** Description changed:

+ [Impact]
+ 
+ We are working on a IoT project, when we run the uc20 on the hardware,
+ a lot of warning calltrace will be printed out on the console.
+ 
+ 
+ [Fix]
+ Backport one patch from upstream.
+ 
+ [Test]
+ Boot the patched kernel on the machine, check dmesg, there is no
+ that calltrace anymore. And manually test it with 
+ "ethtool -s eth0 wol d", it will not introduce calltrace any longer.
+ 
+ 
+ [Where problems could occur]
+ The change only impacts the ethertool wol function on ethernet stmmac,
+ if it could introduce any regression, it will be on wol function of
+ stmmac driver, but the risk of regression is very low, and we tested
+ the wol with "ethtool -s eth0 wol g" and "ethtool -s eth0 wol d", the
+ test result is positive.
+ 
+ 
+ 
  When we boot uc20 on an arm64 platform with stmmac ethernet, the kernel
  will print the calltrace as below periodically:
  
  [   31.617426] ------------[ cut here ]------------
  [   31.622053] Unbalanced IRQ 46 wake disable
  [   31.626164] WARNING: CPU: 1 PID: 516 at kernel/irq/manage.c:754 
irq_set_irq_wake+0x100/0x140
  [   31.634598] Modules linked in: crct10dif_ce
  [   31.638785] CPU: 1 PID: 516 Comm: ethtool Not tainted 
5.4.70+g7905bd7680f1c #1
  [   31.646002] Hardware name: NXP i.MX8MPlus EVK board (DT)
  [   31.651312] pstate: 40000085 (nZcv daIf -PAN -UAO)
  [   31.656100] pc : irq_set_irq_wake+0x100/0x140
  [   31.660454] lr : irq_set_irq_wake+0x100/0x140
  [   31.664806] sp : ffff80001230baa0
  [   31.668118] x29: ffff80001230baa0 x28: ffff000077900e00
  [   31.673427] x27: 0000000000000000 x26: 0000000000000000
  [   31.678736] x25: 0000000056000000 x24: 0001708000004bb3
  [   31.684046] x23: 0000000000000000 x22: 00000000ffffffea
  [   31.689355] x21: 000000000000002e x20: ffff000077900e00
  [   31.694666] x19: ffff00007a3d6c00 x18: 0000000000000010
  [   31.699976] x17: 0000000000000000 x16: 0000000000000000
  [   31.705285] x15: ffff000077901270 x14: ffffffffffffffff
  [   31.710594] x13: ffff80009230b7f7 x12: ffff80001230b7ff
  [   31.715903] x11: ffff800011bc2000 x10: ffff800011cf9328
  [   31.721212] x9 : 0000000000000000 x8 : ffff800011cfa000
  [   31.726522] x7 : ffff8000106b0a28 x6 : 00000000000001de
  [   31.731831] x5 : ffff00007ddb8180 x4 : 0000000000000001
  [   31.737140] x3 : ffff00007ddb8180 x2 : 0000000000000007
  [   31.742449] x1 : 291194bbee99b600 x0 : 0000000000000000
  [   31.747759] Call trace:
  [   31.750203]  irq_set_irq_wake+0x100/0x140
  [   31.754212]  stmmac_set_wol+0x7c/0xf0
  [   31.757872]  dev_ethtool+0xaa0/0x1fa0
  [   31.761534]  dev_ioctl+0x240/0x3a0
  [   31.764935]  sock_do_ioctl+0xfc/0x2b0
  [   31.768593]  sock_ioctl+0x264/0x528
  [   31.772080]  do_vfs_ioctl+0x964/0xb48
  [   31.775739]  ksys_ioctl+0x78/0xa8
  [   31.779052]  __arm64_sys_ioctl+0x1c/0xb8
  [   31.782974]  el0_svc_common.constprop.0+0x68/0x160
  [   31.787762]  el0_svc_handler+0x20/0x80
  [   31.791509]  el0_svc+0x8/0x208
  [   31.794561] ---[ end trace fd95e8037ff0ec09 ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2095376

Title:
  net: stmmac: kernel continually prints wol unbalance irq warning

Status in linux package in Ubuntu:
  New
Status in linux source package in Focal:
  New

Bug description:
  [Impact]

  We are working on a IoT project, when we run the uc20 on the hardware,
  a lot of warning calltrace will be printed out on the console.

  
  [Fix]
  Backport one patch from upstream.

  [Test]
  Boot the patched kernel on the machine, check dmesg, there is no
  that calltrace anymore. And manually test it with 
  "ethtool -s eth0 wol d", it will not introduce calltrace any longer.

  
  [Where problems could occur]
  The change only impacts the ethertool wol function on ethernet stmmac,
  if it could introduce any regression, it will be on wol function of
  stmmac driver, but the risk of regression is very low, and we tested
  the wol with "ethtool -s eth0 wol g" and "ethtool -s eth0 wol d", the
  test result is positive.



  When we boot uc20 on an arm64 platform with stmmac ethernet, the
  kernel will print the calltrace as below periodically:

  [   31.617426] ------------[ cut here ]------------
  [   31.622053] Unbalanced IRQ 46 wake disable
  [   31.626164] WARNING: CPU: 1 PID: 516 at kernel/irq/manage.c:754 
irq_set_irq_wake+0x100/0x140
  [   31.634598] Modules linked in: crct10dif_ce
  [   31.638785] CPU: 1 PID: 516 Comm: ethtool Not tainted 
5.4.70+g7905bd7680f1c #1
  [   31.646002] Hardware name: NXP i.MX8MPlus EVK board (DT)
  [   31.651312] pstate: 40000085 (nZcv daIf -PAN -UAO)
  [   31.656100] pc : irq_set_irq_wake+0x100/0x140
  [   31.660454] lr : irq_set_irq_wake+0x100/0x140
  [   31.664806] sp : ffff80001230baa0
  [   31.668118] x29: ffff80001230baa0 x28: ffff000077900e00
  [   31.673427] x27: 0000000000000000 x26: 0000000000000000
  [   31.678736] x25: 0000000056000000 x24: 0001708000004bb3
  [   31.684046] x23: 0000000000000000 x22: 00000000ffffffea
  [   31.689355] x21: 000000000000002e x20: ffff000077900e00
  [   31.694666] x19: ffff00007a3d6c00 x18: 0000000000000010
  [   31.699976] x17: 0000000000000000 x16: 0000000000000000
  [   31.705285] x15: ffff000077901270 x14: ffffffffffffffff
  [   31.710594] x13: ffff80009230b7f7 x12: ffff80001230b7ff
  [   31.715903] x11: ffff800011bc2000 x10: ffff800011cf9328
  [   31.721212] x9 : 0000000000000000 x8 : ffff800011cfa000
  [   31.726522] x7 : ffff8000106b0a28 x6 : 00000000000001de
  [   31.731831] x5 : ffff00007ddb8180 x4 : 0000000000000001
  [   31.737140] x3 : ffff00007ddb8180 x2 : 0000000000000007
  [   31.742449] x1 : 291194bbee99b600 x0 : 0000000000000000
  [   31.747759] Call trace:
  [   31.750203]  irq_set_irq_wake+0x100/0x140
  [   31.754212]  stmmac_set_wol+0x7c/0xf0
  [   31.757872]  dev_ethtool+0xaa0/0x1fa0
  [   31.761534]  dev_ioctl+0x240/0x3a0
  [   31.764935]  sock_do_ioctl+0xfc/0x2b0
  [   31.768593]  sock_ioctl+0x264/0x528
  [   31.772080]  do_vfs_ioctl+0x964/0xb48
  [   31.775739]  ksys_ioctl+0x78/0xa8
  [   31.779052]  __arm64_sys_ioctl+0x1c/0xb8
  [   31.782974]  el0_svc_common.constprop.0+0x68/0x160
  [   31.787762]  el0_svc_handler+0x20/0x80
  [   31.791509]  el0_svc+0x8/0x208
  [   31.794561] ---[ end trace fd95e8037ff0ec09 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/2095376/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to