Hey Frank, I understand all of these patches are upstreamed already on Linus' tree and most of the patches seem to be clean cherry picks (except 15b4dd7981496f51c5f9262a5e0761e48de6655f, which was backported).
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1767927 Title: ISST-LTE:pKVM:Ubuntu1804: rcu_sched self-detected stall on CPU follow by CPU ATTEMPT TO RE-ENTER FIRMWARE! Status in The Ubuntu-power-systems project: Triaged Status in linux package in Ubuntu: Triaged Status in linux source package in Bionic: Triaged Bug description: == Comment: #0 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-03-20 14:10:53 == == Comment: #1 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-03-20 14:10:54 == == Comment: #2 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-03-20 14:10:56 == ------- Comment From dougmill-ibm 2018-03-20 13:51:47 EDT ------- This problem is not tied to a Linux distro. It will be fixed in firmware, as I understand it. Let us close any redundant issues for this same problem. Mark them as duplicate. == Comment: #3 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-03-20 15:50:54 == ------- Comment From mzipse 2018-03-20 15:44:26 EDT ------- @stewart-ibm @svaidy , I need to you take a first look. The stop fixes that Vaidy had previously highlighted in a recent note are included in the 3/15 PNOR. == Comment: #5 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-04-04 16:10:56 == ------- Comment From haochanh 2018-04-04 16:04:07 EDT ------- We update to 0330, bmc=1.18, then we hit bug 1134. Currently we are running with disable stop5 but still see the watchdog: hard lockup. After 2 hours of test run, I am seeing the "Watchdog: Lockup' and "became unstuck" **************************** [Wed Apr 4 13:38:25 2018] Watchdog CPU:42 Hard LOCKUP [Wed Apr 4 13:38:25 2018] Modules linked in: vhost_net vhost macvtap macvlan tap xfs xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack libcrc32c ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter rpcsec_gss_krb5 nfsv4 nfs fscache rdma_ucm(OE) ib_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_uverbs(OE) ib_umad(OE) esp6_offload esp6 esp4_offload esp4 xfrm_algo mlx5_fpga_tools(OE) mlx5_ib(OE) mlx5_core(OE) mlxfw(OE) cxl pnv_php mlx4_en(OE) mlx4_ib(OE) ib_core(OE) mlx4_core(OE) devlink mlx_compat(OE) kvm_hv kvm binfmt_misc dm_service_time dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua input_leds joydev mac_hid idt_89hpesx ipmi_powernv [Wed Apr 4 13:38:25 2018] vmx_crypto ipmi_devintf at24 ofpart uio_pdrv_genirq cmdlinepart uio powernv_flash ipmi_msghandler mtd crct10dif_vpmsum opal_prd ibmpowernv nfsd sch_fq_codel auth_rpcgss nfs_acl lockd grace sunrpc knem(OE) ip_tables x_tables autofs4 btrfs xor zstd_compress raid6_pq ses enclosure scsi_transport_sas hid_generic usbhid hid lpfc ast i2c_algo_bit ttm drm_kms_helper nvmet_fc syscopyarea sysfillrect nvmet sysimgblt fb_sys_fops nvme_fc nvme_fabrics crc32c_vpmsum drm i40e scsi_transport_fc aacraid [last unloaded: mlxfw] [Wed Apr 4 13:38:25 2018] CPU: 42 PID: 0 Comm: swapper/42 Tainted: G OE 4.15.0-12-generic #13 [Wed Apr 4 13:38:25 2018] NIP: c0000000000a3ca4 LR: c0000000000a3ca4 CTR: c000000000008000 [Wed Apr 4 13:38:25 2018] REGS: c000000ff596fc40 TRAP: 0100 Tainted: G OE (4.15.0-12-generic) [Wed Apr 4 13:38:25 2018] MSR: 9000000000001033 <SF,HV,ME,IR,DR,RI,LE> CR: 24004482 XER: 20040000 [Wed Apr 4 13:38:25 2018] CFAR: c000000ff596fda0 SOFTE: 42 GPR00: c0000000000a3ca4 c000000ff596fda0 c0000000016eb200 c000000ff596fc40 GPR04: b000000000001033 c0000000000a3690 0000000024004484 0000000ffa450000 GPR08: 0000000000000001 c000000000d10ed8 00000000000000ff 0000000000000000 GPR12: 