[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2017-03-02 Thread Seth Forshee
Setting development task to fix released since the fix has been upstream
since 4.7-rc6.

** Changed in: linux (Ubuntu)
   Status: Triaged => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-08-29 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-36.55

---
linux (4.4.0-36.55) xenial; urgency=low

  [ Stefan Bader ]

  * Release Tracking Bug
- LP: #1612305

  * I2C touchpad does not work on AMD platform (LP: #1612006)
- SAUCE: pinctrl/amd: Remove the default de-bounce time

  * CVE-2016-5696
- tcp: make challenge acks less predictable

linux (4.4.0-35.54) xenial; urgency=low

  [ Stefan Bader ]

  * Release Tracking Bug
- LP: #1611215

  * [i915_bpo] Sync with v4.7 (LP: #1609742)
- SAUCE: i915_bpo: Sync with v4.7

  * s390/cio: fix reset of channel measurement block (LP: #1609415)
- s390/cio: allow to reset channel measurement block

  * in Ubuntu16.10: Hit on Call traces  and system goes down when transactional
memory  tests are running in 32TB Brazos system (LP: #1606786)
- powerpc/tm: Avoid SLB faults in treclaim/trecheckpoint when RI=0
- powerpc/tm: Fix stack pointer corruption in __tm_recheckpoint()

  *  Power Menu does not display after press the Power Button (LP: #1609204)
- intel-vbtn: new driver for Intel Virtual Button
- [config] enable CONFIG_INTEL_VBTN=m

  * OptiPlex 7450 AIO hangs when rebooting (LP: #1608762)
- x86/reboot: Add Dell Optiplex 7450 AIO reboot quirk

  * virtualbox+usb 3.0 breaks boot, -28 kernel works (LP: #1604058)
- SAUCE: xhci: Fix soft lockup in xhci_pci_probe path when XHCI_STATE_HALTED

  * linux-kernel: Freeing IRQ from IRQ context (LP: #1597908)
- block: defer timeouts to a workqueue

  * Tunnel offload indications not stripped from encapsulated packets, causing
performance overhead (LP: #1602755)
- tunnels: Remove encapsulation offloads on decap.

  * lm-sensors is throwing "ERROR: Can't get value of subfeature temp1_input:
I/O error" for be2net driver (LP: #1607387)
- be2net: perform temperature query in adapter regardless of its interface
  state

  * Dell dock MAC Address pass through doesn't work in Ubuntu (LP: #1579984)
- r8152: Add support for setting pass through MAC address on RTL8153-AD

  * vmxnet3 LRO IPv6 performance issues (stalling TCP) (LP: #1605494)
- Driver: Vmxnet3: set CHECKSUM_UNNECESSARY for IPv6 packets

  * ISST-LTE:pVM:monklp5:Ubuntu16.04.1:system crashed at
lpfc_sli4_scmd_to_wqidx_distr (LP: #1597974)
- SAUCE: lpfc: fix oops in lpfc_sli4_scmd_to_wqidx_distr() from
  lpfc_send_taskmgmt()

  * Backport cxlflash shutdown patch to Xenial SRU (LP: #1605405)
- SAUCE: cxlflash: Verify problem state area is mapped before notifying
  shutdown

  * Xenial update to v4.4.16 stable release (LP: #1607404)
- mac80211: fix fast_tx header alignment
- mac80211: mesh: flush mesh paths unconditionally
- mac80211_hwsim: Add missing check for HWSIM_ATTR_SIGNAL
- mac80211: Fix mesh estab_plinks counting in STA removal case
- EDAC, sb_edac: Fix rank lookup on Broadwell
- IB/cm: Fix a recently introduced locking bug
- IB/mlx4: Properly initialize GRH TClass and FlowLabel in AHs
- powerpc/pseries: Fix IBM_ARCH_VEC_NRCORES_OFFSET since POWER8NVL was added
- powerpc/tm: Always reclaim in start_thread() for exec() class syscalls
- usb: dwc2: fix regression on big-endian PowerPC/ARM systems
- USB: EHCI: declare hostpc register as zero-length array
- usb: common: otg-fsm: add license to usb-otg-fsm
- mnt: fs_fully_visible test the proper mount for MNT_LOCKED
- mnt: Account for MS_RDONLY in fs_fully_visible
- mnt: If fs_fully_visible fails call put_filesystem.
- of: fix autoloading due to broken modalias with no 'compatible'
- of: irq: fix of_irq_get[_byname]() kernel-doc
- locking/ww_mutex: Report recursive ww_mutex locking early
- locking/qspinlock: Fix spin_unlock_wait() some more
- locking/static_key: Fix concurrent static_key_slow_inc()
- x86, build: copy ldlinux.c32 to image.iso
- kprobes/x86: Clear TF bit in fault on single-stepping
- x86/amd_nb: Fix boot crash on non-AMD systems
- Revert "gpiolib: Split GPIO flags parsing and GPIO configuration"
- uvc: Forward compat ioctls to their handlers directly
- thermal: cpu_cooling: fix improper order during initialization
- writeback: use higher precision calculation in domain_dirty_limits()
- nfsd4/rpc: move backchannel create logic into rpc code
- nfsd: Always lock state exclusively.
- nfsd: Extend the mutex holding region around in nfsd4_process_open2()
- posix_acl: Add set_posix_acl
- nfsd: check permissions when setting ACLs
- make nfs_atomic_open() call d_drop() on all ->open_context() errors.
- NFS: Fix another OPEN_DOWNGRADE bug
- ARM: imx6ul: Fix Micrel PHY mask
- ARM: 8578/1: mm: ensure pmd_present only checks the valid bit
- ARM: 8579/1: mm: Fix definition of pmd_mknotpresent
- MIPS: KVM: Fix modular KVM under QEMU
- mm: Export migrate_page_move_mapping and migrate_page_copy
- UBIFS: Implement ->migratepage()
- sched/fair: Fix 

[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-08-17 Thread bugproxy
--- Comment From pavsu...@in.ibm.com 2016-08-17 02:35 EDT---
I have installed the latest Ubuntu 16.04.1 kernel and executed the test again.

root@ltc-garri2:~# uname -a
Linux ltc-garri2 4.4.0-36-generic #55-Ubuntu SMP Thu Aug 11 18:00:57 UTC 2016 
ppc64le ppc64le ppc64le GNU/Linux
root@ltc-garri2:~# cat /etc/os-release
NAME="Ubuntu"
VERSION="16.04.1 LTS (Xenial Xerus)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 16.04.1 LTS"
VERSION_ID="16.04"
HOME_URL="http://www.ubuntu.com/;
SUPPORT_URL="http://help.ubuntu.com/;
BUG_REPORT_URL="http://bugs.launchpad.net/ubuntu/;
VERSION_CODENAME=xenial
UBUNTU_CODENAME=xenial

root@ltc-garri2:~# lspci | grep -i 0001:00:00.0
0001:00:00.0 PCI bridge: IBM Device 03dc
root@ltc-garri2:~# cat /proc/powerpc/eeh | tail -n 1
eeh_slot_resets=0

root@ltc-garri2:~# lspci | grep -i 0001:00:00.0
0001:00:00.0 PCI bridge: IBM Device 03dc
root@ltc-garri2:~# echo 0:0:1:0:0 > /sys/kernel/debug/powerpc/PCI0001/err_injct 
&& lspci -ns 0001:00:00.0; echo $?
0001:00:00.0 0604: 1014:03dc
0

root@ltc-garri2:~# lspci | grep -i 0008:00:00.0
0008:00:00.0 PCI bridge: IBM Device 03dc
root@ltc-garri2:~# cat /proc/powerpc/eeh | tail -n 1
eeh_slot_resets=0
root@ltc-garri2:~# echo 0:0:1:0:0 > /sys/kernel/debug/powerpc/PCI0008/err_injct 
&& lspci -ns 0008:00:00.0; echo $?
0008:00:00.0 0604: 1014:03dc
0

The machine did not crash with kernel panic and the issue is resolved
with the latest kernel fixes.

** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-08-16 Thread Stefan Bader
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-08-09 Thread Stefan Bader
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-07-21 Thread Kamal Mostafa
** Changed in: kernel-package (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kernel-package/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-07-21 Thread bugproxy
** Package changed: linux (Ubuntu) => kernel-package (Ubuntu)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/kernel-package/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-07-18 Thread Tim Gardner
https://lists.ubuntu.com/archives/kernel-team/2016-July/079193.html

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-07-18 Thread Tim Gardner
Guo Wen Shan - how about if you take a stab at the backports for these 2
patches, 'cause I don't think they make sense for a 4.4 kernel.

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => In Progress

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Tim Gardner (timg-tpi)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1603449] Re: [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad area, sig: 11 [#1] while executing Froze PE Error injection

2016-07-15 Thread Leann Ogasawara
** Package changed: kernel-package (Ubuntu) => linux (Ubuntu)

** Changed in: linux (Ubuntu)
   Importance: Undecided => High

** Changed in: linux (Ubuntu)
   Status: New => Triaged

** Changed in: linux (Ubuntu)
 Assignee: Taco Screen team (taco-screen-team) => Canonical Kernel Team 
(canonical-kernel-team)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1603449

Title:
  [LTCTest][Opal][OP820] Machine crashed with Oops: Kernel access of bad
  area, sig: 11 [#1] while executing Froze PE Error injection

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1603449/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs