gianfar driver crash on P1020

Avi Tsarfati Avi.Tsarfati at alvarion.com
Sun Oct 14 23:10:24 EST 2012


Hi, 

The patch you sent me will prevent TX timeouts that will trigger gianfar
stop(gfar_stop is causing the soft lockup) & start by network watchdog
and will solve my first problem.

But, I have this problem again while running some traffic (ping -s 1500
to and from my device) and configuring MTU or set eth interface down. In
both cases gfar_stop sometimes cause soft lockup of 2 minutes.

Trace in case of MTU set: 

 BR_1: port 1(eth0) entering forwarding state

PHY: mdio at ffe24000:01 - Link is Down

PHY: mdio at ffe24000:01 - Link is Up - 100/Half

PHY: mdio at ffe24000:01 - Link is Down

PHY: mdio at ffe24000:01 - Link is Up - 10/Half

PHY: mdio at ffe24000:01 - Link is Down

BR_1: port 1(eth0) entering disabled state

PHY: mdio at ffe24000:01 - Link is Up - 1000/Full

BR_1: port 1(eth0) entering forwarding state

BUG: soft lockup - CPU#0 stuck for 120s! [wavman:2348]

Modules linked in: xt_physdev xt_state xt_tcpudp ebt_mark ebt_mark_m
ebt_limit ebtable_nat ebtable_broute ebtable_filter ebtables
iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_conntrack umac online_acs(P) dih(P) netlink_support(P) dfs_addon(P)
waran(P) ath_dev(P) ath_rate_atheros(P) addons_shared(P) ath_hal(P) adf
asf(P) iptable_filter ip_tables x_tables

NIP: c00513b8 LR: c00530b4 CTR: c005304c

REGS: c6009880 TRAP: 0901   Tainted: P            (2.6.31)

MSR: 00029000 <EE,ME,CE>  CR: 22028228  XER: 00000000

TASK = cd47aa30[2348] 'wavman' THREAD: c6008000

GPR00: 00000080 c6009930 cd47aa30 00000010 ca690a00 c6009b34 c6009ad8
d1880000 

GPR08: 11b6598e 00000000 00000000 c0385f14 00000000 

NIP [c00513b8] handle_IRQ_event+0x28/0x13c

LR [c00530b4] handle_fasteoi_irq+0x68/0xf0

Call Trace:

[c6009930] [00000004] 0x4 (unreliable)

[c6009950] [c00530b4] handle_fasteoi_irq+0x68/0xf0

[c6009960] [c0004f04] do_IRQ+0x98/0xb4

[c6009980] [c000fe58] ret_from_except+0x0/0x18

[c6009a40] [c0187ae0] stop_gfar+0x20/0x11c

[c6009a60] [c0189360] gfar_change_mtu+0x124/0x164

[c6009a80] [c01d5c30] dev_set_mtu+0x70/0xa4

[c6009a90] [c01e112c] do_setlink+0x1dc/0x348

[c6009ad0] [c01e2a9c] rtnl_newlink+0x330/0x460

[c6009bd0] [c01e2288] rtnetlink_rcv_msg+0x228/0x260

[c6009bf0] [c01ee0e8] netlink_rcv_skb+0x110/0x120

[c6009c10] [c01e204c] rtnetlink_rcv+0x28/0x3c

[c6009c30] [c01edd78] netlink_unicast+0x2c4/0x334

[c6009c70] [c01ee7ec] netlink_sendmsg+0x1c8/0x280

[c6009cc0] [c01c4c74] sock_sendmsg+0xac/0xe4

[c6009db0] [c01c4e80] sys_sendmsg+0x1d4/0x284

[c6009f00] [c01c58d4] sys_socketcall+0xe0/0x1f8

[c6009f40] [c000f804] ret_from_syscall+0x0/0x3c

Instruction dump:

801f0024 4bfffe3c 9421ffe0 7c0802a6 bf61000c 7c9f2378 90010024 7c7e1b78 

80040004 70090020 40820008 7c008146 <3d20c02e> 3ba00000 3b69e138
3b800000 

 

Trace in case of set eth down: 

PHY: mdio at ffe24000:01 - Link is Up - 1000/Full

BR_1: port 1(eth0) entering forwarding state

BR_1: port 1(eth0) entering disabled state

BR_1: port 1(eth0) entering forwarding state

PHY: mdio at ffe24000:01 - Link is Up - 100/Full

BUG: soft lockup - CPU#0 stuck for 120s! [ip:8428]

Modules linked in: xt_physdev xt_state xt_tcpudp ebt_mark ebt_mark_m
ebt_limit ebtable_nat ebtable_broute ebtable_filter ebtables
iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_conntrack rpldev umac online_acs(P) dih(P) netlink_support(P)
dfs_addon(P) waran(P) ath_dev(P) ath_rate_atheros(P) addons_shared(P)
ath_hal(P) adf asf(P) iptable_filter ip_tables x_tables

NIP: c00513b8 LR: c00530b4 CTR: c005304c

REGS: ca663bc0 TRAP: 0901   Tainted: P            (2.6.31)

MSR: 00029000 <EE,ME,CE>  CR: 22020428  XER: 00000000

TASK = c55c7390[8428] 'ip' THREAD: ca662000

GPR00: 00000080 ca663c70 c55c7390 00000010 c627cb00 c0364ae8 00000008
d1880000 

GPR08: 4800f86b 00000000 00000000 c0385f14 00000000 

NIP [c00513b8] handle_IRQ_event+0x28/0x13c

LR [c00530b4] handle_fasteoi_irq+0x68/0xf0

Call Trace:

[ca663c70] [ca662000] 0xca662000 (unreliable)

[ca663c90] [c00530b4] handle_fasteoi_irq+0x68/0xf0

[ca663ca0] [c0004f04] do_IRQ+0x98/0xb4

[ca663cc0] [c000fe58] ret_from_except+0x0/0x18

[ca663d80] [c0187af8] stop_gfar+0x38/0x11c

[ca663da0] [c01882c0] gfar_close+0x30/0xa0

[ca663dc0] [c01d62ec] dev_close+0x8c/0xe0

[ca663dd0] [c01d5db8] dev_change_flags+0x154/0x1ac

[ca663df0] [c022277c] devinet_ioctl+0x648/0x824

[ca663e60] [c0223294] inet_ioctl+0xcc/0xf8

[ca663e70] [c01c3c08] sock_ioctl+0x10c/0x2d0

[ca663e90] [c008bc60] vfs_ioctl+0x34/0x8c

[ca663ea0] [c008be84] do_vfs_ioctl+0x88/0x724

[ca663f10] [c008c560] sys_ioctl+0x40/0x74

[ca663f40] [c000f804] ret_from_syscall+0x0/0x3c

Instruction dump:

801f0024 4bfffe3c 9421ffe0 7c0802a6 bf61000c 7c9f2378 90010024 7c7e1b78 

80040004 70090020 40820008 7c008146 <3d20c02e> 3ba00000 3b69e198
3b800000

 

A script (test_eth) that I run can reproduce it on my board.

 

Did you encounter such problem before ?

 

Thanks in advance, 

Avi  Tsarfati.

 

From: Claudiu Manoil [mailto:claudiu.manoil at freescale.com] 
Sent: Tuesday, October 09, 2012 6:37 PM
To: Avi Tsarfati
Cc: linuxppc-dev at lists.ozlabs.org
Subject: Re: gianfar driver crash on P1020

 

Hello,

Did you try this patch?
http://patchwork.ozlabs.org/patch/186315/

Claudiu

On 10/9/2012 3:22 PM, Avi Tsarfati wrote:

	Hi, 

	 

	I have the same problem as you do. 

	Have you found the CPU stuck reason (or fix) in P1020RDB board ?

	 

	Thanks,

	Avi Tsarfati.

	 

	
	
	
************************************************************************
************ 
	This footnote confirms that this email message has been scanned
by 
	PineApp Mail-SeCure for the presence of malicious code, vandals
& computer viruses(187). 
	
************************************************************************
************
	
	
	
	

	_______________________________________________
	Linuxppc-dev mailing list
	Linuxppc-dev at lists.ozlabs.org
	https://lists.ozlabs.org/listinfo/linuxppc-dev




************************************************************************
************ 
This footnote confirms that this email message has been scanned by 
PineApp Mail-SeCure for the presence of malicious code, vandals &
computer viruses(100). 
************************************************************************
************


************************************************************************
************ 
This footnote confirms that this email message has been scanned by 
PineApp Mail-SeCure for the presence of malicious code, vandals &
computer viruses(42). 
************************************************************************
************


************************************************************************************ 
This footnote confirms that this email message has been scanned by 
PineApp Mail-SeCure for the presence of malicious code, vandals & computer viruses(187). 
************************************************************************************


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/linuxppc-dev/attachments/20121014/2cc9857a/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test_eth
Type: application/octet-stream
Size: 361 bytes
Desc: test_eth
URL: <http://lists.ozlabs.org/pipermail/linuxppc-dev/attachments/20121014/2cc9857a/attachment-0001.obj>


More information about the Linuxppc-dev mailing list