Public bug reported:

== Comment: #0 - SUDEESH JOHN  - 2017-03-18 13:55:03 ==
---Problem Description---
call trace while injecting error to the CAPI card.

" WARNING: CPU: 31 PID: 491 at 
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325 
cxl_adapter_context_unlock+0x68/0x90 [cxl] " 
  
---uname output---
Linux freak 4.10.0-13-generic #15-Ubuntu SMP Thu Mar 9 20:27:28 UTC 2017 
ppc64le ppc64le ppc64le GNU/Linux
 
Machine Type = PowerNV 8247-21L 
  
---Steps to Reproduce---
1. echo 10000 > /sys/kernel/debug/powerpc/eeh_max_freezes
2. echo 1 > /sys/class/cxl/card0/perst_reloads_same_image
3.  echo 0x8000000000000000 > 
/sys/kernel/debug/powerpc/PCI0000/err_injct_outbound
 
---The complete call trace ---

Mar 18 14:39:09 freak kernel: [  289.675421] ------------[ cut here 
]------------
Mar 18 14:39:09 freak kernel: [  289.675431] WARNING: CPU: 5 PID: 491 at 
/build/linux-VtwHOM/linux-4.10.0/drivers/misc/cxl/main.c:325 
cxl_adapter_context_unlock+0x68/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [  289.675432] Modules linked in: xt_CHECKSUM 
iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 
nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT 
nf_reject_ipv4 xt_tcpudp bridge stp llc kvm_hv kvm_pr kvm ebtable_filter 
ebtables ip6table_filter ip6_tables iptable_filter uio_pdrv_genirq uio 
ipmi_powernv ipmi_devintf ipmi_msghandler powernv_op_panel powernv_rng 
vmx_crypto ibmpowernv leds_powernv ib_iser rdma_cm iw_cm ib_cm ib_core configfs 
iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi ip_tables x_tables autofs4 
btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx 
xor raid6_pq raid1 raid0 multipath linear ses enclosure scsi_transport_sas 
bnx2x mlx5_core tg3 cxl mdio ipr libcrc32c devlink crc32c_vpmsum pnv_php
Mar 18 14:39:09 freak kernel: [  289.675490] CPU: 5 PID: 491 Comm: eehd Not 
tainted 4.10.0-13-generic #15-Ubuntu
Mar 18 14:39:09 freak kernel: [  289.675492] task: c0000003bfbfde00 task.stack: 
c0000003bfc5c000
Mar 18 14:39:09 freak kernel: [  289.675493] NIP: d000000005cc0ca0 LR: 
d000000005cc0c9c CTR: c000000000605aa0
Mar 18 14:39:09 freak kernel: [  289.675495] REGS: c0000003bfc5f6a0 TRAP: 0700  
 Not tainted  (4.10.0-13-generic)
Mar 18 14:39:09 freak kernel: [  289.675496] MSR: 900000000282b033 
<SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>
Mar 18 14:39:09 freak kernel: [  289.675504]   CR: 28008282  XER: 20000000
Mar 18 14:39:09 freak kernel: [  289.675504] CFAR: c000000000b568dc SOFTE: 1
Mar 18 14:39:09 freak kernel: [  289.675504] GPR00: d000000005cc0c9c 
c0000003bfc5f920 d000000005cf2d88 000000000000002f
Mar 18 14:39:09 freak kernel: [  289.675504] GPR04: 0000000000000001 
00000000000003fd 0000000063206576 0000000000000000
Mar 18 14:39:09 freak kernel: [  289.675504] GPR08: c0000000015dc700 
0000000000000000 0000000000000000 0000000000000001
Mar 18 14:39:09 freak kernel: [  289.675504] GPR12: 0000000000008800 
c00000000fb82d00 c000000000108c88 c0000003c51f9f00
Mar 18 14:39:09 freak kernel: [  289.675504] GPR16: 0000000000000000 
0000000000000000 0000000000000000 0000000000000000
Mar 18 14:39:09 freak kernel: [  289.675504] GPR20: 0000000000000000 
