[Bug 1940482] Re: [thunderx2] Synchronous external abort: 96000610 [#1] SMP

2021-10-17 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu Focal) because there has been no activity for
60 days.]

** Changed in: linux (Ubuntu Focal)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940482

Title:
  [thunderx2] Synchronous external abort: 96000610 [#1] SMP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940482] Re: [thunderx2] Synchronous external abort: 96000610 [#1] SMP

2021-10-17 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]

** Changed in: linux (Ubuntu)
   Status: Incomplete => Expired

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940482

Title:
  [thunderx2] Synchronous external abort: 96000610 [#1] SMP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940482] Re: [thunderx2] Synchronous external abort: 96000610 [#1] SMP

2021-08-18 Thread Sean Feole
After some further poking, The latest Internal Error (via kernel
5.4.0-83-generic #93-Ubuntu)  has rendered the system responsive via
network communication , (ICMP) requests. However, ssh itself appears to
sit idle indefinitely when trying to login to the machine remotely.

OpenSSH_7.6p1 Ubuntu-4ubuntu0.5, OpenSSL 1.0.2n  7 Dec 2017
debug1: Reading configuration data /home/maas/.ssh/config
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 19: Applying options for *
debug1: /etc/ssh/ssh_config line 59: Applying options for *
debug1: auto-mux: Trying existing master
debug2: fd 3 setting O_NONBLOCK
debug2: mux_client_hello_exchange: master version 4
debug3: mux_client_forwards: request forwardings: 0 local, 0 remote
debug3: mux_client_request_session: entering
debug3: mux_client_request_alive: entering
debug3: mux_client_request_alive: done pid = 174117
debug3: mux_client_request_session: session request sent

Something else is at play, however, we can not see what it is due to
this being a cloud image. Login on the CLI is not allowed.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940482

Title:
  [thunderx2] Synchronous external abort: 96000610 [#1] SMP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940482] Re: [thunderx2] Synchronous external abort: 96000610 [#1] SMP

2021-08-18 Thread Sean Feole
Full Log Attached

** Attachment added: "thunderx2focalupdate.txt"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940482/+attachment/5518866/+files/thunderx2focalupdate.txt

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940482

Title:
  [thunderx2] Synchronous external abort: 96000610 [#1] SMP

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1940482/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1940482] Re: [thunderx2] Synchronous external abort: 96000610 [#1] SMP

2021-08-18 Thread Sean Feole
After updating the MAAS images to use an update version of the -stable
images, it now appears the ThunderX2 will boot with focal linux-generic:
See Below,

The Deployed kernel did not experience a "synchronous external abort: 96000610 
[#1] SMP" when a reboot command was issued to power cycle.
Deployed Kernel: 5.4.0-81-generic #91-Ubuntu SMP Thu Jul 15 19:10:30 UTC 2021

After rebooting into the new -proposed kernel at this time, the Host came up , 
followed by the kernel panic. This did NOT render the system unusable. 
Upgraded Kernel: 5.4.0-83-generic #93-Ubuntu 

