On Mon, May 29, 2006 at 12:44:05AM +0200, Michael Buesch wrote:
> Ok Jason, could you please test the following patch and try to reproduce
> with it?

This patch crashes immediately: 

http://gehennom.net/~lunz/bcm43xx_crash2.jpg

The first patch, otoh, has only crashed twice, and even then only under
prolonged heavy load. (the first time after 4 million bcm43xx
interrupts, the second after 11 million).

This second patch is so bad I couldn't log in and check /proc/interrupts
without it blowing up. I gave up after the third crash; the backtraces
aren't identical but they do all mention bcm43xx and math error, for
some reason.

Also, this new patch produced a lot of warnings during boot before
crashing. I got them from syslog:

kernel: Bootdata ok (command line is ro resume2=swap:/dev/mapper/swap )
kernel: Linux version 2.6.17-rc5-git4-suspend2 ([EMAIL PROTECTED]) (gcc version 
4.1.1 20060511 (prerelease) (Debian 4.1.0-4)) #2 SMP PREEMPT Sun May 28 
21:40:25 EDT 2006
[...]

kernel: bcm43xx driver
kernel: ACPI: PCI Interrupt Link [LNK3] enabled at IRQ 17
kernel: GSI 21 sharing vector 0xD9 and IRQ 21
kernel: ACPI: PCI Interrupt 0000:02:02.0[A] -> Link [LNK3] -> GSI 17 (level, 
low) -> IRQ 21
kernel: bcm43xx: Chip ID 0x4306, rev 0x3
kernel: bcm43xx: Number of cores: 5
kernel: bcm43xx: Core 0: ID 0x800, rev 0x4, vendor 0x4243, enabled
kernel: bcm43xx: Core 1: ID 0x812, rev 0x5, vendor 0x4243, disabled
kernel: bcm43xx: Core 2: ID 0x80d, rev 0x2, vendor 0x4243, enabled
kernel: bcm43xx: Core 3: ID 0x807, rev 0x2, vendor 0x4243, disabled
kernel: bcm43xx: Core 4: ID 0x804, rev 0x9, vendor 0x4243, enabled
kernel: bcm43xx: PHY connected
kernel: bcm43xx: Detected PHY: Version: 2, Type 2, Revision 2
kernel: bcm43xx: Detected Radio: ID: 2205017f (Manuf: 17f Ver: 2050 Rev: 2)
kernel: bcm43xx: Radio turned off
kernel: bcm43xx: Radio turned off
kernel: ACPI: PCI Interrupt Link [LMCI] enabled at IRQ 22
kernel: ACPI: PCI Interrupt 0000:00:06.1[B] -> Link [LMCI] -> GSI 22 (level, 
low) -> IRQ 18
kernel: PCI: Setting latency timer of device 0000:00:06.1 to 64
kernel: ACPI: PCI Interrupt Link [LACI] enabled at IRQ 21
kernel: ACPI: PCI Interrupt 0000:00:06.0[A] -> Link [LACI] -> GSI 21 (level, 
low) -> IRQ 19
kernel: PCI: Setting latency timer of device 0000:00:06.0 to 64
kernel: input: PS/2 Mouse as /class/input/input1
kernel: Serial: 8250/16550 driver $Revision: 1.90 $ 4 ports, IRQ sharing enabled
kernel: input: AlpsPS/2 ALPS GlidePoint as /class/input/input2
kernel: ieee1394: Host added: ID:BUS[0-00:1023]  GUID[453f0200453f0200]
kernel: eth1394: eth0: IEEE-1394 IPv4 over 1394 Ethernet (fw-host0)
kernel: floppy0: no floppy controllers found
kernel: intel8x0_measure_ac97_clock: measured 55368 usecs
kernel: intel8x0: clocking to 47459
kernel: EXT3 FS on dm-1, internal journal
kernel: ACPI: CPU0 (power states: C1[C1] C2[C2])
kernel: powernow-k8: Found 1 AMD Athlon 64 / Opteron processors (version 1.60.2)
kernel: powernow-k8:    0 : fid 0xe (2200 MHz), vid 0x2 (1500 mV)
kernel: powernow-k8:    1 : fid 0xa (1800 MHz), vid 0xa (1300 mV)
kernel: powernow-k8:    2 : fid 0x0 (800 MHz), vid 0x12 (1100 mV)
kernel: cpu_init done, current fid 0xe, vid 0x2
kernel: fuse init (API version 7.6)
kernel: ieee80211_crypt: registered algorithm 'WEP'
kernel: ieee80211_crypt: registered algorithm 'TKIP'
kernel: ieee80211_crypt: registered algorithm 'CCMP'
kernel: kjournald starting.  Commit interval 5 seconds
kernel: EXT3 FS on hda1, internal journal
kernel: EXT3-fs: mounted filesystem with ordered data mode.
kernel: Adding 1750560k swap on /dev/mapper/swap.  Priority:-1 extents:1 
across:1750560k
kernel: pcmcia: Detected deprecated PCMCIA ioctl usage from process: discover.
kernel: pcmcia: This interface will soon be removed from the kernel; please 
expect breakage unless you upgrade to new tools.
kernel: pcmcia: see 
http://www.kernel.org/pub/linux/utils/kernel/pcmcia/pcmcia.html for details.
kernel: bcm43xx: PHY connected
kernel: bcm43xx: Radio turned on
kernel: bcm43xx: Chip initialized
kernel: bcm43xx: DMA initialized
kernel: bcm43xx: 80211 cores initialized
kernel: bcm43xx: Keys cleared
kernel: NET: Registered protocol family 17
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: Losing some ticks... checking if CPU frequency changed.
kernel: SoftMAC: Open Authentication completed with 00:12:17:3a:e2:c7
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .level = 0
kernel: bcm43xx:    .enabled = 0
kernel: bcm43xx:    .encrypt = 0
kernel: bcm43xx: set security called
kernel: bcm43xx:    .active_key = 0
kernel: bcm43xx:    .level = 4
kernel: bcm43xx:    .enabled = 1
kernel: bcm43xx:    .encrypt = 1
kernel: bcm43xx: set security called
kernel: bcm43xx:    .enabled = 1
kernel: bcm43xx:    .encrypt = 1
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
kernel: CCMP: decrypt failed: STA=00:12:17:3a:e2:c7
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
kernel: CCMP: decrypt failed: STA=00:12:17:3a:e2:c7
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
kernel: CCMP: decrypt failed: STA=00:12:17:3a:e2:c7
kernel: CCMP: decrypt failed: STA=00:12:17:3a:e2:c7
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
kernel: BUG: spinlock already unlocked on CPU#0, sh/1920
kernel:  lock: ffff81001e8bf108, .magic: dead4ead, .owner: <none>/-1, 
.owner_cpu: -1
kernel: 
kernel: Call Trace: <IRQ> <ffffffff802d597b>{_raw_spin_unlock+46}
kernel:        <ffffffff803921a2>{_spin_unlock+9} 
<ffffffff88212469>{:bcm43xx:bcm43xx_interrupt_handler+518}
kernel:        <ffffffff8025a970>{handle_IRQ_event+41} 
<ffffffff8025aa3b>{__do_IRQ+154}
kernel:        <ffffffff8020ba8c>{do_IRQ+50} <ffffffff80209ce8>{ret_from_intr+0}
kernel:        <ffffffff88217238>{:bcm43xx:bcm43xx_interrupt_tasklet+2}
kernel:        <ffffffff88212469>{:bcm43xx:bcm43xx_interrupt_handler+518}
kernel:        <ffffffff80231321>{tasklet_action+98} 
<ffffffff80230eb7>{__do_softirq+73}
kernel:        <ffffffff8020a9ba>{call_softirq+30} 
<ffffffff8020b9a0>{do_softirq+44}
kernel:        <ffffffff802312b4>{irq_exit+63} <ffffffff8020ba91>{do_IRQ+55}
kernel:        <ffffffff880a9562>{:processor:acpi_processor_idle+0}
kernel:        <ffffffff80209ce8>{ret_from_intr+0} <EOI> 
<ffffffff8026244f>{blockable_page_cache_readahead+86}
kernel:        <ffffffff802d4007>{clear_page+7} 
<ffffffff802609dd>{get_page_from_freelist+822}
kernel:        <ffffffff80260ae7>{__alloc_pages+113} 
<ffffffff80260df1>{get_zeroed_page+67}
kernel:        <ffffffff8026802d>{__pte_alloc+26} 
<ffffffff802681f1>{__handle_mm_fault+263}
kernel:        <ffffffff80391d28>{_spin_lock_irqsave+30} 
<ffffffff8039416b>{do_page_fault+1098}
kernel:        <ffffffff8026caaa>{do_mmap_pgoff+1487} 
<ffffffff80391d28>{_spin_lock_irqsave+30}
kernel:        <ffffffff8020a4b1>{error_exit+0}
kernel: ----------- [cut here ] --------- [please bite here ] ---------
kernel: Kernel BUG at kernel/sched.c:2875
kernel: invalid opcode: 0000 [1] PREEMPT SMP 
kernel: CPU 0 
kernel: Modules linked in: af_packet ieee80211_crypt_ccmp ieee80211_crypt_tkip 
ieee80211_crypt_wep fuse cpufreq_ondemand cpufreq_conservative powernow_k8 
freq_table processor eth1394 8250_pci 8250 serial_core snd_intel8x0 snd_pcm_oss 
snd_mixer_oss snd_intel8x0m snd_ac97_codec snd_ac97_bus bcm43xx snd_pcm 
snd_timer pcmcia psmouse pcspkr firmware_class ehci_hcd ohci_hcd ohci1394 
ieee1394 serio_raw ide_cd cdrom snd soundcore snd_page_alloc i2c_nforce2 
ieee80211softmac usbcore parport_pc parport 8139too mii yenta_socket 
rsrc_nonstatic pcmcia_core ieee80211 ieee80211_crypt rtc unix ext3 jbd mbcache 
lzf dm_crypt dm_mod sha256 aes_x86_64 ide_disk amd74xx generic ide_core evdev 
fbcon tileblit font bitblit softcursor
kernel: Pid: 1920, comm: sh Not tainted 2.6.17-rc5-git4-suspend2 #2
kernel: RIP: 0010:[<ffffffff802243e6>] <ffffffff802243e6>{sub_preempt_count+21}
kernel: RSP: 0000:ffffffff8049af88  EFLAGS: 00010002
kernel: RAX: ffff81001df17fd8 RBX: ffff81001df17c18 RCX: 0000000000000001
kernel: RDX: ffff8100811f3000 RSI: ffffffff80445240 RDI: 0000000000000001
kernel: RBP: ffffffff8049af88 R08: ffffffff804bd310 R09: 000000000001be31
kernel: R10: 0000000000000000 R11: ffffffff80441240 R12: 0000000000000001
kernel: R13: 0000000000000001 R14: 0000000000000256 R15: ffffffff80445240
kernel: FS:  00002aef1c6b56d0(0000) GS:ffffffff804e6000(0000) 
knlGS:0000000000000000
kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
kernel: CR2: 00002b9079000d18 CR3: 000000001d4d9000 CR4: 00000000000006e0
kernel: Process sh (pid: 1920, threadinfo ffff81001df16000, task 
ffff81001e57ef20)
kernel: Stack: 0000000000000015 ffffffff8020ba91 ffffffff880a9562 