0000000000000000 0000000000000000 c000000000d53990
Mar 18 14:39:09 freak kernel: [  289.675504] GPR24: c000000000d53968 
c0000000014a4330 c0000003ab8fa800 c0000003bd2c20c0
Mar 18 14:39:09 freak kernel: [  289.675504] GPR28: c0000003c5051098 
0000000000000000 c0000003ab8fa800 0000000000000000
Mar 18 14:39:09 freak kernel: [  289.675535] NIP [d000000005cc0ca0] 
cxl_adapter_context_unlock+0x68/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [  289.675540] LR [d000000005cc0c9c] 
cxl_adapter_context_unlock+0x64/0x90 [cxl]
Mar 18 14:39:09 freak kernel: [  289.675541] Call Trace:
Mar 18 14:39:09 freak kernel: [  289.675547] [c0000003bfc5f920] 
[d000000005cc0c9c] cxl_adapter_context_unlock+0x64/0x90 [cxl] (unreliable)
Mar 18 14:39:09 freak kernel: [  289.675556] [c0000003bfc5f980] 
[d000000005cd022c] cxl_configure_adapter+0x954/0x990 [cxl]
Mar 18 14:39:09 freak kernel: [  289.675563] [c0000003bfc5fa30] 
[d000000005cd02c0] cxl_pci_slot_reset+0x58/0x240 [cxl]
Mar 18 14:39:09 freak kernel: [  289.675568] [c0000003bfc5fae0] 
[c00000000003b0d4] eeh_report_reset+0x154/0x190
Mar 18 14:39:09 freak kernel: [  289.675571] [c0000003bfc5fb20] 
[c000000000039428] eeh_pe_dev_traverse+0x98/0x170
Mar 18 14:39:09 freak kernel: [  289.675574] [c0000003bfc5fbb0] 
[c00000000003b81c] eeh_handle_normal_event+0x3ec/0x540
Mar 18 14:39:09 freak kernel: [  289.675577] [c0000003bfc5fc60] 
[c00000000003bbd4] eeh_handle_event+0x174/0x360
Mar 18 14:39:09 freak kernel: [  289.675580] [c0000003bfc5fd10] 
[c00000000003bfa8] eeh_event_handler+0x1e8/0x1f0
Mar 18 14:39:09 freak kernel: [  289.675583] [c0000003bfc5fdc0] 
[c000000000108dd4] kthread+0x154/0x1a0
Mar 18 14:39:09 freak kernel: [  289.675586] [c0000003bfc5fe30] 
[c00000000000b4e8] ret_from_kernel_thread+0x5c/0x74
Mar 18 14:39:09 freak kernel: [  289.675588] Instruction dump:
Mar 18 14:39:09 freak kernel: [  289.675590] 2f84ffff 4d9e0020 7c0802a6 
f8010010 f821ffa1 39200000 7c8407b4 912303d0
Mar 18 14:39:09 freak kernel: [  289.675596] 3d220000 e8698070 4801f159 
e8410018 <0fe00000> 38210060 e8010010 7c0803a6
Mar 18 14:39:09 freak kernel: [  289.675602] ---[ end trace 113989c345fee0d3 
]---
Mar 18 14:39:09 freak kernel: [  289.675642] cxl afu0.0: Activating AFU 
directed mode

== Comment: #2 - Vaibhav Jain - 2017-03-20 05:00:20 ==
Have sent a fix patch to ppc-dev list for review 
https://patchwork.ozlabs.org/patch/740876/

== Comment: #3 - Vaibhav Jain - 2017-05-16 01:56:32 ==
Patch merged to main line viz commit ea9a26d117cf0637c71d3e0076f4a124bf5859df 
('cxl: Force context lock during EEH flow')

** Affects: linux (Ubuntu)
     Importance: Medium
     Assignee: Ubuntu on IBM Power Systems Bug Triage (ubuntu-power-triage)
         Status: New


** Tags: architecture-ppc64le bugnameltc-152708 kernel-da-key severity-low 
targetmilestone-inin1704

** Tags added: architecture-ppc64le bugnameltc-152708 severity-low
targetmilestone-inin---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1694485

Title:
  Ubuntu17.04: CAPI: call trace seen while error injection to  the CAPI
  card.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1694485/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to