Re: infinite loop in crash due to double-NMI on x86_64 system

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



 

> -----Original Message-----
> From: crash-utility-bounces@xxxxxxxxxx 
> [mailto:crash-utility-bounces@xxxxxxxxxx] On Behalf Of Dave Anderson
> Sent: Monday, June 28, 2010 12:11 PM
> To: Discussion list for crash utility usage,maintenance and 
> development
> Subject: Re:  infinite loop in crash due to 
> double-NMI on x86_64 system
> 
> 
>   
> ----- "Lucas Silacci" <Lucas.Silacci@xxxxxxxxxxxx> wrote:
> 
> > Below is the output of running crash (with the patch) against one of
> > these dumps.
> > 
> > -Lucas
> > 
> > 
> > crash 5.0.5
> > Copyright (C) 2002-2010  Red Hat, Inc.
> > Copyright (C) 2004, 2005, 2006  IBM Corporation
> > Copyright (C) 1999-2006  Hewlett-Packard Co    
> > Copyright (C) 2005, 2006  Fujitsu Limited      
> > Copyright (C) 2006, 2007  VA Linux Systems Japan K.K.
> > Copyright (C) 2005  NEC Corporation                  
> > Copyright (C) 1999, 2002, 2007  Silicon Graphics, Inc.
> > Copyright (C) 1999, 2000, 2001, 2002  Mission Critical Linux, Inc.
> > This program is free software, covered by the GNU General 
> Public License,
> > and you are welcome to change it and/or distribute copies 
> of it under 
> > certain conditions.  Enter "help copying" to see the conditions.
> > 
> > This program has absolutely no warranty.  Enter "help warranty" for
> > details.
> > 
> > GNU gdb (GDB) 7.0
> > Copyright (C) 2009 Free Software Foundation, Inc.
> > License GPLv3+: GNU GPL version 3 or later
> > <http://gnu.org/licenses/gpl.html>
> > This is free software: you are free to change and redistribute it.
> > There is NO WARRANTY, to the extent permitted by law.  Type 
> "show copying"   
> > and "show warranty" for details.
> > 
> > This GDB was configured as "x86_64-unknown-linux-gnu"...
> > 
> > please wait... (determining panic task)                     
>           
> > 
> > WARNING: Loop detected in the NMI Exception Stack!          
>           
> > 
> > 
> > bt: cannot transition from exception stack to current process stack:
> >     exception stack pointer: ffffffff8046dc50                       
> >       process stack pointer: ffffffff8046ddd8
> >          current stack base: ffffffff80422000
> > 
> >   SYSTEM MAP: /boot/System.map-2.6.16.53-0.8.PTF.434477.9.TDC.0-smp
> > DEBUG KERNEL: /boot/vmlinux-2.6.16.53-0.8.PTF.434477.9.TDC.0-smp
> > (2.6.16.53-0.8.PTF.434477.9.TDC.0-smp)
> >     DUMPFILE: /var/crash/lucas.save/vmcore  [PARTIAL DUMP]
> >         CPUS: 4
> >         DATE: Tue May 18 12:46:07 2010
> >       UPTIME: 07:24:54
> > LOAD AVERAGE: 85.74, 82.85, 82.29
> >        TASKS: 2449
> >     NODENAME: POLO5_1-9
> >      RELEASE: 2.6.16.53-0.8.PTF.434477.9.TDC.0-smp
> >      VERSION: #1 SMP Fri Aug 31 06:07:27 PDT 2007
> >      MACHINE: x86_64  (2660 Mhz)
> >       MEMORY: 7.9 GB
> >        PANIC: "Kernel panic - not syncing: dumpsw: Dump 
> switch pushed; reason: 0x20  args=0xffffffff8046df08"
> >          PID: 0
> >      COMMAND: "swapper"
> >         TASK: ffffffff8038c340  (1 of 4)  [THREAD_INFO: 
> ffffffff80422000]
> >          CPU: 0
> >        STATE: TASK_RUNNING (PANIC)
> > 
> > crash> bt
> > PID: 0      TASK: ffffffff8038c340  CPU: 0   COMMAND: "swapper"
> >  #0 [ffffffff8046dc50] machine_kexec at ffffffff8011a95b
> >  #1 [ffffffff8046dd20] crash_kexec at ffffffff80154351
> >  #2 [ffffffff8046dde0] panic at ffffffff801327fa
> >  #3 [ffffffff8046ded0] dumpsw_notify at ffffffff8831c0c3
> >  #4 [ffffffff8046dee0] notifier_call_chain at ffffffff8032481f
> >  #5 [ffffffff8046df00] default_do_nmi at ffffffff80322fab
> >  #6 [ffffffff8046df40] do_nmi at ffffffff80323365
> >  #7 [ffffffff8046df50] nmi at ffffffff8032268f
> >     [exception RIP: smp_send_stop+84]
> >     RIP: ffffffff80116e44  RSP: ffffffff8046ddd8  RFLAGS: 00000246
> >     RAX: 00000000000000ff  RBX: ffffffff8831c1f8  RCX: 
> 000041049c7256e8
> >     RDX: 0000000000000005  RSI: 000000005238a938  RDI: 
> 00000000002896a0
> >     RBP: ffffffff8046df08   R8: 00000000000040fb   R9: 
> 000000005238a7e8
> >     R10: 0000000000000002  R11: 0000ffff0000ffff  R12: 
> 000000000000000c
> >     R13: 0000000000000000  R14: 0000000000000000  R15: 
> 0000000000000000
> >     ORIG_RAX: ffffffffffffffff  CS: 0010  SS: 0018
> > --- <NMI exception stack> ---
> >  #8 [ffffffff8046ddd8] smp_send_stop at ffffffff80116e44
> > bt: WARNING: Loop detected in the NMI Exception Stack!
> > bt: cannot transition from exception stack to current process stack:
> >     exception stack pointer: ffffffff8046dc50
> >       process stack pointer: ffffffff8046ddd8
> >          current stack base: ffffffff80422000
> > crash> 
>  
> What exactly was the sequence of events?  Was the system 
> repeatedly and
> erroneously running one NMI after another for some reason, 
> and *then* the
> "dump switch" was pressed?  And the dumpsw_notify() function 
> sends another
> NMI?  And where does that dumpsw_notify() function live anyway?
> 
> I'm just trying to get a grip on whether this will ever 
> happen again, or
> whether it's fixing a one-time hardware abnormality?
> 
> Dave
>