ffff81000168e438 
kernel:        ffff81000168e400 ffffffff80209ce8 ffff81001df17c18  <EOI> 
0000000000000000 
kernel:        ffff81001f2fec00 ffff81001f4e83b8 
kernel: Call Trace: <IRQ> <ffffffff8020ba91>{do_IRQ+55} 
<ffffffff880a9562>{:processor:acpi_processor_idle+0}
kernel:        <ffffffff80209ce8>{ret_from_intr+0} <EOI> 
<ffffffff8026244f>{blockable_page_cache_readahead+86}
kernel:        <ffffffff802d4007>{clear_page+7} 
<ffffffff802609dd>{get_page_from_freelist+822}
kernel:        <ffffffff80260ae7>{__alloc_pages+113} 
<ffffffff80260df1>{get_zeroed_page+67}
kernel:        <ffffffff8026802d>{__pte_alloc+26} 
<ffffffff802681f1>{__handle_mm_fault+263}
kernel:        <ffffffff80391d28>{_spin_lock_irqsave+30} 
<ffffffff8039416b>{do_page_fault+1098}
kernel:        <ffffffff8026caaa>{do_mmap_pgoff+1487} 
<ffffffff80391d28>{_spin_lock_irqsave+30}
kernel:        <ffffffff8020a4b1>{error_exit+0}
kernel: 
kernel: Code: 0f 0b 68 b9 e1 3a 80 c2 3b 0b 81 ff fe 00 00 00 77 1c 65 48 
kernel: RIP <ffffffff802243e6>{sub_preempt_count+21} RSP <ffffffff8049af88>
kernel:  <3>BUG: sleeping function called from invalid context at 
include/linux/rwsem.h:43
kernel: in_atomic():0, irqs_disabled():1
kernel: 
kernel: Call Trace: <IRQ> <ffffffff80238b2c>{blocking_notifier_call_chain+31}
kernel:        <ffffffff8022ecec>{do_exit+34} 
<ffffffff80318cd8>{do_unblank_screen+39}
kernel:        <ffffffff8020afb0>{kernel_math_error+0} 
<ffffffff8020b54d>{do_invalid_op+173}
kernel:        <ffffffff802243e6>{sub_preempt_count+21} 
<ffffffff88226f30>{:bcm43xx:bcm43xx_leds_update+299}
kernel:        <ffffffff80392274>{_spin_unlock_irqrestore+47} 
<ffffffff88217b4b>{:bcm43xx:bcm43xx_interrupt_tasklet+2325}
kernel:        <ffffffff8020a4b1>{error_exit+0} 
<ffffffff802243e6>{sub_preempt_count+21}
kernel:        <ffffffff802312b4>{irq_exit+63} <ffffffff8020ba91>{do_IRQ+55}
kernel:        <ffffffff880a9562>{:processor:acpi_processor_idle+0}
kernel:        <ffffffff80209ce8>{ret_from_intr+0} <EOI> 
<ffffffff8026244f>{blockable_page_cache_readahead+86}
kernel:        <ffffffff802d4007>{clear_page+7} 
<ffffffff802609dd>{get_page_from_freelist+822}
kernel:        <ffffffff80260ae7>{__alloc_pages+113} 
<ffffffff80260df1>{get_zeroed_page+67}
kernel:        <ffffffff8026802d>{__pte_alloc+26} 
<ffffffff802681f1>{__handle_mm_fault+263}
kernel:        <ffffffff80391d28>{_spin_lock_irqsave+30} 
<ffffffff8039416b>{do_page_fault+1098}
kernel:        <ffffffff8026caaa>{do_mmap_pgoff+1487} 
<ffffffff80391d28>{_spin_lock_irqsave+30}
kernel:        <ffffffff8020a4b1>{error_exit+0}
kernel: printk: 205 messages suppressed.
kernel: CCMP: decrypt failed: STA=00:13:02:25:08:7b
_______________________________________________
Bcm43xx-dev mailing list
[email protected]
http://lists.berlios.de/mailman/listinfo/bcm43xx-dev

Reply via email to