POWER9: Additional power9 patches
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Tim Gardner | ||
Zesty |
Fix Released
|
Undecided
|
Tim Gardner |
Bug Description
Dear Canonical,
Currently Ubuntu is having some issues on a POWER9 machine, as:
[ 443.933079] ------------[ cut here ]------------
[ 443.933102] WARNING: CPU: 10 PID: 10243 at /build/
[ 443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_
[ 443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 4.10.0-9-generic #11-Ubuntu
[ 443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000
[ 443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 0000000000000003
[ 443.933217] REGS: c0000007adc63b00 TRAP: 0700 Not tainted (4.10.0-9-generic)
[ 443.933219] MSR: 9000000000029033 <SF,HV,
[ 443.933237] CR: 48248422 XER: 00000000
[ 443.933240] CFAR: c00000000005163c SOFTE: 1
[ 443.933307] NIP [c0000000000519d8] do_page_
[ 443.933312] LR [c0000000000515b4] do_page_
[ 443.933314] Call Trace:
[ 443.933320] [c0000007adc63d80] [c0000000000515b4] do_page_
[ 443.933328] [c0000007adc63e30] [c00000000000a4e8] handle_
[ 443.933332] Instruction dump:
[ 443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 3d42ffec 892ab491
[ 443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 7f86e378 7ec5b378
[ 443.933366] ---[ end trace 4798790ae3dab875 ]---
======
We would like to include the following patches to fix it:
* cee216a696b2004
* 288bc54949fc262
* 595cd8f256d24fa
* c137a2757b88658
* db08f2030a173fd
* 9a8b300f2f7812e
* power/mm: update pte_write and pte_wrprotect to handle savedwrite: http://
* powerpc/mm: Handle protnone ptes on fork: http://
Thanks
tags: | added: architecture-ppc64le bugnameltc-152432 severity-high targetmilestone-inin1604 |
Changed in ubuntu: | |
assignee: | nobody → Taco Screen team (taco-screen-team) |
affects: | ubuntu → linux (Ubuntu) |
Changed in linux (Ubuntu Zesty): | |
assignee: | Taco Screen team (taco-screen-team) → Tim Gardner (timg-tpi) |
status: | New → In Progress |
Changed in linux (Ubuntu Zesty): | |
status: | In Progress → Fix Committed |
Leann,
A fresh set of Power9 patches for the kernel.
On 03/09/2017 11:29 AM, Launchpad Bug Tracker wrote: linux-iMfvOW/ linux-4. 10.0/arch/ powerpc/ mm/fault. c:428 do_page_ fault+0x5d8/ 0x7d0 iscsi ip_tables x_tables autofs4 ses enclosure scsi_transport_sas btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ast i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops crc32c_vpmsum drm i40e aacraid EE,ME,IR, DR,RI,LE> fault+0x5d8/ 0x7d0 fault+0x1b4/ 0x7d0 fault+0x1b4/ 0x7d0 (unreliable) page_fault+ 0x10/0x30 017a5ecb5833660 93d90b1568 mm/autonuma: don't use
> bugproxy (bugproxy) has assigned this bug to you for Ubuntu:
>
> Dear Canonical,
>
> Currently Ubuntu is having some issues on a POWER9 machine, as:
>
>
> [ 443.933079] ------------[ cut here ]------------
> [ 443.933102] WARNING: CPU: 10 PID: 10243 at /build/
> [ 443.933105] Modules linked in: vmx_crypto ofpart cmdlinepart ipmi_powernv powernv_flash ipmi_devintf mtd uio_pdrv_genirq ipmi_msghandler ibmpowernv opal_prd uio ib_iser rdma_cm iw_cm ib_cm ib_core configfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_
> [ 443.933206] CPU: 10 PID: 10243 Comm: apt-get Not tainted 4.10.0-9-generic #11-Ubuntu
> [ 443.933211] task: c0000007adbc2c00 task.stack: c0000007adc60000
> [ 443.933214] NIP: c0000000000519d8 LR: c0000000000515b4 CTR: 0000000000000003
> [ 443.933217] REGS: c0000007adc63b00 TRAP: 0700 Not tainted (4.10.0-9-generic)
> [ 443.933219] MSR: 9000000000029033 <SF,HV,
> [ 443.933237] CR: 48248422 XER: 00000000
> [ 443.933240] CFAR: c00000000005163c SOFTE: 1
> GPR00: c0000000000515b4 c0000007adc63d80 c00000000142c400 c0000007ad0a3b60
> GPR04: 00003fff7b7bc92c 0000000000000000 00000007fc020000 0000000000000000
> GPR08: 0000000000000003 0000000000000001 c0000000012ec400 0000000000000000
> GPR12: 0000000000004000 c00000000fb85a00 0000000000000001 00003fff7d640ea8
> GPR16: 00003fffdc1b6e78 00003fffdc1b6e70 00003fffdc1b6e68 00003fffdc1b6e58
> GPR20: 00003fff7d640e00 ffffffffffffffc0 0000000000030001 0000000000000000
> GPR24: 0000000000000054 c0000007b21e0b68 c0000007ad0a3b60 c0000007b21e0b00
> GPR28: 00003fff7b7bc92c 0000000008000000 0000000000000000 c0000007adc63ea0
> [ 443.933307] NIP [c0000000000519d8] do_page_
> [ 443.933312] LR [c0000000000515b4] do_page_
> [ 443.933314] Call Trace:
> [ 443.933320] [c0000007adc63d80] [c0000000000515b4] do_page_
> [ 443.933328] [c0000007adc63e30] [c00000000000a4e8] handle_
> [ 443.933332] Instruction dump:
> [ 443.933337] 60000000 60420000 71280007 4182fe1c 77a90800 4182fc94 3d42ffec 892ab491
> [ 443.933351] 2f890000 409efc84 39200001 992ab491 <0fe00000> 4bfffc74 7f86e378 7ec5b378
> [ 443.933366] ---[ end trace 4798790ae3dab875 ]---
>
>
> ======
>
>
> We would like to include the following patches to fix it:
>
> * cee216a696b2004
> set_pte_at when updating protnone ptes...