9000000000121033 c000000007a3ce00 c000000ff596ff90 0000000000000000 GPR16: 0000000000000000 c000000000047840 c000000000047810 c0000000011b5380 GPR20: 0000000000000800 c000000001722484 000000000000002a 0000000000000000 GPR24: 00000000000000a8 0000000000000007 0000000000000000 0000000000000007 GPR28: c00000000161d270 c000000ffb666fd8 c00000000161d528 0000000000000007 [Wed Apr 4 13:38:25 2018] NIP [c0000000000a3ca4] power9_idle_type+0x24/0x40 [Wed Apr 4 13:38:25 2018] LR [c0000000000a3ca4] power9_idle_type+0x24/0x40 [Wed Apr 4 13:38:25 2018] Call Trace: [Wed Apr 4 13:38:25 2018] [c000000ff596fda0] [c0000000000a3ca4] power9_idle_type+0x24/0x40 (unreliable) [Wed Apr 4 13:38:25 2018] [c000000ff596fdc0] [c000000000ad1240] stop_loop+0x40/0x5c [Wed Apr 4 13:38:25 2018] [c000000ff596fdf0] [c000000000acd9a4] cpuidle_enter_state+0xa4/0x450 [Wed Apr 4 13:38:25 2018] [c000000ff596fe50] [c00000000017195c] call_cpuidle+0x4c/0x90 [Wed Apr 4 13:38:25 2018] [c000000ff596fe70] [c000000000171d70] do_idle+0x2b0/0x330 [Wed Apr 4 13:38:25 2018] [c000000ff596fec0] [c000000000172028] cpu_startup_entry+0x38/0x50 [Wed Apr 4 13:38:25 2018] [c000000ff596fef0] [c000000000049c30] start_secondary+0x4f0/0x510 [Wed Apr 4 13:38:25 2018] [c000000ff596ff90] [c00000000000aa6c] start_secondary_prolog+0x10/0x14 [Wed Apr 4 13:38:25 2018] Instruction dump: [Wed Apr 4 13:38:25 2018] ebe1fff8 7c0803a6 4e800020 3c4c0164 38427580 7c0802a6 60000000 7c0802a6 [Wed Apr 4 13:38:25 2018] f8010010 f821ffe1 4bfff97d 4bf732d9 <60000000> 38210020 e8010010 7c0803a6 [Wed Apr 4 13:38:25 2018] Watchdog CPU:43 Hard LOCKUP [Wed Apr 4 13:38:25 2018] Modules linked in: vhost_net vhost macvtap macvlan tap xfs xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack libcrc32c ipt_REJECT nf_reject_ipv4 xt_tcpudp bridge stp llc ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter rpcsec_gss_krb5 nfsv4 nfs fscache rdma_ucm(OE) ib_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_uverbs(OE) ib_umad(OE) esp6_offload esp6 esp4_offload esp4 xfrm_algo mlx5_fpga_tools(OE) mlx5_ib(OE) mlx5_core(OE) mlxfw(OE) cxl pnv_php mlx4_en(OE) mlx4_ib(OE) ib_core(OE) mlx4_core(OE) devlink mlx_compat(OE) kvm_hv kvm binfmt_misc dm_service_time dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua input_leds joydev mac_hid idt_89hpesx ipmi_powernv [Wed Apr 4 13:38:25 2018] vmx_crypto ipmi_devintf at24 ofpart uio_pdrv_genirq cmdlinepart uio powernv_flash ipmi_msghandler mtd crct10dif_vpmsum opal_prd ibmpowernv nfsd sch_fq_codel auth_rpcgss nfs_acl lockd grace sunrpc knem(OE) ip_tables x_tables autofs4 btrfs xor zstd_compress raid6_pq ses enclosure scsi_transport_sas hid_generic usbhid hid lpfc ast i2c_algo_bit ttm drm_kms_helper nvmet_fc syscopyarea sysfillrect nvmet sysimgblt fb_sys_fops nvme_fc nvme_fabrics crc32c_vpmsum drm i40e scsi_transport_fc aacraid [last unloaded: mlxfw] [Wed Apr 4 13:38:25 2018] CPU: 43 PID: 0 Comm: swapper/43 Tainted: G OE 4.15.0-12-generic #13 [Wed Apr 4 13:38:25 2018] NIP: c0000000000a3ca4 LR: c0000000000a3ca4 CTR: c000000000008000 [Wed Apr 4 13:38:25 2018] REGS: c000000ff597fc40 TRAP: 0100 Tainted: G OE (4.15.0-12-generic) [Wed Apr 4 13:38:25 2018] MSR: 9000000000001033 <SF,HV,ME,IR,DR,RI,LE> CR: 24004482 XER: 00000000 [Wed Apr 4 13:38:25 2018] CFAR: c000000ff597fda0 SOFTE: 43 GPR00: c0000000000a3ca4 c000000ff597fda0 c0000000016eb200 c000000ff597fc40 GPR04: b000000000001033 c0000000000a3690 0000000024004484 ffffffffffffffbf GPR08: 000000000000007f c000000000d10ed8 00000000000000ff ffffffffffffffdf GPR12: 9000000000121033 c000000007a3d900 c000000ff597ff90 0000000000000000 GPR16: 0000000000000000 c000000000047840 c000000000047810 c0000000011b5380 GPR20: 0000000000000800 