kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #76334
[Bug 1354242] Re: mellanox driver crash fix in leagcy EQ mode
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.
See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!
** Tags added: verification-needed-trusty
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1354242
Title:
mellanox driver crash fix in leagcy EQ mode
Status in “linux” package in Ubuntu:
Fix Released
Status in “linux” source package in Trusty:
Fix Committed
Bug description:
1, reproduction steps:
- ethtool eth0 rx 128
- iperf -s
- in iperf client side, run below:
iperf -c IP_SRV -P128 -t 120
- then mellanox driver crash:
------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at net/sched/sch_generic.c:264 dev_watchdog+0x2a8/0x2b4()
NETDEV WATCHDOG: eth0 (mlx4_core): transmit queue 4 timed out
Modules linked in:
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.13.11.4-mustang_sw_1.12.10-beta+ #30
Call trace:
[<ffffffc0000882f0>] dump_backtrace+0x0/0x12c
[<ffffffc00008842c>] show_stack+0x10/0x1c
[<ffffffc0006bfd6c>] dump_stack+0x74/0x94
[<ffffffc0000956b8>] warn_slowpath_common+0x84/0xac
[<ffffffc00009572c>] warn_slowpath_fmt+0x4c/0x58
[<ffffffc0005c1dd4>] dev_watchdog+0x2a4/0x2b4
[<ffffffc0000a08f0>] call_timer_fn.isra.33+0x24/0x80
[<ffffffc0000a0ad0>] run_timer_softirq+0x184/0x1f4
[<ffffffc000099c5c>] __do_softirq+0x198/0x208
[<ffffffc000099fc0>] irq_exit+0x8c/0xc0
[<ffffffc0000850ac>] handle_IRQ+0x5c/0xc8
[<ffffffc00008128c>] gic_handle_irq+0x38/0x7c
Exception stack(0xffffffc0009cbdf0 to 0xffffffc0009cbf10)
bde0: 009c8000 ffffffc0 00a31300 ffffffc0
be00: 009cbf30 ffffffc0 000855e0 ffffffc0 0037356e 00000000 00000000 00000000
be20: fff87954 ffffffc7 00010000 00000000 a455f900 ffffffc7 00000000 00000000
be40: 00a35000 ffffffc0 005e1080 ffffffc0 009d4c90 ffffffc0 009cbd40 ffffffc0
be60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
be80: 00000000 00000000 aadd05a0 0000007f 0058f434 ffffffc0 aade3c80 0000007f
bea0: aabe8660 0000007f 009c8000 ffffffc0 00a31300 ffffffc0 00a278d8 ffffffc0
bec0: 009c8000 ffffffc0 00a27022 ffffffc0 00000001 00000000 008cbd20 ffffffc0
bee0: 006c9d70 ffffffc0 00080408 ffffffc0 00080200 00000040 009cbf30 ffffffc0
bf00: 000855dc ffffffc0 009cbf30 ffffffc0
[<ffffffc0000845a8>] el1_irq+0x68/0xc0
[<ffffffc0000d1cbc>] cpu_startup_entry+0x100/0x14c
[<ffffffc0006bb07c>] rest_init+0x6c/0x78
[<ffffffc0009937d4>] start_kernel+0x340/0x358
---[ end trace a66d2f499386c240 ]---
INFO: rcu_sched detected stalls on CPUs/tasks: { 4 5} (detected by 7, t=6002 jiffies, g=1924, c=1923, q=1316)
Task dump for CPU 4:
irqbalance R running task 0 999 1 0x00000000
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
[<ffffffc000091dac>] do_page_fault+0x224/0x378
[<ffffffc000081100>] do_mem_abort+0x38/0x9c
Exception stack(0xffffffc7c3ecbe30 to 0xffffffc7c3ecbf50)
be20: c3ecbe80 ffffffc7 00163f4c ffffffc0
be40: c69e2f00 ffffffc7 a133f000 0000007f 00000000 00000000 a147db7c 0000007f
be60: 60000000 00000000 00000015 00000000 ffffffff ffffffff a148625c 0000007f
be80: fb6e3b70 0000007f 000849ec ffffffc0 00000008 00000000 a133f000 0000007f
bea0: ffffffff ffffffff 3b215828 00000000 53e18915 00000000 00000008 00000000
bec0: fb6e3ae0 0000007f 00000000 00000000 00000003 00000000 a133f000 0000007f
bee0: 00000008 00000000 00000000 00000000 00000000 00000000 00000000 00000000
bf00: 00000000 00000000 2f2f2f2f 302f2f2f 00000040 00000000 2e312dff 5e6f6c72
bf20: 7f7f7f7f 7f7f7f7f 01010101 01010101 00000000 00000000 00000000 00000000
bf40: 00000020 00000000 a15075a0 0000007f
Task dump for CPU 5:
swapper/5 R running task 0 0 1 0x00010002
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
INFO: rcu_sched detected stalls on CPUs/tasks: { 4 5} (detected by 7, t=24007 jiffies, g=1924, c=1923, q=1404)
Task dump for CPU 4:
irqbalance R running task 0 999 1 0x00000000
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
[<ffffffc000091dac>] do_page_fault+0x224/0x378
[<ffffffc000081100>] do_mem_abort+0x38/0x9c
Exception stack(0xffffffc7c3ecbe30 to 0xffffffc7c3ecbf50)
be20: c3ecbe80 ffffffc7 00163f4c ffffffc0
be40: c69e2f00 ffffffc7 a133f000 0000007f 00000000 00000000 a147db7c 0000007f
be60: 60000000 00000000 00000015 00000000 ffffffff ffffffff a148625c 0000007f
be80: fb6e3b70 0000007f 000849ec ffffffc0 00000008 00000000 a133f000 0000007f
bea0: ffffffff ffffffff 3b215828 00000000 53e18915 00000000 00000008 00000000
bec0: fb6e3ae0 0000007f 00000000 00000000 00000003 00000000 a133f000 0000007f
bee0: 00000008 00000000 00000000 00000000 00000000 00000000 00000000 00000000
bf00: 00000000 00000000 2f2f2f2f 302f2f2f 00000040 00000000 2e312dff 5e6f6c72
bf20: 7f7f7f7f 7f7f7f7f 01010101 01010101 00000000 00000000 00000000 00000000
bf40: 00000020 00000000 a15075a0 0000007f
Task dump for CPU 5:
swapper/5 R running task 0 0 1 0x00010002
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
INFO: rcu_sched detected stalls on CPUs/tasks: { 4 5} (detected by 7, t=42012 jiffies, g=1924, c=1923, q=1553)
Task dump for CPU 4:
irqbalance R running task 0 999 1 0x00000002
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
[<ffffffc000091dac>] do_page_fault+0x224/0x378
[<ffffffc000081100>] do_mem_abort+0x38/0x9c
Exception stack(0xffffffc7c3ecbe30 to 0xffffffc7c3ecbf50)
be20: c3ecbe80 ffffffc7 00163f4c ffffffc0
be40: c69e2f00 ffffffc7 a133f000 0000007f 00000000 00000000 a147db7c 0000007f
be60: 60000000 00000000 00000015 00000000 ffffffff ffffffff a148625c 0000007f
be80: fb6e3b70 0000007f 000849ec ffffffc0 00000008 00000000 a133f000 0000007f
bea0: ffffffff ffffffff 3b215828 00000000 53e18915 00000000 00000008 00000000
bec0: fb6e3ae0 0000007f 00000000 00000000 00000003 00000000 a133f000 0000007f
bee0: 00000008 00000000 00000000 00000000 00000000 00000000 00000000 00000000
bf00: 00000000 00000000 2f2f2f2f 302f2f2f 00000040 00000000 2e312dff 5e6f6c72
bf20: 7f7f7f7f 7f7f7f7f 01010101 01010101 00000000 00000000 00000000 00000000
bf40: 00000020 00000000 a15075a0 0000007f
Task dump for CPU 5:
swapper/5 R running task 0 0 1 0x00010002
Call trace:
[<ffffffc0000859b8>] __switch_to+0x74/0x8c
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1354242/+subscriptions
References