As far as I am aware, we have had three separate customers encounter
this issue. It appears from the hardware SEL log that multiple PCI
SERR's came in at the same time and somehow triggered multiple NMIs. You
can see the SEL entries from the output of the "ipmitool sel" command:

0231 11FC  02  01:53:47 12/17/09  3300 04   13  EB   6F  A5 15 08  Crit.
Interrupt   PCI SERR (PCI Bus 15 Device 1 Function 0) was asserted
0232 1210  02  01:53:47 12/17/09  3300 04   13  EB   6F  A5 16 20  Crit.
Interrupt   PCI SERR (PCI Bus 16 Device 4 Function 0) was asserted
0233 1224  02  01:53:47 12/17/09  3300 04   13  EB   6F  A5 16 21  Crit.
Interrupt   PCI SERR (PCI Bus 16 Device 4 Function 1) was asserted
0234 1238  02  01:53:47 12/17/09  3300 04   13  EB   6F  A5 16 30  Crit.
Interrupt   PCI SERR (PCI Bus 16 Device 6 Function 0) was asserted
0235 124C  02  01:53:47 12/17/09  3300 04   13  EB   6F  A5 16 31  Crit.
Interrupt   PCI SERR (PCI Bus 16 Device 6 Function 1) was asserted

My understanding of the architecture of the system is that only one NMI
should have been asserted to the OS regardless of the number of times
there was a hardware error, but clearly that wasn't the case in these
three instances.

Also, it seemed like my patch made crash a little bit more tolerant of
"corrupted" dump images which I thought could only be a good thing.

-Lucas

--
Crash-utility mailing list
Crash-utility@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/crash-utility


[Index of Archives]     [Fedora Development]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]

 

Powered by Linux