------- Comment From sudeeshj...@in.ibm.com 2017-12-01 02:01 EDT------- The trace reported is no more seen ; But I see some other trace in dmesg;
root@ltc84-pkvm1:~# echo 10000 > /sys/kernel/debug/powerpc/eeh_max_freezes root@ltc84-pkvm1:~# echo 1 > /sys/class/cxl/card0/perst_reloads_same_image root@ltc84-pkvm1:~# root@ltc84-pkvm1:~# root@ltc84-pkvm1:~# lspci | grep acc 0001:01:00.0 Processing accelerators: IBM Device 0477 (rev 01) 0002:00:00.0 Processing accelerators: IBM Device 4350 (rev 0a) root@ltc84-pkvm1:~# echo 0x8000000000000000 > /sys/kernel/debug/powerpc/PCI0001/err_injct_outbound root@ltc84-pkvm1:~# root@ltc84-pkvm1:~# uname -a Linux ltc84-pkvm1 4.10.0-40-generic #44-Ubuntu SMP Thu Nov 9 14:48:23 UTC 2017 ppc64le ppc64le ppc64le GNU/Linux root@ltc84-pkvm1:~# root@ltc84-pkvm1:~# dmesg <snip> [ 123.426172] ip6_tables: (C) 2000-2006 Netfilter Core Team [ 123.573736] Ebtables v2.0 registered [ 123.964678] virbr0: port 1(virbr0-nic) entered blocking state [ 123.964682] virbr0: port 1(virbr0-nic) entered disabled state [ 123.964870] device virbr0-nic entered promiscuous mode [ 124.298173] virbr0: port 1(virbr0-nic) entered blocking state [ 124.298176] virbr0: port 1(virbr0-nic) entered listening state [ 124.372069] virbr0: port 1(virbr0-nic) entered disabled state [ 171.671205] Harmless Hypervisor Maintenance interrupt [Recovered] [ 171.671211] Error detail: Unknown [ 171.671214] HMER: 8040000000000000 [ 171.671218] Harmless Hypervisor Maintenance interrupt [Recovered] [ 171.671220] Error detail: Unknown [ 171.671223] HMER: 8040000000000000 [ 171.671382] EEH: Fenced PHB#1 detected, location: N/A [ 171.672512] EEH: This PCI device has failed 1 times in the last hour [ 171.672513] EEH: Notify device drivers to shutdown [ 171.672522] cxl afu0.0: Deactivating AFU directed mode [ 171.672660] cxl afu0.0: PSL Purge called with link down, ignoring [ 171.673304] EEH: Collect temporary log [ 171.673306] PHB3 PHB#1 Diag-data (Version: 1) [ 171.673307] brdgCtl: 0000ffff [ 171.673309] UtlSts: 00200000 00000000 00000000 [ 171.673311] RootSts: ffffffff ffffffff ffffffff ffffffff 0000ffff [ 171.673312] RootErrSts: ffffffff ffffffff ffffffff [ 171.673313] RootErrLog: ffffffff ffffffff ffffffff ffffffff [ 171.673314] RootErrLog1: ffffffff 0000000000000000 0000000000000000 [ 171.673316] nFir: 0000809000000000 0030006e00000000 0000800000000000 [ 171.673317] PhbSts: 0000001800000000 0000001800000000 [ 171.673318] Lem: 8000020000800000 40018e2400022482 8000000000000000 [ 171.673320] OutErr: 8000002000000000 8000000000000000 1210026000020003 0000400000000000 [ 171.673321] InBErr: 0000000040000000 0000000040000000 0000080000000000 000c104010010000 [ 171.673323] EEH: Reset without hotplug activity [ 176.174078] EEH: Notify device drivers the completion of reset [ 176.174089] cxl-pci 0001:01:00.0: enabling device (0140 -> 0142) [ 176.174404] pci 0001:01 : [PE# 00] Switching PHB to CXL [ 176.174505] pci 0001:01 : [PE# 00] Switching PHB to CXL [ 176.186032] Adapter context unlocked with 0 active contexts [ 176.186109] ------------[ cut here ]------------ [ 176.186120] WARNING: CPU: 10 PID: 971 at /build/linux-W3h2EL/linux-4.10.0/drivers/misc/cxl/main.c:317 cxl_adapter_context_unlock+0x68/0x90 [cxl] [ 176.186121] Modules linked in: xt_conntrack ipt_REJECT nf_reject_ipv4 ebtable_filter ebtables ip6table_filter ip6_tables xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack xt_tcpudp bridge stp llc iptable_filter kvm_hv kvm joydev input_leds mac_hid at24 nvmem_core ofpart ipmi_powernv ipmi_devintf ipmi_msghandler cmdlinepart powernv_flash uio_pdrv_genirq uio mtd powernv_rng vmx_crypto opal_prd ibmpowernv nfsd auth_rpcgss nfs_acl lockd grace ib_iser rdma_cm iw_cm ib_cm sunrpc ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic [ 176.186175] usbhid hid uas usb_storage nouveau crc32c_vpmsum i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops tg3 cxl drm ahci libahci pnv_php [ 176.186191] CPU: 10 PID: 971 Comm: eehd Not tainted 4.10.0-40-generic #44-Ubuntu [ 176.186193] task: c0000027d32c5800 task.stack: c0000027d3348000 [ 176.186194] NIP: d000000038db0c50 LR: d000000038db0c4c CTR: c0000000006119a0 [ 176.186196] REGS: c0000027d334b6a0 TRAP: 0700 Not tainted (4.10.0-40-generic) [ 176.186197] MSR: 900000000282b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> [ 176.186205] CR: 28008282 XER: 20000000 [ 176.186206] CFAR: c000000000b60b34 SOFTE: 1 GPR00: d000000038db0c4c c0000027d334b920 d000000038de5c40 000000000000002f GPR04: 0000000000000001 0000000000000464 0000000063206576 c0000000015fc900 GPR08: 0000000000000000 0000000000000000 0000000000000000 0000000000000001 GPR12: 0000000000008800 c00000000fb85a00 c0000000001103b8 c0000063b13d2000 GPR16: 0000000000000000 0000000000000000 0000000000000000 0000000000000000 GPR20: 0000000000000000 0000000000000000 0000000000000000 c000000000d64d78 GPR24: c000000000d64d50 c0000000014c4330 c0000063aecebc00 c0000063a74fdfc0 GPR28: c0000063b1347098 0000000000000000 c0000063aecebc00 0000000000000006 [ 176.186237] NIP [d000000038db0c50] cxl_adapter_context_unlock+0x68/0x90 [cxl] [ 176.186243] LR [d000000038db0c4c] cxl_adapter_context_unlock+0x64/0x90 [cxl] [ 176.186244] Call Trace: [ 176.186251] [c0000027d334b920] [d000000038db0c4c] cxl_adapter_context_unlock+0x64/0x90 [cxl] (unreliable) [ 176.186260] [c0000027d334b980] [d000000038dc1634] cxl_configure_adapter+0xa6c/0xab0 [cxl] [ 176.186268] [c0000027d334ba30] [d000000038dc16d0] cxl_pci_slot_reset+0x58/0x250 [cxl] [ 176.186272] [c0000027d334bae0] [c00000000003bb14] eeh_report_reset+0x154/0x190 [ 176.186276] [c0000027d334bb20] [c000000000039e68] eeh_pe_dev_traverse+0x98/0x170 [ 176.186279] [c0000027d334bbb0] [c00000000003c25c] eeh_handle_normal_event+0x3ec/0x540 [ 176.186281] [c0000027d334bc60] [c00000000003c614] eeh_handle_event+0x174/0x350 [ 176.186284] [c0000027d334bd10] [c00000000003c9d8] eeh_event_handler+0x1e8/0x1f0 [ 176.186287] [c0000027d334bdc0] [c000000000110514] kthread+0x164/0x1b0 [ 176.186291] [c0000027d334be30] [c00000000000b4e8] ret_from_kernel_thread+0x5c/0x74 [ 176.186292] Instruction dump: [ 176.186294] 2f84ffff 4d9e0020 7c0802a6 f8010010 f821ffa1 39200000 7c8407b4 912303d0 [ 176.186300] 3c620000 e8638070 48021941 e8410018 <0fe00000> 38210060 e8010010 7c0803a6 [ 176.186307] ---[ end trace 8780457e503acb38 ]--- [ 176.186350] cxl afu0.0: Activating AFU directed mode [ 176.186481] EEH: Notify device driver to resume root@ltc84-pkvm1:~# -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1694485 Title: Ubuntu17.04: CAPI: call trace seen while error injection to the CAPI card. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-power-systems/+bug/1694485/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs