gianfar driver crash on P1020
Avi Tsarfati
Avi.Tsarfati at alvarion.com
Sun Oct 14 23:10:24 EST 2012
Hi,
The patch you sent me will prevent TX timeouts that will trigger gianfar
stop(gfar_stop is causing the soft lockup) & start by network watchdog
and will solve my first problem.
But, I have this problem again while running some traffic (ping -s 1500
to and from my device) and configuring MTU or set eth interface down. In
both cases gfar_stop sometimes cause soft lockup of 2 minutes.
Trace in case of MTU set:
BR_1: port 1(eth0) entering forwarding state
PHY: mdio at ffe24000:01 - Link is Down
PHY: mdio at ffe24000:01 - Link is Up - 100/Half
PHY: mdio at ffe24000:01 - Link is Down
PHY: mdio at ffe24000:01 - Link is Up - 10/Half
PHY: mdio at ffe24000:01 - Link is Down
BR_1: port 1(eth0) entering disabled state
PHY: mdio at ffe24000:01 - Link is Up - 1000/Full
BR_1: port 1(eth0) entering forwarding state
BUG: soft lockup - CPU#0 stuck for 120s! [wavman:2348]
Modules linked in: xt_physdev xt_state xt_tcpudp ebt_mark ebt_mark_m
ebt_limit ebtable_nat ebtable_broute ebtable_filter ebtables
iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_conntrack umac online_acs(P) dih(P) netlink_support(P) dfs_addon(P)
waran(P) ath_dev(P) ath_rate_atheros(P) addons_shared(P) ath_hal(P) adf
asf(P) iptable_filter ip_tables x_tables
NIP: c00513b8 LR: c00530b4 CTR: c005304c
REGS: c6009880 TRAP: 0901 Tainted: P (2.6.31)
MSR: 00029000 <EE,ME,CE> CR: 22028228 XER: 00000000
TASK = cd47aa30[2348] 'wavman' THREAD: c6008000
GPR00: 00000080 c6009930 cd47aa30 00000010 ca690a00 c6009b34 c6009ad8
d1880000
GPR08: 11b6598e 00000000 00000000 c0385f14 00000000
NIP [c00513b8] handle_IRQ_event+0x28/0x13c
LR [c00530b4] handle_fasteoi_irq+0x68/0xf0
Call Trace:
[c6009930] [00000004] 0x4 (unreliable)
[c6009950] [c00530b4] handle_fasteoi_irq+0x68/0xf0
[c6009960] [c0004f04] do_IRQ+0x98/0xb4
[c6009980] [c000fe58] ret_from_except+0x0/0x18
[c6009a40] [c0187ae0] stop_gfar+0x20/0x11c
[c6009a60] [c0189360] gfar_change_mtu+0x124/0x164
[c6009a80] [c01d5c30] dev_set_mtu+0x70/0xa4
[c6009a90] [c01e112c] do_setlink+0x1dc/0x348
[c6009ad0] [c01e2a9c] rtnl_newlink+0x330/0x460
[c6009bd0] [c01e2288] rtnetlink_rcv_msg+0x228/0x260
[c6009bf0] [c01ee0e8] netlink_rcv_skb+0x110/0x120
[c6009c10] [c01e204c] rtnetlink_rcv+0x28/0x3c
[c6009c30] [c01edd78] netlink_unicast+0x2c4/0x334
[c6009c70] [c01ee7ec] netlink_sendmsg+0x1c8/0x280
[c6009cc0] [c01c4c74] sock_sendmsg+0xac/0xe4
[c6009db0] [c01c4e80] sys_sendmsg+0x1d4/0x284
[c6009f00] [c01c58d4] sys_socketcall+0xe0/0x1f8
[c6009f40] [c000f804] ret_from_syscall+0x0/0x3c
Instruction dump:
801f0024 4bfffe3c 9421ffe0 7c0802a6 bf61000c 7c9f2378 90010024 7c7e1b78
80040004 70090020 40820008 7c008146 <3d20c02e> 3ba00000 3b69e138
3b800000
Trace in case of set eth down:
PHY: mdio at ffe24000:01 - Link is Up - 1000/Full
BR_1: port 1(eth0) entering forwarding state
BR_1: port 1(eth0) entering disabled state
BR_1: port 1(eth0) entering forwarding state
PHY: mdio at ffe24000:01 - Link is Up - 100/Full
BUG: soft lockup - CPU#0 stuck for 120s! [ip:8428]
Modules linked in: xt_physdev xt_state xt_tcpudp ebt_mark ebt_mark_m
ebt_limit ebtable_nat ebtable_broute ebtable_filter ebtables
iptable_mangle iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4
nf_conntrack rpldev umac online_acs(P) dih(P) netlink_support(P)
dfs_addon(P) waran(P) ath_dev(P) ath_rate_atheros(P) addons_shared(P)
ath_hal(P) adf asf(P) iptable_filter ip_tables x_tables
NIP: c00513b8 LR: c00530b4 CTR: c005304c
