Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5341203ybp; Tue, 8 Oct 2019 01:02:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqxjZAusO2P0CVCGZVtuVTk2mb7irs5CN82+TVxUrhh0BtiyC8NtV9Zst6WTG5YGCxN4PhWE X-Received: by 2002:a17:907:20f1:: with SMTP id rh17mr27547980ejb.110.1570521752025; Tue, 08 Oct 2019 01:02:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570521752; cv=none; d=google.com; s=arc-20160816; b=sxx/sJ+e8KneOBiHX+2q3dqLhfbaYYig2Bce0wUHq4fmy83tQVonv6ibTVDuh4b7jH JEbNl3rSpFzLG6q2cOnA9KO+KIZxS/gC+Qo2QkMpEjyXHtZ+6R6D7xgT85/V6l3xOS60 uHxS141pC3JvB7CgpDSXZ8GMJqtKkEhx/ZgM65rXrtJIsOYE6l/Nppg1gCnLpifafR5r 7ZuXl1PUZGEoNUWgAXCLVezhyYa720rdqed3+I0cynWSwB09ddSOF+H41GBmk2pJu6hY wX6WxD+Cf6S0pmHPTaW+lS2O0+WLXj/wHjfrM93Rvi3NzkYeg4JA0gtLgZi2x4Btvb7A BkHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :mime-version:user-agent:references:in-reply-to:date:cc:to:from :message-id; bh=W5gauLPOM2fDubPIRgkvcO6UOdtnno/51a7F0DdsYm8=; b=kTQHoaHCwdltCFkp8Bm+55n4+wnG8XaPwEG9NAKt5cbDR5Gu6Gv+ExBo5i6RvyEkkU XbJRoXlIBVlJt3TYC0XJJLfsQM+/RMVvvZ5cgGDLBHgSbRbLbxdJyISxeW3twv9SWMbP /3NIwKac/A43Hg6KDSC2AMEykZeFOWSQ0E3tB2X5e62fU/FMJcknjjB+G0RKIf6eiKXY lwGVbA1oFTri1sKD9LF8mHnO3k3GRSA7Zmesloq/9Jw1vJchUI+4YACd9xGMdxSOQDqk AxHPSVv2i9SdvEEDZJeIYaNmV3vLZOlNXKi/A5Av7xpcMzWYyNsz9Hi7QSk8vuZyo5/x etUA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l18si8231555ejg.248.2019.10.08.01.01.57; Tue, 08 Oct 2019 01:02:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730309AbfJHH6z (ORCPT + 99 others); Tue, 8 Oct 2019 03:58:55 -0400 Received: from paleale.coelho.fi ([176.9.41.70]:47442 "EHLO farmhouse.coelho.fi" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730209AbfJHH6z (ORCPT ); Tue, 8 Oct 2019 03:58:55 -0400 Received: from [91.156.6.193] (helo=redipa) by farmhouse.coelho.fi with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.92) (envelope-from ) id 1iHkOO-00032Z-6p; Tue, 08 Oct 2019 10:58:49 +0300 Message-ID: From: Luca Coelho To: Sergey Matyukevich , Ben Greear Cc: "linux-wireless@vger.kernel.org" Date: Tue, 08 Oct 2019 10:58:46 +0300 In-Reply-To: <20191008073330.7nuwzwpwgzgjfswm@bars> References: <08f29d02-2fcf-e779-6fc0-ea7a9d4e59b6@candelatech.com> <20191008073330.7nuwzwpwgzgjfswm@bars> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5-1.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on farmhouse.coelho.fi X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Subject: Re: AX200 crash on udp upload, cannot restart Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Tue, 2019-10-08 at 07:33 +0000, Sergey Matyukevich wrote: > > We have a system with several of the AX200 NICs in it, kernel is 5.2.14+. We ran a udp upload > > test of 10Mbps across all radios, and after about 10 minutes one of the radios crashed and could > > not be restarted. The others continued to run so far. > > > > I will open a bug in the kernel bug tracker. > > Hello Ben, > > We observed similar issues in our tests as well. All the details > have been described in kernel bugzilla issue: > https://urldefense.proofpoint.com/v2/url?u=https-3A__bugzilla.kernel.org_show-5Fbug.cgi-3Fid-3D205061&d=DwIFAg&c=MHZppzMdXMt3JYjCV71UsQ&r=RFH8dgrFzz0_hnNXpEl_u3TZqD-B6kYLzfvbDuCKw3U&m=opeh64GEVevn0071vriL-kH2B_orc25yacBPa3YdgLI&s=CKuyBZ0VdAQocDiZGOIDyDC6GG9w4E7OikmGvzblazU&e= Thanks for the reports! Ben also added a bug in bugzilla[1], let's use that one for tracking (I'll mark Sergey's as a duplicate). This is a know issue and our PHY team is already working on it internally. I don't have much more details at the moment, but I'll update the bugzilla entry as soon as we know more. -- Cheers, Luca.