[FS#2628] Kernel warning / crash on ramips: eth0 (mtk_soc_eth): transmit queue 0 timed out

OpenWrt Bugs openwrt-bugs at lists.openwrt.org
Sat Feb 13 12:08:46 EST 2021


THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.

The following task has a new comment added:

FS#2628 - Kernel warning / crash on ramips: eth0 (mtk_soc_eth): transmit queue 0 timed out
User who did this - Paul Chernikhowsky (pchernikhowsky)

----------
Still seeing this bug in the (near) latest snapshot. Software offloading enabled, hardware offloading disabled. 

Any suggestions to try?

Device: UBNT-ERX-SFP

DISTRIB_ID='OpenWrt'
DISTRIB_RELEASE='19.07-SNAPSHOT'
DISTRIB_REVISION='r11294-1e90091c5d'
DISTRIB_TARGET='ramips/mt7621'
DISTRIB_ARCH='mipsel_24kc'
DISTRIB_DESCRIPTION='OpenWrt 19.07-SNAPSHOT r11294-1e90091c5d'
DISTRIB_TAINTS='no-all busybox'

Mon Feb  8 13:34:58 2021 kern.warn kernel: [157077.481513] ------------[ cut here ]------------
Mon Feb  8 13:34:58 2021 kern.warn kernel: [157077.490922] WARNING: CPU: 3 PID: 0 at net/sched/sch_generic.c:320 dev_watchdog+0x1ac/0x324
Mon Feb  8 13:34:58 2021 kern.info kernel: [157077.507557] NETDEV WATCHDOG: eth0 (mtk_soc_eth): transmit queue 0 timed out
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.521614] Modules linked in: nf_conntrack_ipv6 iptable_nat ipt_REJECT ipt_MASQUERADE xt_time xt_tcpudp xt_state xt_nat xt_multiport xt_mark xt_mac xt_limit xt_conntrack xt_comment xt_TCPMSS xt_REDIRECT xt_LOG xt_FLOWOFFLOAD nf_reject_ipv4 nf_nat_redirect nf_nat_masquerade_ipv4 nf_conntrack_ipv4 nf_nat_ipv4 nf_nat nf_log_ipv4 nf_flow_table_hw nf_flow_table nf_defrag_ipv6 nf_defrag_ipv4 nf_conntrack_rtcache nf_conntrack_netlink nf_conntrack iptable_mangle iptable_filter ip_tables crc_ccitt i2c_gpio i2c_algo_pca i2c_algo_bit gpio_pca953x i2c_dev xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.665156]  ip_set_bitmap_ip ip_set nfnetlink nf_log_ipv6 nf_log_common ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 tun leds_gpio gpio_button_hotplug
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.698268] CPU: 3 PID: 0 Comm: swapper/3 Not tainted 4.14.218 #0
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.710558] Stack : 00000000 8fe55740 80580000 8007297c 805a0000 80549e74 00000000 00000000
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.727365]         8051595c 8fc0fdc4 8fc3cffc 80582907 805106f0 00000001 8fc0fd68 5326163b
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.744174]         00000000 00000000 806e0000 00003c10 00000000 000000cb 00000008 00000000
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.760981]         00000000 80580000 000aa79c 70617773 00000000 805a0000 00000000 8054407c
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.777787]         803723a0 00000140 00000003 8fe55740 00000008 8029aef8 0000000c 806e000c
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.794592]         ...
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.799624] Call Trace:
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.804684] [] show_stack+0x58/0x100
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.813724] [] dump_stack+0xa4/0xe0
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.822568] [] __warn+0xe0/0x138
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.830885] [] warn_slowpath_fmt+0x30/0x3c
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.840941] [] dev_watchdog+0x1ac/0x324
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.850494] [] call_timer_fn.isra.25+0x24/0x84
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.861231] [] run_timer_softirq+0x1bc/0x248
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.871625] [] __do_softirq+0x128/0x2ec
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.881159] [] irq_exit+0xac/0xc8
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.889667] [] plat_irq_dispatch+0xfc/0x138
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.899890] [] except_vec_vi_end+0xb8/0xc4
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.909937] [] r4k_wait_irqoff+0x1c/0x24
Mon Feb  8 13:34:59 2021 kern.warn kernel: [157077.919724] ---[ end trace 9c3e786e34da7819 ]---
Mon Feb  8 13:34:59 2021 kern.err kernel: [157077.929096] mtk_soc_eth 1e100000.ethernet eth0: transmit timed out
Mon Feb  8 13:34:59 2021 kern.info kernel: [157077.941582] mtk_soc_eth 1e100000.ethernet eth0: dma_cfg:80000065
Mon Feb  8 13:34:59 2021 kern.info kernel: [157077.953721] mtk_soc_eth 1e100000.ethernet eth0: tx_ring=0, base=0f1a0000, max=0, ctx=162, dtx=162, fdx=161, next=162
Mon Feb  8 13:34:59 2021 kern.info kernel: [157077.974850] mtk_soc_eth 1e100000.ethernet eth0: rx_ring=0, base=0eb30000, max=0, calc=2099, drx=2100
Mon Feb  8 13:34:59 2021 kern.info kernel: [157078.000163] mtk_soc_eth 1e100000.ethernet: 0x100 = 0x6060000c, 0x10c = 0x80818
Mon Feb  8 13:34:59 2021 kern.info kernel: [157078.020303] mtk_soc_eth 1e100000.ethernet: PPE started

----------

More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=2628#comment9352

You are receiving this message because you have requested it from the Flyspray bugtracking system.  If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.



More information about the openwrt-bugs mailing list