On Wed, Oct 09, 2013 at 10:56:25AM -0700, Jack Vogel wrote: > Give the new driver I just committed to HEAD a try to verify/falsify a fix > please. > Updated driver seemingly fixed my issue with the drdb panic, thank you.
The tx busdma map leakage is still there. > Regards, > > Jack > > > > On Wed, Oct 9, 2013 at 10:23 AM, hiren panchasara < > hiren.panchas...@gmail.com> wrote: > > > Jack, > > I am also seeing similar panics at $work on a couple weeks old STABLE-9. > > > > Can you please look into this issue? > > > > cheers, > > Hiren > > > > 1) HP DL360e Gen8, 2 x Xeon E5-2430 2.20GHz > > > > panic: buf=0xfffffe002810d700 already enqueue at 995 prod=997 cons=995 > > cpuid = 17 > > KDB: stack backtrace: > > db_trace_self_wrapper() at db_trace_self_wrapper+0x2a/frame > > 0xffffff868637b030 > > kdb_backtrace() at kdb_backtrace+0x37/frame 0xffffff868637b0f0 > > panic() at panic+0x1d8/frame 0xffffff868637b1f0 > > igb_mq_start() at igb_mq_start+0x1cb/frame 0xffffff868637b240 > > ether_output_frame() at ether_output_frame+0x33/frame 0xffffff868637b260 > > ether_output() at ether_output+0x52d/frame 0xffffff868637b2f0 > > ip_output() at ip_output+0xe38/frame 0xffffff868637b3e0 > > tcp_output() at tcp_output+0x122c/frame 0xffffff868637b5a0 > > tcp_do_segment() at tcp_do_segment+0x306c/frame 0xffffff868637b6c0 > > tcp_input() at tcp_input+0x909/frame 0xffffff868637b7f0 > > ip_input() at ip_input+0xbd/frame 0xffffff868637b840 > > netisr_dispatch_src() at netisr_dispatch_src+0x152/frame 0xffffff868637b8a0 > > ether_demux() at ether_demux+0x17d/frame 0xffffff868637b8d0 > > ether_nh_input() at ether_nh_input+0x208/frame 0xffffff868637b910 > > netisr_dispatch_src() at netisr_dispatch_src+0x152/frame 0xffffff868637b970 > > igb_rxeof() at igb_rxeof+0x394/frame 0xffffff868637b9e0 > > igb_handle_que() at igb_handle_que+0x9b/frame 0xffffff868637ba20 > > taskqueue_run_locked() at taskqueue_run_locked+0x93/frame > > 0xffffff868637ba80 > > taskqueue_thread_loop() at taskqueue_thread_loop+0x3e/frame > > 0xffffff868637baa0 > > fork_exit() at fork_exit+0x135/frame 0xffffff868637baf0 > > fork_trampoline() at fork_trampoline+0xe/frame 0xffffff868637baf0 > > > > 2) HP DL160 G6, 2 x Xeon E5620 2.40GHz > > > > panic: buf=0xfffffe01b6334700 already enqueue at 42 prod=43 cons=42 > > cpuid = 0 > > KDB: stack backtrace: > > db_trace_self_wrapper() at db_trace_self_wrapper+0x2a/frame > > 0xffffff800037a620 > > kdb_backtrace() at kdb_backtrace+0x37/frame 0xffffff800037a6e0 > > panic() at panic+0x1d8/frame 0xffffff800037a7e0 > > igb_mq_start() at igb_mq_start+0x1cb/frame 0xffffff800037a830 > > ether_output_frame() at ether_output_frame+0x33/frame 0xffffff800037a850 > > ether_output() at ether_output+0x52d/frame 0xffffff800037a8e0 > > ip_output() at ip_output+0xe38/frame 0xffffff800037a9d0 > > syncache_respond() at syncache_respond+0x462/frame 0xffffff800037aa90 > > syncache_timer() at syncache_timer+0xdf/frame 0xffffff800037aac0 > > softclock() at softclock+0x2c6/frame 0xffffff800037ab60 > > intr_event_execute_handlers() at > > intr_event_execute_handlers+0x6a/frame 0xffffff800037ab90 > > ithread_loop() at ithread_loop+0xac/frame 0xffffff800037abe0 > > fork_exit() at fork_exit+0x135/frame 0xffffff800037ac30 > > fork_trampoline() at fork_trampoline+0xe/frame 0xffffff800037ac30 > >
pgpPQtV_nGUkg.pgp
Description: PGP signature