ti: c00feb408000 [ 277.109542] NIP: c0083c7c LR: c0083c78 CTR: c0083c20 [ 277.109617] REGS: c00feb40b760 TRAP: 0300 Not tainted (4.4.0-34-generic) [ 277.109691] MSR: 90019033 CR: 28008822 XER: [ 277.109880] CFAR: c0008468 DAR: 0010 DSISR: 4000 SOFTE: 1 GPR00: c0083c78 c00feb40b9e0 c15b5d00 GPR04: 0001 c00feb40bac0 c02d74b54220 0f9f GPR08: 0026 GPR12: c0083c20 c7b45580 c00e63d8 c02d74c40100 GPR16: GPR20: c0d42468 GPR24: c0d42440 0100 c0036460 GPR28: c161a3f0 0001 c0281000 c000fe44 [ 277.110878] NIP [c0083c7c] pnv_eeh_reset+0x5c/0x170 [ 277.110931] LR [c0083c78] pnv_eeh_reset+0x58/0x170 [ 277.110981] Call Trace: [ 277.111009] [c00feb40b9e0] [c0083c78] pnv_eeh_reset+0x58/0x170 (unreliable) [ 277.111098] [c00feb40ba60] [c0038250] eeh_reset_pe+0xb0/0x1c0 [ 277.75] [c00feb40bb00] [c0af472c] eeh_reset_device+0xd8/0x228 [ 277.111255] [c00feb40bba0] [c003c4c0] eeh_handle_normal_event+0x390/0x440 [ 277.111429] [c00feb40bc20] [c003c964] eeh_handle_event+0x184/0x370 [ 277.111601] [c00feb40bcd0] [c003cd28] eeh_event_handler+0x1d8/0x1e0 [ 277.111772] [c00feb40bd80] [c00e64e0] kthread+0x110/0x130 [ 277.111910] [c00feb40be30] [c0009538] ret_from_kernel_thread+0x5c/0xa4 [ 277.112068] Instruction dump: [ 277.112143]