Jeff, Could you please help verify the following kernel on the REP?
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1689886 You can enable zesty-proposed to the system by adding the line. deb http://us.ports.ubuntu.com/ubuntu-ports/ zesty-proposed main restricted to /etc/apt/sources.list file, then do a sudo apt update; sudo apt install linux-image-4.10.0-22-generic linux-image-extra-4.10.0-22-generic Please note that when you boot the system you will encounter the NMI soft lockup because the patches to fix that has not yet been merged to zesty and those are still under review.. but if you wait long enough it should give you a log in prompt. After you have verified that the kernel fixes the issue, please update the tag to verifcation-done. Thanks a ton Manoj Iyer. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1689886 Title: [SRU][Zesty]QDF2400 kernel oops on ipmitool fru write 0 fru.bin Status in linux package in Ubuntu: Incomplete Bug description: [Impact] $ sudo ipmitool fru print 0 Chassis Type : Rack Mount Chassis Chassis Part Number : ............ Chassis Serial : ............ Board Mfg Date : Wed Jan 4 14:18:00 2017 Board Mfg : WIWYNN Board Product : REP Board Board Serial : 12345 Board Part Number : ............ Product Manufacturer : WIWYNN Product Name : REP Product Part Number : .......... Product Version : EVT Product Serial : ........................ Product Asset Tag : ubuntu@ubuntu:~/FRU$ ubuntu@ubuntu:~/FRU$ sudo ipmitool fru write 0 fru.bin Fru Size : 1024 bytes Size to Write : 256 bytes [ 1815.412463] Unable to handle kernel NULL pointer dereference at virtual address 00000025 [ 1815.419668] pgd = ffff219ca2168000 [ 1815.422986] [00000025] *pgd=00000003ee08d003, *pud=00000003ee08e003, *pmd=0000000000000000 [ 1815.431225] Internal error: Oops: 96000004 [#1] SMP [ 1815.436086] Modules linked in: ipmi_devintf nls_utf8 nls_cp437 vfat fat aes_ce_blk ablk_helper cryptd aes_ce_cipher ghash_ce sha2_ce efi_pstore sha1_ce sg efivars ipmi_ssif ipmi_msghandler cppc_cpufreq i2c_qup i2c_core efivarfs autofs4 ext4 crc16 jbd2 mbcache sd_mod ahci_platform libahci_platform libahci xhci_plat_hcd libata xhci_hcd scsi_mod usbcore msm_emac sdhci_acpi sdhci usb_common pinctrl_qdf2xxx [ 1815.471677] CPU: 7 PID: 1950 Comm: kssif0042 Not tainted 4.7.0-2-generic #5~pdaw1.0+bandera.9-Ubuntu [ 1815.480789] Hardware name: Default string Default string/Default string, BIOS 5.12 12/12/2012 [ 1815.489296] task: ffffedf1aa074380 ti: ffffedf1a7820000 task.ti: ffffedf1a7820000 [ 1815.496772] PC is at ipmi_ssif_thread+0x84/0x128 [ipmi_ssif] [ 1815.502407] LR is at ipmi_ssif_thread+0x6c/0x128 [ipmi_ssif] [ 1815.508046] pc : [<ffff219c9d09f614>] lr : [<ffff219c9d09f5fc>] pstate: 00400145 [ 1815.515424] sp : ffffedf1a7823de0 [ 1815.518723] x29: ffffedf1a7823de0 x28: 0000000000000000 [ 1815.524018] x27: 0000000000000000 x26: 0000000000000000 [ 1815.529313] x25: 0000000000000000 x24: 0000000000000000 [ 1815.534608] x23: ffffedeeb9dbba08 x22: ffff219c9d0a3000 [ 1815.539903] x21: ffff219c9d0a2420 x20: ffffedeeb9dbba00 [ 1815.545198] x19: ffffedeeb9dbb800 x18: 0000000000000014 [ 1815.550494] x17: 0000000000000000 x16: 0000000000000000 [ 1815.555789] x15: 0000000000000000 x14: 0000000000000000 [ 1815.561084] x13: 0000000000000000 x12: 071c71c71c71c71c [ 1815.566379] x11: 00000000000000ba x10: 0000000000000960 [ 1815.571674] x9 : 0000000000000040 x8 : ffffedf1ad000028 [ 1815.576969] x7 : 0000000000000000 x6 : ffffedf1aa9f9600 [ 1815.582264] x5 : ffffedf1ad000000 x4 : 0000000000000000 [ 1815.587560] x3 : 0000000000000026 x2 : 0000000000000025 [ 1815.592855] x1 : 0000000000000007 x0 : ffffedf1aa2e4c00 [ 1815.598150] [ 1815.599626] Process kssif0042 (pid: 1950, stack limit = 0xffffedf1a7820020) [ 1815.606571] Stack: (0xffffedf1a7823de0 to 0xffffedf1a7824000) [ 1815.612301] 3de0: ffffedf1a7823e20 ffff219ca122cb1c ffffedf1ab9d5800 ffff219ca20cdfa8 [ 1815.620113] 3e00: ffff219ca1aa2ee8 ffffedeeb9dbb800 ffff219c9d09f590 ffffedeeb9dbb800 [ 1815.627925] 3e20: 0000000000000000 ffff219ca11c4f10 ffff219ca122ca30 ffffedf1ab9d5800 [ 1815.635737] 3e40: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.643550] 3e60: 0000000000000000 ffff219ca12399a8 ffffedeeb9dbb800 ffffedf100000000 [ 1815.651363] 3e80: 0000000000000000 ffffedf1a7823e88 ffffedf1a7823e88 0000000000000000 [ 1815.659175] 3ea0: 0000000000000000 ffffedf1a7823ea8 ffffedf1a7823ea8 cb88537fdc8ba500 [ 1815.666987] 3ec0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.674800] 3ee0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.682612] 3f00: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.690425] 3f20: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.698237] 3f40: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.706050] 3f60: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.713862] 3f80: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.721675] 3fa0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.729487] 3fc0: 0000000000000000 0000000000000005 0000000000000000 0000000000000000 [ 1815.737300] 3fe0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 [ 1815.745112] Call trace: [ 1815.747543] Exception stack(0xffffedf1a7823bf0 to 0xffffedf1a7823d20) [ 1815.753966] 3be0: ffffedeeb9dbb800 0001000000000000 [ 1815.761779] 3c00: ffffedf1a7823de0 ffff219c9d09f614 0000000000400145 ffff219c9d0067c0 [ 1815.769592] 3c20: ffffedf1a5a59840 0000000000000005 0000000000000000 0000000000000042 [ 1815.777404] 3c40: 0000000000000006 0000000000000000 ffffedf1a7823db0 0000000000000000 [ 1815.785217] 3c60: 0000000000000000 ffff219ca1878a7c 7fffffffffffffff ffff219ca1875158 [ 1815.793029] 3c80: ffffedf1a7823d30 ffff002200000042 ffffedf1a7823cd0 ffff000000010042 [ 1815.800842] 3ca0: ffffedf1a7823ca8 cb88537fdc8ba500 ffffedf1aa2e4c00 0000000000000007 [ 1815.808654] 3cc0: 0000000000000025 0000000000000026 0000000000000000 ffffedf1ad000000 [ 1815.816467] 3ce0: ffffedf1aa9f9600 0000000000000000 ffffedf1ad000028 0000000000000040 [ 1815.824279] 3d00: 0000000000000960 00000000000000ba 071c71c71c71c71c 0000000000000000 [ 1815.832094] [<ffff219c9d09f614>] ipmi_ssif_thread+0x84/0x128 [ipmi_ssif] [ 1815.838781] [<ffff219ca122cb1c>] kthread+0xec/0x100 [ 1815.843639] [<ffff219ca11c4f10>] ret_from_fork+0x10/0x40 [ 1815.848933] Code: f9411a62 350002c0 91000443 f940f660 (39400042) [ 1815.855021] ---[ end trace db5a5cd0dc6b9dc4 ]--- No data available [Regression Potential] The patch to fix this issue is to the ipmi_ssif driver, it will have potential impact on systems using ipmi_ssif for ipmi interface and supports FRU writes. [Test] Listed in the impact statement. Further test results will be posted to this bug as comments. [Fix] Linus tree: 6de65fcfdb51 ipmi: Fix kernel panic at ipmi_ssif_thread() To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1689886/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp