On Wed, Oct 09, 2013 at 10:56:25AM -0700, Jack Vogel wrote:
> Give the new driver I just committed to HEAD a try to verify/falsify a fix
> please.
> 
Updated driver seemingly fixed my issue with the drdb panic, thank you.

The tx busdma map leakage is still there.
> Regards,
> 
> Jack
> 
> 
> 
> On Wed, Oct 9, 2013 at 10:23 AM, hiren panchasara <
> hiren.panchas...@gmail.com> wrote:
> 
> > Jack,
> > I am also seeing similar panics at $work on a couple weeks old STABLE-9.
> >
> > Can you please look into this issue?
> >
> > cheers,
> > Hiren
> >
> > 1) HP DL360e Gen8, 2 x Xeon E5-2430 2.20GHz
> >
> > panic: buf=0xfffffe002810d700 already enqueue at 995 prod=997 cons=995
> > cpuid = 17
> > KDB: stack backtrace:
> > db_trace_self_wrapper() at db_trace_self_wrapper+0x2a/frame
> > 0xffffff868637b030
> > kdb_backtrace() at kdb_backtrace+0x37/frame 0xffffff868637b0f0
> > panic() at panic+0x1d8/frame 0xffffff868637b1f0
> > igb_mq_start() at igb_mq_start+0x1cb/frame 0xffffff868637b240
> > ether_output_frame() at ether_output_frame+0x33/frame 0xffffff868637b260
> > ether_output() at ether_output+0x52d/frame 0xffffff868637b2f0
> > ip_output() at ip_output+0xe38/frame 0xffffff868637b3e0
> > tcp_output() at tcp_output+0x122c/frame 0xffffff868637b5a0
> > tcp_do_segment() at tcp_do_segment+0x306c/frame 0xffffff868637b6c0
> > tcp_input() at tcp_input+0x909/frame 0xffffff868637b7f0
> > ip_input() at ip_input+0xbd/frame 0xffffff868637b840
> > netisr_dispatch_src() at netisr_dispatch_src+0x152/frame 0xffffff868637b8a0
> > ether_demux() at ether_demux+0x17d/frame 0xffffff868637b8d0
> > ether_nh_input() at ether_nh_input+0x208/frame 0xffffff868637b910
> > netisr_dispatch_src() at netisr_dispatch_src+0x152/frame 0xffffff868637b970
> > igb_rxeof() at igb_rxeof+0x394/frame 0xffffff868637b9e0
> > igb_handle_que() at igb_handle_que+0x9b/frame 0xffffff868637ba20
> > taskqueue_run_locked() at taskqueue_run_locked+0x93/frame
> > 0xffffff868637ba80
> > taskqueue_thread_loop() at taskqueue_thread_loop+0x3e/frame
> > 0xffffff868637baa0
> > fork_exit() at fork_exit+0x135/frame 0xffffff868637baf0
> > fork_trampoline() at fork_trampoline+0xe/frame 0xffffff868637baf0
> >
> > 2) HP DL160 G6, 2 x Xeon E5620 2.40GHz
> >
> > panic: buf=0xfffffe01b6334700 already enqueue at 42 prod=43 cons=42
> > cpuid = 0
> > KDB: stack backtrace:
> > db_trace_self_wrapper() at db_trace_self_wrapper+0x2a/frame
> > 0xffffff800037a620
> > kdb_backtrace() at kdb_backtrace+0x37/frame 0xffffff800037a6e0
> > panic() at panic+0x1d8/frame 0xffffff800037a7e0
> > igb_mq_start() at igb_mq_start+0x1cb/frame 0xffffff800037a830
> > ether_output_frame() at ether_output_frame+0x33/frame 0xffffff800037a850
> > ether_output() at ether_output+0x52d/frame 0xffffff800037a8e0
> > ip_output() at ip_output+0xe38/frame 0xffffff800037a9d0
> > syncache_respond() at syncache_respond+0x462/frame 0xffffff800037aa90
> > syncache_timer() at syncache_timer+0xdf/frame 0xffffff800037aac0
> > softclock() at softclock+0x2c6/frame 0xffffff800037ab60
> > intr_event_execute_handlers() at
> > intr_event_execute_handlers+0x6a/frame 0xffffff800037ab90
> > ithread_loop() at ithread_loop+0xac/frame 0xffffff800037abe0
> > fork_exit() at fork_exit+0x135/frame 0xffffff800037ac30
> > fork_trampoline() at fork_trampoline+0xe/frame 0xffffff800037ac30
> >

Attachment: pgpPQtV_nGUkg.pgp
Description: PGP signature

Reply via email to