** Changed in: linux (Ubuntu)
Status: In Progress => Incomplete
** Changed in: ubuntu-power-systems
Status: In Progress => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1694485
Title:
Ubuntu17.04: CAPI: call trace seen while error injection to the CAPI
card.
Status in The Ubuntu-power-systems project:
Incomplete
Status in linux package in Ubuntu:
Incomplete
Status in linux source package in Zesty:
In Progress
Bug description:
== Comment: #0 - SUDEESH JOHN - 2017-03-18 13:55:03 ==
---Problem Description---
call trace while injecting error to the CAPI card.
" WARNING: CPU: 31 PID: 491 at
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325
cxl_adapter_context_unlock+0x68/0x90 [cxl] "
---uname output---
Linux freak 4.10.0-13-generic #15-Ubuntu SMP Thu Mar 9 20:27:28 UTC 2017
ppc64le ppc64le ppc64le GNU/Linux
Machine Type = PowerNV 8247-21L
---Steps to Reproduce---
1. echo 10000 > /sys/kernel/debug/powerpc/eeh_max_freezes
2. echo 1 > /sys/class/cxl/card0/perst_reloads_same_image
3. echo 0x8000000000000000 >
/sys/kernel/debug/powerpc/PCI0000/err_injct_outbound
---The complete call trace ---
Mar 18 14:39:09 freak kernel: [ 289.675421] ------------[ cut here
]------------
Mar 18 14:39:09 freak kernel: [ 289.675431] WARNING: CPU: 5 PID: 491 at
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325
cxl_adapter_context_unlock+0x68/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [ 289.675432] Modules linked in: xt_CHECKSUM
iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4
nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT
nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter
ebtables ip6table_filter ip6_tables iptable_filter uio_pdrv_genirq uio
ipmi_powernv ipmi_devintf ipmi_msghandler powernv_op_panel powernv_rng
vmx_crypto ibmpowernv leds_powernv ib_iser rdma_cm iw_cm ib_cm ib_core configfs
iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4
btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx
xor raid6_pq raid1 raid0 multipath linear ses enclosure scsi_transport_sas
bnx2x mlx5_core tg3 cxl mdio ipr libcrc32c devlink crc32c_vpmsum pnv_php
Mar 18 14:39:09 freak kernel: [ 289.675490] CPU: 5 PID: 491 Comm: eehd Not
tainted 4.10.0-13-generic #15-Ubuntu
Mar 18 14:39:09 freak kernel: [ 289.675492] task: c0000003bfbfde00
task.stack: c0000003bfc5c000
Mar 18 14:39:09 freak kernel: [ 289.675493] NIP: d000000005cc0ca0 LR:
d000000005cc0c9c CTR: c000000000605aa0
Mar 18 14:39:09 freak kernel: [ 289.675495] REGS: c0000003bfc5f6a0 TRAP:
0700 Not tainted (4.10.0-13-generic)
Mar 18 14:39:09 freak kernel: [ 289.675496] MSR: 900000000282b033
<SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>
Mar 18 14:39:09 freak kernel: [ 289.675504] CR: 28008282 XER: 20000000
Mar 18 14:39:09 freak kernel: [ 289.675504] CFAR: c000000000b568dc SOFTE: 1
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR00: d000000005cc0c9c
c0000003bfc5f920 d000000005cf2d88 000000000000002f
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR04: 0000000000000001
00000000000003fd 0000000063206576 0000000000000000
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR08: c0000000015dc700
0000000000000000 0000000000000000 0000000000000001
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR12: 0000000000008800
c00000000fb82d00 c000000000108c88 c0000003c51f9f00
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR16: 0000000000000000
0000000000000000 0000000000000000 0000000000000000
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR20: 0000000000000000
0000000000000000 0000000000000000 c000000000d53990
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR24: c000000000d53968
c0000000014a4330 c0000003ab8fa800 c0000003bd2c20c0
Mar 18 14:39:09 freak kernel: [ 289.675504] GPR28: c0000003c5051098
0000000000000000 c0000003ab8fa800 0000000000000000
Mar 18 14:39:09 freak kernel: [ 289.675535] NIP [d000000005cc0ca0]
cxl_adapter_context_unlock+0x68/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [ 289.675540] LR [d000000005cc0c9c]
cxl_adapter_context_unlock+0x64/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [ 289.675541] Call Trace:
Mar 18 14:39:09 freak kernel: [ 289.675547] [c0000003bfc5f920]
[d000000005cc0c9c] cxl_adapter_context_unlock+0x64/0x90 [cxl] (unreliable)
Mar 18 14:39:09 freak kernel: [ 289.675556] [c0000003bfc5f980]
[d000000005cd022c] cxl_configure_adapter+0x954/0x990 [cxl]
Mar 18 14:39:09 freak kernel: [ 289.675563] [c0000003bfc5fa30]
[d000000005cd02c0] cxl_pci_slot_reset+0x58/0x240 [cxl]
Mar 18 14:39:09 freak kernel: [ 289.675568] [c0000003bfc5fae0]
[c00000000003b0d4] eeh_report_reset+0x154/0x190
Mar 18 14:39:09 freak kernel: [ 289.675571] [c0000003bfc5fb20]
[c000000000039428] eeh_pe_dev_traverse+0x98/0x170
Mar 18 14:39:09 freak kernel: [ 289.675574] [c0000003bfc5fbb0]
[c00000000003b81c] eeh_handle_normal_event+0x3ec/0x540
Mar 18 14:39:09 freak kernel: [ 289.675577] [c0000003bfc5fc60]
[c00000000003bbd4] eeh_handle_event+0x174/0x360
Mar 18 14:39:09 freak kernel: [ 289.675580] [c0000003bfc5fd10]
[c00000000003bfa8] eeh_event_handler+0x1e8/0x1f0
Mar 18 14:39:09 freak kernel: [ 289.675583] [c0000003bfc5fdc0]
[c000000000108dd4] kthread+0x154/0x1a0
Mar 18 14:39:09 freak kernel: [ 289.675586] [c0000003bfc5fe30]
[c00000000000b4e8] ret_from_kernel_thread+0x5c/0x74
Mar 18 14:39:09 freak kernel: [ 289.675588] Instruction dump:
Mar 18 14:39:09 freak kernel: [ 289.675590] 2f84ffff 4d9e0020 7c0802a6
f8010010 f821ffa1 39200000 7c8407b4 912303d0
Mar 18 14:39:09 freak kernel: [ 289.675596] 3d220000 e8698070 4801f159
e8410018 <0fe00000> 38210060 e8010010 7c0803a6
Mar 18 14:39:09 freak kernel: [ 289.675602] ---[ end trace 113989c345fee0d3
]---
Mar 18 14:39:09 freak kernel: [ 289.675642] cxl afu0.0: Activating AFU
directed mode
== Comment: #2 - Vaibhav Jain - 2017-03-20 05:00:20 ==
Have sent a fix patch to ppc-dev list for review
https://patchwork.ozlabs.org/patch/740876/
== Comment: #3 - Vaibhav Jain - 2017-05-16 01:56:32 ==
Patch merged to main line viz commit ea9a26d117cf0637c71d3e0076f4a124bf5859df
('cxl: Force context lock during EEH flow')
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1694485/+subscriptions
--
Mailing list: https://launchpad.net/~kernel-packages
Post to : [email protected]
Unsubscribe : https://launchpad.net/~kernel-packages
More help : https://help.launchpad.net/ListHelp