arm64/thunderx: Unhandled context faults in ACPI mode

Bug #1736774 reported by dann frazier on 2017-12-06
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
dann frazier
dann frazier

Bug Description

Booting a Cavium ThunderX node in ACPI mode results in constant messages like this to the console:
  arm-smmu Unhandled context fault: fsr=0x80000402, iova=0x0fffc000, fsynr=0x10081, cb=1

In some configurations, this causes the SATA controller to fail to initialize, making the system unbootable. (Note to self: this occurs on our internal system known as "alekhin").

[Test Case]
Boot a Cavium ThunderX node w/ the kernel parameter "acpi=on" and watch the console.

[Regression Risk]
The fixes are restricted to quirks for Cavium ThunderX hardware, which is hardware we've tested directly.

dann frazier (dannf) on 2017-12-06
Changed in linux (Ubuntu):
status: New → Confirmed
assignee: nobody → dann frazier (dannf)
dann frazier (dannf) on 2017-12-06
description: updated
dann frazier (dannf) on 2017-12-06
Changed in linux (Ubuntu):
status: Confirmed → In Progress
Changed in linux (Ubuntu Artful):
status: New → In Progress
assignee: nobody → dann frazier (dannf)
summary: - arm64/thunderx: Unhandled context fault spew in ACPI mode
+ arm64/thunderx: Unhandled context faults in ACPI mode
dann frazier (dannf) on 2017-12-06
description: updated
description: updated
Seth Forshee (sforshee) on 2017-12-13
Changed in linux (Ubuntu):
status: In Progress → Fix Committed
Stefan Bader (smb) on 2018-01-24
Changed in linux (Ubuntu Zesty):
status: New → Won't Fix
Changed in linux (Ubuntu Artful):
status: In Progress → Fix Committed

This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification-needed-artful' to 'verification-done-artful'. If the problem still exists, change the tag 'verification-needed-artful' to 'verification-failed-artful'.

If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.

See for documentation how to enable and use -proposed. Thank you!

tags: added: verification-needed-artful
dann frazier (dannf) wrote :

Marking failed due to LP: #1749040

tags: added: verification-failed-artful
removed: verification-needed-artful


We have reverted some arm64 patches that were causing boot issues so the system should be able to boot now. Could you please verify the fix for this bug again with the latest Artful kernel on -proposed?

Thank you.

dann frazier (dannf) wrote :


ubuntu@dawes:~$ dmesg | grep Machine
[ 0.000000] Machine model: Cavium ThunderX CN88XX board
ubuntu@dawes:~$ cat /proc/version
Linux version 4.13.0-36-generic (buildd@bos02-arm64-021) (gcc version 5.4.0 20160609 (Ubuntu/Linaro 5.4.0-6ubuntu1~16.04.9)) #40~16.04.1-Ubuntu SMP Fri Feb 16 23:26:28 UTC 2018
ubuntu@dawes:~$ cat /proc/cmdline
BOOT_IMAGE=/boot/vmlinuz-4.13.0-36-generic root=UUID=9c5dc96d-4531-4b51-aa28-cc97a30b1274 ro acpi=on

tags: added: verification-done-artful
removed: verification-failed-artful
Launchpad Janitor (janitor) wrote :
Download full text (20.1 KiB)

This bug was fixed in the package linux - 4.13.0-36.40

linux (4.13.0-36.40) artful; urgency=medium

  * linux: 4.13.0-36.40 -proposed tracker (LP: #1750010)

  * Rebuild without "CVE-2017-5754 ARM64 KPTI fixes" patch set

linux (4.13.0-35.39) artful; urgency=medium

  * linux: 4.13.0-35.39 -proposed tracker (LP: #1748743)

  * CVE-2017-5715 (Spectre v2 Intel)
    - Revert "UBUNTU: SAUCE: turn off IBPB when full retpoline is present"
    - SAUCE: turn off IBRS when full retpoline is present
    - [Packaging] retpoline files must be sorted
    - [Packaging] pull in retpoline files

linux (4.13.0-34.37) artful; urgency=medium

  * linux: 4.13.0-34.37 -proposed tracker (LP: #1748475)

  * libata: apply MAX_SEC_1024 to all LITEON EP1 series devices (LP: #1743053)
    - libata: apply MAX_SEC_1024 to all LITEON EP1 series devices

  * KVM patches for s390x to provide facility bits 81 (ppa15) and 82 (bpb)
    (LP: #1747090)
    - KVM: s390: wire up bpb feature

  * artful 4.13 i386 kernels crash after memory hotplug remove (LP: #1747069)
    - Revert "mm, memory_hotplug: do not associate hotadded memory to zones until

  * CVE-2017-5715 (Spectre v2 Intel)
    - x86/feature: Enable the x86 feature to control Speculation
    - x86/feature: Report presence of IBPB and IBRS control
    - x86/enter: MACROS to set/clear IBRS and set IBPB
    - x86/enter: Use IBRS on syscall and interrupts
    - x86/idle: Disable IBRS entering idle and enable it on wakeup
    - x86/idle: Disable IBRS when offlining cpu and re-enable on wakeup
    - x86/mm: Set IBPB upon context switch
    - x86/mm: Only set IBPB when the new thread cannot ptrace current thread
    - x86/entry: Stuff RSB for entry to kernel for non-SMEP platform
    - x86/kvm: add MSR_IA32_SPEC_CTRL and MSR_IA32_PRED_CMD to kvm
    - x86/kvm: Set IBPB when switching VM
    - x86/kvm: Toggle IBRS on VM entry and exit
    - x86/spec_ctrl: Add sysctl knobs to enable/disable SPEC_CTRL feature
    - x86/spec_ctrl: Add lock to serialize changes to ibrs and ibpb control
    - x86/cpu/AMD: Add speculative control support for AMD
    - x86/microcode: Extend post microcode reload to support IBPB feature
    - KVM: SVM: Do not intercept new speculative control MSRs
    - x86/svm: Set IBRS value on VM entry and exit
    - x86/svm: Set IBPB when running a different VCPU
    - KVM: x86: Add speculative control CPUID support for guests
    - SAUCE: turn off IBPB when full retpoline is present

  * Artful 4.13 fixes for tun (LP: #1748846)
    - tun: call dev_get_valid_name() before register_netdevice()
    - tun: allow positive return values on dev_get_valid_name() call
    - tun/tap: sanitize TUNSETSNDBUF input

  * boot failure on AMD Raven + WestonXT (LP: #1742759)
    - SAUCE: drm/amdgpu: add atpx quirk handling (v2)

linux (4.13.0-33.36) artful; urgency=low

  * linux: 4.13.0-33.36 -proposed tracker (LP: #1746903)

  [ Stefan Bader ]
  * starting VMs causing retpoline4 to reboot (LP: #1747507) // CVE-2017-5715
    (Spectre v2 retpoline)
    - x86/retpoline: Fill RSB on context switch for affected CPUs
    - x86/retpoline: Add LFENCE to the retpoline/RSB filling RSB macros
    - x86/retpol...

Changed in linux (Ubuntu Artful):
status: Fix Committed → Fix Released
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Other bug subscribers