helo-kernel login: [  139.500352] Internal error: synchronous external abort: 
96000610 [#1] SMP
[  139.507134] Modules linked in: nls_iso8859_1 dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua joydev input_leds ipmi_ssif ipmi_devintf 
ipmi_msghandler thunderx2_pmu cppc_cpufreq sch_fq_codel ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 
multipath linear i2c_smbus hid_generic usbhid hid uas ast drm_vram_helper ttm 
crct10dif_ce drm_kms_helper ghash_ce syscopyarea sha2_ce sysfillrect 
sha256_arm64 mpt3sas sysimgblt usb_storage qede sha1_ce fb_sys_fops raid_class 
qed drm scsi_transport_sas igb ahci i2c_algo_bit crc8 gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher
[  139.570639] CPU: 56 PID: 4157 Comm: landscape-sysin Not tainted 
5.4.0-83-generic #93-Ubuntu
[  139.578976] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL030 
06/04/2020
[  139.586965] pstate: 2049 (nzCv daif +PAN -UAO)
[  139.591767] pc : qed_memcpy_hw+0x98/0x140 [qed]
[  139.596295] lr : qed_memcpy_hw+0x12c/0x140 [qed]
[  139.600898] sp : 8000364131b0
[  139.604199] x29: 8000364131b0 x28:  
[  139.609497] x27: 009ee6803538 x26:  
[  139.614795] x25: 1000 x24: 800036413298 
[  139.620093] x23: 01d04b68 x22: 0040 
[  139.625391] x21: 009ed9b70090 x20: 0040 
[  139.630688] x19:  x18:  
[  139.635986] x17:  x16:  
[  139.641283] x15:  x14:  
[  139.646581] x13:  x12: 0020 
[  139.651878] x11: 0101010101010101 x10: 7f7f7f7f7f7f7f7f 
[  139.657176] x9 :  x8 : 8000364132d8 
[  139.662473] x7 : 800036413298 x6 : 000f 
[  139.667771] x5 :  x4 : 0040 
[  139.673068] x3 : 01d04b68 x2 : 800025b8a000 
[  139.678366] x1 : 800025b8 x0 : 0010 
[  139.683665] Call trace:
[  139.686110]  qed_memcpy_hw+0x98/0x140 [qed]
[  139.690289]  qed_memcpy_from+0x64/0xc0 [qed]
[  139.694555]  __qed_get_vport_mstats+0x90/0x148 [qed]
[  139.699515]  _qed_get_vport_stats+0x198/0x298 [qed]
[  139.704388]  qed_get_vport_stats+0x30/0x88 [qed]
[  139.708997]  qede_fill_by_demand_stats+0x44/0x290 [qede]
[  139.714297]  qede_get_stats64+0x30/0xd0 [qede]
[  139.718729]  dev_get_stats+0x6c/0xd8
[  139.722292]  rtnl_fill_stats+0x50/0x148
[  139.726115]  rtnl_fill_ifinfo+0x510/0xd60
[  139.730110]  rtnl_dump_ifinfo+0x25c/0x528
[  139.734108]  netlink_dump+0xfc/0x330
[  139.737671]  __netlink_dump_start+0x144/0x1c0
[  139.742013]  rtnetlink_rcv_msg+0x240/0x338
[  139.746096]  netlink_rcv_skb+0x60/0x120
[  139.749918]  rtnetlink_rcv+0x2c/0x38
[  139.753480]  netlink_unicast+0x188/0x210
[  139.757389]  netlink_sendmsg+0x1c0/0x368
[  139.761301]  sock_sendmsg+0x58/0x68
[  139.764776]  __sys_sendto+0xe8/0x158
[  139.768338]  __arm64_sys_sendto+0x34/0x48
[  139.772335]  el0_svc_common.constprop.0+0xe4/0x1f0
[  139.777112]  el0_svc_handler+0x38/0xa8
[  139.780848]  el0_svc+0x10/0x2c8
[  139.783980] Code: d37e7cc8 91001108 8b0800e8 b4000140 (b9400046) 
[  139.790060] ---[ end trace f0a24c697c627870 ]---
[  415.995884] Internal error: synchronous external abort: 96000610 [#2] SMP
[  416.002669] Modules linked in: nls_iso8859_1 dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua joydev input_leds ipmi_ssif ipmi_devintf 
ipmi_msghandler thunderx2_pmu cppc_cpufreq sch_fq_codel ip_tables x_tables 
autofs4 btrfs zstd_compress raid10 raid456 async_raid6_recov async_memcpy 
async_pq async_xor async_tx xor xor_neon raid6_pq libcrc32c raid1 raid0 
multipath linear i2c_smbus hid_generic usbhid hid uas ast drm_vram_helper ttm 
crct10dif_ce drm_kms_helper ghash_ce syscopyarea sha2_ce sysfillrect 
sha256_arm64 mpt3sas sysimgblt usb_storage qede sha1_ce fb_sys_fops raid_class 
qed drm scsi_transport_sas igb ahci i2c_algo_bit crc8 gpio_xlp i2c_xlp9xx 
aes_neon_bs aes_neon_blk aes_ce_blk crypto_simd cryptd aes_ce_cipher
[  416.066204] CPU: 0 PID: 14 Comm: kworker/0:1 Tainted: G  D   
5.4.0-83-generic #93-Ubuntu
[  416.075323] Hardware name: To be filled by O.E.M. Saber/Saber, BIOS 0ACKL030 
06/04/2020
[  416.083337] Workqueue: events igb_ptp_over