group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #08837
[Bug 1626222] Re: STC860:alpine-pdq:alpdq5p03: kernel panic when adding vnic
This bug was fixed in the package linux - 4.4.0-47.68
---------------
linux (4.4.0-47.68) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1636941
* Add a driver for Amazon Elastic Network Adapters (ENA) (LP: #1635721)
- lib/bitmap.c: conversion routines to/from u32 array
- net: ethtool: add new ETHTOOL_xLINKSETTINGS API
- net: ena: Add a driver for Amazon Elastic Network Adapters (ENA)
- [config] enable CONFIG_ENA_ETHERNET=m (Amazon ENA driver)
* unexpectedly large memory usage of mounted snaps (LP: #1636847)
- [Config] switch squashfs to single threaded decode
-- Kamal Mostafa <kamal@xxxxxxxxxxxxx> Wed, 26 Oct 2016 10:47:55 -0700
** Changed in: linux (Ubuntu Xenial)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1626222
Title:
STC860:alpine-pdq:alpdq5p03: kernel panic when adding vnic
Status in linux package in Ubuntu:
Fix Released
Status in linux source package in Xenial:
Fix Released
Status in linux source package in Yakkety:
Fix Released
Bug description:
Description: Ubuntu 16.04 LTS
Linux alpdq5p03 4.4.0-22-generic #40-Ubuntu SMP Thu May 12 22:03:35 UTC 2016 ppc64le ppc64le ppc64le GNU/Linux
Problem Description :
When I created a vNIC on alpdq5p03 using U78C7.001.KIC1906-P1-C12-T1
via alpdq5p08 and U78C7.001.KIC1906-P1-C12-T2 via alpdq5p09 as the
backing devices I got a kernel panic.
[ 129.977324] ibmvnic 30000004: Virtual Adapter failed (rc=8)
[ 129.977346] Unable to handle kernel paging request for data at address 0x000000f1
[ 129.977351] Faulting instruction address: 0xd000000010882434
[ 129.977355] Oops: Kernel access of bad area, sig: 11 [#1]
[ 129.977359] SMP NR_CPUS=2048 NUMA pSeries
[ 129.977364] Modules linked in: ibmvnic rpadlpar_io rpaphp nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag af_packet_diag netlink_diag rtc_generic pseries_rng binfmt_misc sunrpc autofs4 ibmvscsi ibmveth
[ 129.977392] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.4.0-22-generic #40-Ubuntu
[ 129.977397] task: c0000000015566b0 ti: c000001ffffd8000 task.ti: c0000000015b0000
[ 129.977401] NIP: d000000010882434 LR: d000000010882420 CTR: c0000000002b25f0
[ 129.977406] REGS: c000001ffffdb9c0 TRAP: 0300 Not tainted (4.4.0-22-generic)
[ 129.977410] MSR: 8000000000009033 <SF,EE,ME,IR,DR,RI,LE> CR: 48048224 XER: 20000010
[ 129.977422] CFAR: c000000000008468 DAR: 00000000000000f1 DSISR: 40000000 SOFTE: 0
GPR00: d000000010882420 c000001ffffdbc40 d000000010894240 0000000000000000
GPR04: c000001ff4039ee0 0000000000000000 0000001ffdd80000 0000000000002082
GPR08: c000000000f9fda8 c000000000f9fda8 0000001ffdd80000 d0000000108896e8
GPR12: c0000000002b25f0 c00000000e7e0000 c0000000015eef18 c000000000f9d678
GPR16: 0000000000000001 0000000000000000 c000001fd3960e18 c000001fd3960db0
GPR20: c0000000015b0000 c000001fd3960d98 c000001fd3960e08 c000001fd3960900
GPR24: c000001fd3960d88 c000001fd39bf000 c000001fd39bf048 0000000000000000
GPR28: 0000000000000100 0000000000000200 00000000000000f0 c000001fd3960900
[ 129.977482] NIP [d000000010882434] ibmvnic_free_inflight+0x104/0x330 [ibmvnic]
[ 129.977488] LR [d000000010882420] ibmvnic_free_inflight+0xf0/0x330 [ibmvnic]
[ 129.977492] Call Trace:
[ 129.977496] [c000001ffffdbc40] [d000000010882420] ibmvnic_free_inflight+0xf0/0x330 [ibmvnic] (unreliable)
[ 129.977503] [c000001ffffdbce0] [d000000010887188] ibmvnic_handle_crq+0x3a8/0x2010 [ibmvnic]
[ 129.977509] [c000001ffffdbda0] [d000000010888ea8] ibmvnic_interrupt+0xb8/0x198 [ibmvnic]
[ 129.977517] [c000001ffffdbe10] [c000000000130660] handle_irq_event_percpu+0xa0/0x320
[ 129.977523] [c000001ffffdbed0] [c000000000130948] handle_irq_event+0x68/0xc0
[ 129.977528] [c000001ffffdbf00] [c000000000135c2c] handle_fasteoi_irq+0xec/0x2b0
[ 129.977534] [c000001ffffdbf30] [c00000000012f844] generic_handle_irq+0x54/0x80
[ 129.977539] [c000001ffffdbf60] [c000000000011320] __do_irq+0x80/0x1d0
[ 129.977545] [c000001ffffdbf90] [c000000000024800] call_do_irq+0x14/0x24
[ 129.977550] [c0000000015b39a0] [c000000000011508] do_IRQ+0x98/0x140
[ 129.977555] [c0000000015b39f0] [c000000000002594] hardware_interrupt_common+0x114/0x180
[ 129.977563] --- interrupt: 501 at plpar_hcall_norets+0x1c/0x28
[ 129.977563] LR = check_and_cede_processor+0x34/0x50
[ 129.977570] [c0000000015b3ce0] [c00000000090d9f0] check_and_cede_processor+0x20/0x50 (unreliable)
[ 129.977576] [c0000000015b3d40] [c00000000090da94] dedicated_cede_loop+0x74/0x190
[ 129.977582] [c0000000015b3d80] [c00000000090ac20] cpuidle_enter_state+0x160/0x410
[ 129.977588] [c0000000015b3de0] [c000000000119a88] call_cpuidle+0x78/0xd0
[ 129.977593] [c0000000015b3e20] [c000000000119e5c] cpu_startup_entry+0x37c/0x480
[ 129.977599] [c0000000015b3ee0] [c00000000000bdcc] rest_init+0xac/0xc0
[ 129.977605] [c0000000015b3f00] [c000000000ea3f5c] start_kernel+0x53c/0x558
[ 129.977610] [c0000000015b3f90] [c000000000008c6c] start_here_common+0x20/0xa8
[ 129.977615] Instruction dump:
[ 129.977617] e95e0010 7fc3f378 f92a0008 f9490000 fb9e0010 fbbe0018 480072cd e8410018
[ 129.977626] ebde0010 7fb6f040 3bdefff0 419e00f4 <893e0001> 2f890009 409effb4 7ea3ab78
[ 129.977636] ---[ end trace 79d415687d3074f2 ]---
[ 129.979495]
[ 131.979529] Kernel panic - not syncing: Fatal exception in interrupt
[ 131.985480] ---[ end Kernel panic - not syncing: Fatal exception in interrupt
There was a fix for this particular bug in the ibmvnic_free_inflight
function pushed upstream.
Here is the commit (actually noticed by someone else independently
before I could push my own patch)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=96183182ad05d1ce31b9048921c12bf4ad621eaf
This patch should fix this kernel panic.
A test kernel needs to be built and tested but mirroring to Launchpad
for a heads up to Canonical.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1626222/+subscriptions