c000000001722484 000000000000002b 0000000000000000 GPR24: 00000000000000ac 0000000000000007 0000000000000000 0000000000000007 GPR28: c00000000161d270 c000000ffb6a6fd8 c00000000161d528 0000000000000007 [Wed Apr 4 13:38:25 2018] NIP [c0000000000a3ca4] power9_idle_type+0x24/0x40 [Wed Apr 4 13:38:25 2018] LR [c0000000000a3ca4] power9_idle_type+0x24/0x40 [Wed Apr 4 13:38:25 2018] Call Trace: [Wed Apr 4 13:38:25 2018] [c000000ff597fda0] [c0000000000a3ca4] power9_idle_type+0x24/0x40 (unreliable) [Wed Apr 4 13:38:25 2018] [c000000ff597fdc0] [c000000000ad1240] stop_loop+0x40/0x5c [Wed Apr 4 13:38:25 2018] [c000000ff597fdf0] [c000000000acd9a4] cpuidle_enter_state+0xa4/0x450 [Wed Apr 4 13:38:25 2018] [c000000ff597fe50] [c00000000017195c] call_cpuidle+0x4c/0x90 [Wed Apr 4 13:38:25 2018] [c000000ff597fe70] [c000000000171d70] do_idle+0x2b0/0x330 [Wed Apr 4 13:38:25 2018] [c000000ff597fec0] [c000000000172028] cpu_startup_entry+0x38/0x50 [Wed Apr 4 13:38:25 2018] [c000000ff597fef0] [c000000000049c30] start_secondary+0x4f0/0x510 [Wed Apr 4 13:38:25 2018] [c000000ff597ff90] [c00000000000aa6c] start_secondary_prolog+0x10/0x14 [Wed Apr 4 13:38:25 2018] Instruction dump: [Wed Apr 4 13:38:25 2018] ebe1fff8 7c0803a6 4e800020 3c4c0164 38427580 7c0802a6 60000000 7c0802a6 [Wed Apr 4 13:38:25 2018] f8010010 f821ffe1 4bfff97d 4bf732d9 <60000000> 38210020 e8010010 7c0803a6 [Wed Apr 4 13:38:27 2018] Watchdog CPU:42 became unstuck [Wed Apr 4 13:38:27 2018] Watchdog CPU:41 became unstuck [Wed Apr 4 13:38:27 2018] Watchdog CPU:43 became unstuck == Comment: #6 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-04-04 16:50:56 == ------- Comment From youhour 2018-04-04 16:44:55 EDT ------- pegas 1.1 seems to fix my problem above by @haochanh. Upgrade your OS and see if that will help. == Comment: #7 - Michael Neuling <michael.neul...@au1.ibm.com> - 2018-04-05 16:30:31 == So we've seen something similar on on other bugs (like https://github.com/open-power/boston-openpower/issues/1084#issuecomment-377122303) It's looks like we may have taken an RCU stall which causes an NMI interrupt to be sent to the stalled CPU. This then interrupts a CPU which is in OPAL, which the kernel doesn't do a good job of recovering from. There are two patches that can help: The first one removes the NMI on RCU stalls here https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id=47712a921bb781caf69fca9eae43be19968816cb The second improves the kernel handling of taking an NMI/sreset inside OPAL http://patchwork.ozlabs.org/patch/886688/ (not upstream). == Comment: #15 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-04-12 08:41:01 == ------- Comment From youhour 2018-04-12 08:32:21 EDT ------- @mikey Do we have commit for the fix yet? == Comment: #16 - Gustavo Luiz Ferreira Walbon <gwal...@br.ibm.com> - 2018-04-12 13:46:51 == All, There are three of four from the original patchset that were approved on the upstream. Missing the patch '[RFC,4/4] powerpc/xmon: Detect if OPAL was interrupted and mark unrecoverable' (https://patchwork.ozlabs.org/patch/886691/) [ATTENTION] The ubuntu kernel freeze is coming this week. [1/4] https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/arch?h=next&id=15b4dd7981496f51c5f9262a5e0761e48de6655f powerpc/64s: return more carefully from sreset NMI System Reset, being an NMI, must return more carefully than other interrupts. It has traditionally returned via the nromal return from exception path, but that has a number of problems. - r13 does not get restored if returning to kernel. This is for interrupts which may cause a context switch, which sreset will never do. Interrupting OPAL (which uses a different r13) is one place