REGS: ca663bc0 TRAP: 0901 Tainted: P (2.6.31)
MSR: 00029000 <EE,ME,CE> CR: 22020428 XER: 00000000
TASK = c55c7390[8428] 'ip' THREAD: ca662000
GPR00: 00000080 ca663c70 c55c7390 00000010 c627cb00 c0364ae8 00000008
d1880000
GPR08: 4800f86b 00000000 00000000 c0385f14 00000000
NIP [c00513b8] handle_IRQ_event+0x28/0x13c
LR [c00530b4] handle_fasteoi_irq+0x68/0xf0
Call Trace:
[ca663c70] [ca662000] 0xca662000 (unreliable)
[ca663c90] [c00530b4] handle_fasteoi_irq+0x68/0xf0
[ca663ca0] [c0004f04] do_IRQ+0x98/0xb4
[ca663cc0] [c000fe58] ret_from_except+0x0/0x18
[ca663d80] [c0187af8] stop_gfar+0x38/0x11c
[ca663da0] [c01882c0] gfar_close+0x30/0xa0
[ca663dc0] [c01d62ec] dev_close+0x8c/0xe0
[ca663dd0] [c01d5db8] dev_change_flags+0x154/0x1ac
[ca663df0] [c022277c] devinet_ioctl+0x648/0x824
[ca663e60] [c0223294] inet_ioctl+0xcc/0xf8
[ca663e70] [c01c3c08] sock_ioctl+0x10c/0x2d0
[ca663e90] [c008bc60] vfs_ioctl+0x34/0x8c
[ca663ea0] [c008be84] do_vfs_ioctl+0x88/0x724
[ca663f10] [c008c560] sys_ioctl+0x40/0x74
[ca663f40] [c000f804] ret_from_syscall+0x0/0x3c
Instruction dump:
801f0024 4bfffe3c 9421ffe0 7c0802a6 bf61000c 7c9f2378 90010024 7c7e1b78
80040004 70090020 40820008 7c008146 <3d20c02e> 3ba00000 3b69e198
3b800000
A script (test_eth) that I run can reproduce it on my board.
Did you encounter such problem before ?
Thanks in advance,
Avi Tsarfati.
From: Claudiu Manoil [mailto:claudiu.manoil at freescale.com]
Sent: Tuesday, October 09, 2012 6:37 PM
To: Avi Tsarfati
Cc: linuxppc-dev at lists.ozlabs.org
Subject: Re: gianfar driver crash on P1020
Hello,
Did you try this patch?
http://patchwork.ozlabs.org/patch/186315/
Claudiu
On 10/9/2012 3:22 PM, Avi Tsarfati wrote:
Hi,
I have the same problem as you do.
Have you found the CPU stuck reason (or fix) in P1020RDB board ?
Thanks,
Avi Tsarfati.
************************************************************************
************
This footnote confirms that this email message has been scanned
by
PineApp Mail-SeCure for the presence of malicious code, vandals
& computer viruses(187).
************************************************************************
************
_______________________________________________
Linuxppc-dev mailing list
Linuxppc-dev at lists.ozlabs.org
https://lists.ozlabs.org/listinfo/linuxppc-dev
************************************************************************
************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals &
computer viruses(100).
************************************************************************
************
************************************************************************
************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals &
computer viruses(42).
************************************************************************
************
************************************************************************************
This footnote confirms that this email message has been scanned by
PineApp Mail-SeCure for the presence of malicious code, vandals & computer viruses(187).
************************************************************************************
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ozlabs.org/pipermail/linuxppc-dev/attachments/20121014/2cc9857a/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: test_eth
Type: application/octet-stream
Size: 361 bytes
Desc: test_eth
URL: <http://lists.ozlabs.org/pipermail/linuxppc-dev/attachments/20121014/2cc9857a/attachment-0001.obj>
More information about the Linuxppc-dev
mailing list