From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 3xz8645ypyzDqjC for ; Fri, 22 Sep 2017 19:57:16 +1000 (AEST) Received: from pps.filterd (m0098409.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id v8M9uA5Y013987 for ; Fri, 22 Sep 2017 05:57:14 -0400 Received: from e33.co.us.ibm.com (e33.co.us.ibm.com [32.97.110.151]) by mx0a-001b2d01.pphosted.com with ESMTP id 2d4ywrsgfg-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Fri, 22 Sep 2017 05:57:14 -0400 Received: from localhost by e33.co.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 22 Sep 2017 03:57:13 -0600 Subject: Re: [linux-next][DLPAR CPU][Oops] Bad kernel stack pointer From: Abdul Haleem To: Michael Ellerman Cc: linuxppc-dev , linux-kernel , linux-next , Stephen Rothwell , Rob Herring , Paul Mackerras Date: Fri, 22 Sep 2017 15:27:04 +0530 In-Reply-To: <878th9lhpe.fsf@concordia.ellerman.id.au> References: <1505729319.6990.5.camel@abdul.in.ibm.com> <878th9lhpe.fsf@concordia.ellerman.id.au> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Message-Id: <1506074224.17232.8.camel@abdul.in.ibm.com> List-Id: Linux on PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , On Wed, 2017-09-20 at 21:42 +1000, Michael Ellerman wrote: > Abdul Haleem writes: > > > Hi, > > > > Dynamic CPU remove operation resulted in Kernel Panic on today's > > next-20170915 kernel. > > > > Machine Type: Power 7 PowerVM LPAR > > Kernel : 4.13.0-next-20170915 > > config : attached > > test: DLPAR CPU remove > > > > > > dmesg logs: > > ---------- > > cpu 37 (hwid 37) Ready to die... > > cpu 38 (hwid 38) Ready to die... > > cpu 39 (hwid 39) > > ******* RTAS CReady to die... > > ALL BUFFER CORRUPTION ******* > > Cool. Does that come from RTAS itself? I have never seen that happen > before. Not sure, the var logs does not have any messages captured. This is first time we hit this type of issue. > > Is this easily reproducible? I am unable to reproduce it again. I will keep an eye on our CI runs for few more runs. -- Regard's Abdul Haleem IBM Linux Technology Centre