where this causes breakage. - It may cause several other problems returning to kernel with preempt or TIF_EMULATE_STACK_STORE if it hits at the wrong time. It's safer just to have a simple restore and return, like machine check which is the other NMI. [2/4] https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/arch?h=next&id=d40b6768e45bd9213139b2d91d30c7692b6007b1 powerpc/64s: sreset panic if there is no debugger or crash dump handlers system_reset_exception does most of its own crash handling now, invoking the debugger or crash dumps if they are registered. If not, then it goes through to die() to print stack traces, and then is supposed to panic (according to comments). However after die() prints oopses, it does its own handling which doesn't allow system_reset_exception to panic (e.g., it may just kill the current process). This patch causes sreset exceptions to return from die after it prints messages but before acting. This also stops die from invoking the debugger on 0x100 crashes. system_reset_exception similarly calls the debugger. It had been thought this was harmless (because if the debugger was disabled, neither call would fire, and if it was enabled the first call would return). However in some cases like xmon 'X' command, the debugger returns 0, which currently causes it to be entered again (first in system_reset_exception, then in die), which is confusing. [3/4] https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/arch?h=next&id=741de617661794246f84a21a02fc5e327bffc9ad powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() opal_nvram_write currently just assumes success if it encounters an error other than OPAL_BUSY or OPAL_BUSY_EVENT. Have it return -EIO on other errors instead. Fixes: 628daa8d5abf ("powerpc/powernv: Add RTC and NVRAM support plus RTAS fallbacks") == Comment: #17 - Application Cdeadmin <cdead...@us.ibm.com> - 2018-04-12 17:30:58 == ------- Comment From youhour 2018-04-12 17:30:25 EDT ------- Stewart mentioned that these patches need to be picked by the distros. @bwmashak Ben do you know who from the distros needs to be informed? == Comment: #18 - Michael Y. Lim <youh...@us.ibm.com> - 2018-04-13 10:12:40 == Gustavo, please let us know which kernel version has this patch. Thank you! == Comment: #19 - Gustavo Luiz Ferreira Walbon <gwal...@br.ibm.com> - 2018-04-13 14:22:06 == (In reply to comment #18) > Gustavo, please let us know which kernel version has this patch. Thank you! Hello Michael, So, There is no official distro with those patches, they are on upstream yet. I have generated a build with just asked patch set here which it's based on the ubuntu kernel v4.15.0-12.13. http://pokgsa.ibm.com/gsa/pokgsa/home/g/w/gwalbon/web/public/Bug165882/v2/ == Comment: #21 - Benjamin W. Mashak <mas...@us.ibm.com> - 2018-04-24 15:59:09 == Gustavo Luiz Ferreira Walbon, what's the outlook to upstream and close this BZ? Its currently on the must-fix list for upcoming GA in May. == Comment: #22 - Gustavo Luiz Ferreira Walbon <gwal...@br.ibm.com> - 2018-04-25 08:28:01 == (In reply to comment #21) > Gustavo Luiz Ferreira Walbon, what's the outlook to upstream and close this > BZ? Its currently on the must-fix list for upcoming GA in May. Benjamin, This missing patch was a RFC by Nicholas Piggin, as a RFC just the 3 of 4 patches was judged as relevant and they were added to powerpc tree. I hope this 3 patches were enough. == Comment: #24 - Gustavo Luiz Ferreira Walbon <gwal...@br.ibm.com> - 2018-04-25 08:34:35 == Adding a patch series to fix a CPU lockup in UbuntuKVM 18.04. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1767927/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp