SRU request submitted:
https://lists.ubuntu.com/archives/kernel-team/2017-December/088684.html

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1694485

Title:
  Ubuntu17.04: CAPI: call trace seen while error injection to  the CAPI
  card.

Status in The Ubuntu-power-systems project:
  In Progress
Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Zesty:
  In Progress

Bug description:
  == Comment: #0 - SUDEESH JOHN  - 2017-03-18 13:55:03 ==
  ---Problem Description---
  call trace while injecting error to the CAPI card.

  " WARNING: CPU: 31 PID: 491 at 
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325 
cxl_adapter_context_unlock+0x68/0x90 [cxl] " 
    
  ---uname output---
  Linux freak 4.10.0-13-generic #15-Ubuntu SMP Thu Mar 9 20:27:28 UTC 2017 
ppc64le ppc64le ppc64le GNU/Linux
   
  Machine Type = PowerNV 8247-21L 
    
  ---Steps to Reproduce---
  1. echo 10000 > /sys/kernel/debug/powerpc/eeh_max_freezes
  2. echo 1 > /sys/class/cxl/card0/perst_reloads_same_image
  3.  echo 0x8000000000000000 > 
/sys/kernel/debug/powerpc/PCI0000/err_injct_outbound
   
  ---The complete call trace ---

  Mar 18 14:39:09 freak kernel: [  289.675421] ------------[ cut here 
]------------
  Mar 18 14:39:09 freak kernel: [  289.675431] WARNING: CPU: 5 PID: 491 at 
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325 
cxl_adapter_context_unlock+0x68/0x90 [cxl]
  Mar 18 14:39:09 freak kernel: [  289.675432] Modules linked in: xt_CHECKSUM 
iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 
nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT 
nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter 
ebtables ip6table_filter ip6_tables iptable_filter uio_pdrv_genirq uio 
ipmi_powernv ipmi_devintf ipmi_msghandler powernv_op_panel powernv_rng 
vmx_crypto ibmpowernv leds_powernv ib_iser rdma_cm iw_cm ib_cm ib_core configfs 
iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 
btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx 
xor raid6_pq raid1 raid0 multipath linear ses enclosure scsi_transport_sas 
bnx2x mlx5_core tg3 cxl mdio ipr libcrc32c devlink crc32c_vpmsum pnv_php
  Mar 18 14:39:09 freak kernel: [  289.675490] CPU: 5 PID: 491 Comm: eehd Not 
tainted 4.10.0-13-generic #15-Ubuntu
  Mar 18 14:39:09 freak kernel: [  289.675492] task: c0000003bfbfde00 
task.stack: c0000003bfc5c000
  Mar 18 14:39:09 freak kernel: [  289.675493] NIP: d000000005cc0ca0 LR: 
d000000005cc0c9c CTR: c000000000605aa0
  Mar 18 14:39:09 freak kernel: [  289.675495] REGS: c0000003bfc5f6a0 TRAP: 
0700   Not tainted  (4.10.0-13-generic)
  Mar 18 14:39:09 freak kernel: [  289.675496] MSR: 900000000282b033 
<SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>
  Mar 18 14:39:09 freak kernel: [  289.675504]   CR: 28008282  XER: 20000000
  Mar 18 14:39:09 freak kernel: [  289.675504] CFAR: c000000000b568dc SOFTE: 1
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR00: d000000005cc0c9c 
c0000003bfc5f920 d000000005cf2d88 000000000000002f
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR04: 0000000000000001 
00000000000003fd 0000000063206576 0000000000000000
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR08: c0000000015dc700 
0000000000000000 0000000000000000 0000000000000001
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR12: 0000000000008800 
c00000000fb82d00 c000000000108c88 c0000003c51f9f00
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR16: 0000000000000000 
0000000000000000 0000000000000000 0000000000000000
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR20: 0000000000000000 
0000000000000000 0000000000000000 c000000000d53990
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR24: c000000000d53968 
c0000000014a4330 c0000003ab8fa800 c0000003bd2c20c0
  Mar 18 14:39:09 freak kernel: [  289.675504] GPR28: c0000003c5051098 
0000000000000000 c0000003ab8fa800 0000000000000000
  Mar 18 14:39:09 freak kernel: [  289.675535] NIP [d000000005cc0ca0] 
cxl_adapter_context_unlock+0x68/0x90 [cxl]
  Mar 18 14:39:09 freak kernel: [  289.675540] LR [d000000005cc0c9c] 
cxl_adapter_context_unlock+0x64/0x90 [cxl]
  Mar 18 14:39:09 freak kernel: [  289.675541] Call Trace:
  Mar 18 14:39:09 freak kernel: [  289.675547] [c0000003bfc5f920] 
[d000000005cc0c9c] cxl_adapter_context_unlock+0x64/0x90 [cxl] (unreliable)
  Mar 18 14:39:09 freak kernel: [  289.675556] [c0000003bfc5f980] 
[d000000005cd022c] cxl_configure_adapter+0x954/0x990 [cxl]
  Mar 18 14:39:09 freak kernel: [  289.675563] [c0000003bfc5fa30] 
[d000000005cd02c0] cxl_pci_slot_reset+0x58/0x240 [cxl]
  Mar 18 14:39:09 freak kernel: [  289.675568] [c0000003bfc5fae0] 
[c00000000003b0d4] eeh_report_reset+0x154/0x190
  Mar 18 14:39:09 freak kernel: [  289.675571] [c0000003bfc5fb20] 
[c000000000039428] eeh_pe_dev_traverse+0x98/0x170
  Mar 18 14:39:09 freak kernel: [  289.675574] [c0000003bfc5fbb0] 
[c00000000003b81c] eeh_handle_normal_event+0x3ec/0x540
  Mar 18 14:39:09 freak kernel: [  289.675577] [c0000003bfc5fc60] 
[c00000000003bbd4] eeh_handle_event+0x174/0x360
  Mar 18 14:39:09 freak kernel: [  289.675580] [c0000003bfc5fd10] 
[c00000000003bfa8] eeh_event_handler+0x1e8/0x1f0
  Mar 18 14:39:09 freak kernel: [  289.675583] [c0000003bfc5fdc0] 
[c000000000108dd4] kthread+0x154/0x1a0
  Mar 18 14:39:09 freak kernel: [  289.675586] [c0000003bfc5fe30] 
[c00000000000b4e8] ret_from_kernel_thread+0x5c/0x74
  Mar 18 14:39:09 freak kernel: [  289.675588] Instruction dump:
  Mar 18 14:39:09 freak kernel: [  289.675590] 2f84ffff 4d9e0020 7c0802a6 
f8010010 f821ffa1 39200000 7c8407b4 912303d0
  Mar 18 14:39:09 freak kernel: [  289.675596] 3d220000 e8698070 4801f159 
e8410018 <0fe00000> 38210060 e8010010 7c0803a6
  Mar 18 14:39:09 freak kernel: [  289.675602] ---[ end trace 113989c345fee0d3 
]---
  Mar 18 14:39:09 freak kernel: [  289.675642] cxl afu0.0: Activating AFU 
directed mode

  == Comment: #2 - Vaibhav Jain - 2017-03-20 05:00:20 ==
  Have sent a fix patch to ppc-dev list for review 
https://patchwork.ozlabs.org/patch/740876/

  == Comment: #3 - Vaibhav Jain - 2017-05-16 01:56:32 ==
  Patch merged to main line viz commit ea9a26d117cf0637c71d3e0076f4a124bf5859df 
('cxl: Force context lock during EEH flow')

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1694485/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to