Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5345730ybp; Tue, 8 Oct 2019 01:06:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqx1MZF+AMksPIRyxhn7DaiHcan/CdWCrBa7IgyN2/SK7zYIn0bEeA2wJLQOvWEY1fDSgPG9 X-Received: by 2002:a17:906:6805:: with SMTP id k5mr4233030ejr.50.1570522019091; Tue, 08 Oct 2019 01:06:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570522019; cv=none; d=google.com; s=arc-20160816; b=e68ifKCp3bn1WtYlaP5zj6RbXVc6F3V0a5gN3DTxO39HolNS8FFfl3HxZclRlZDUMM AX5eSlTRAvAQXo3w74ucwzjMW9eDgRzqcynvErwC7637OqPhKNkKVwzPlm2B6OhmPrfd Rwh+Gw+X0BfA5xMZ49MWC4vdroBgbYkYn1vLyv79pjkjqGPRQuxYOdMYNpul+U82Iy4a d/4qmRQ+mPgDDNsrp2ZE3WlmTcw9O296sNmNAbF4P6s6aJKt7hGuJQ6OgrjFN/u4QcsO NwCknKTcVQxKvWzIUQZuTA3hdQj1VDAM0yro7WIlMwRi1xw9z+EN0aAK0GnsB17CUvyk 4Mlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:content-transfer-encoding :mime-version:user-agent:references:in-reply-to:date:cc:to:from :message-id; bh=i3mPE5/a/xRmoaoos7qfh/B5ubyRIsyg8st6Bz0oHvI=; b=N2OGDYcYVdqoeTGTuKVPQr4LRbu5vnpHYtIRIh77aMN6HMQMT8iHzPcc+Fml2Xa6Tp xx/Ifs9+tskv5rZV1lvJXtnFhoxGY0LcL+HLOCTVEYSFJj5T6AvrzntDv4d1l6gE521Y dwQ7xYvxCS8m19f2owGNJiw6A8rSYnBPYN4C6UoA5x6C44cgUOOk5lH8fOZCW91Q871q QvC3ft8nD5Imm9XTGGopSfYZ1KWzGnmxLcquTaU062M/9sJOHNHK4AlMw4mTNI0pStrs 2a5a1tfhjhIfAuaVApSnvsY754kOd2luLiE1bl4uSphLjWUFips/GGKBjd9FRqNxo2wy 57bA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m10si9312206eds.428.2019.10.08.01.06.34; Tue, 08 Oct 2019 01:06:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-wireless-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730496AbfJHIG1 (ORCPT + 99 others); Tue, 8 Oct 2019 04:06:27 -0400 Received: from paleale.coelho.fi ([176.9.41.70]:47456 "EHLO farmhouse.coelho.fi" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730414AbfJHIG0 (ORCPT ); Tue, 8 Oct 2019 04:06:26 -0400 Received: from [91.156.6.193] (helo=redipa) by farmhouse.coelho.fi with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.92) (envelope-from ) id 1iHkVi-00032y-HM; Tue, 08 Oct 2019 11:06:23 +0300 Message-ID: From: Luca Coelho To: Sergey Matyukevich , Ben Greear Cc: "linux-wireless@vger.kernel.org" Date: Tue, 08 Oct 2019 11:06:21 +0300 In-Reply-To: References: <08f29d02-2fcf-e779-6fc0-ea7a9d4e59b6@candelatech.com> <20191008073330.7nuwzwpwgzgjfswm@bars> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.30.5-1.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on farmhouse.coelho.fi X-Spam-Level: X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.2 Subject: Re: AX200 crash on udp upload, cannot restart Sender: linux-wireless-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Tue, 2019-10-08 at 10:58 +0300, Luca Coelho wrote: > On Tue, 2019-10-08 at 07:33 +0000, Sergey Matyukevich wrote: > > > We have a system with several of the AX200 NICs in it, kernel is 5.2.14+. We ran a udp upload > > > test of 10Mbps across all radios, and after about 10 minutes one of the radios crashed and could > > > not be restarted. The others continued to run so far. > > > > > > I will open a bug in the kernel bug tracker. > > > > Hello Ben, > > > > We observed similar issues in our tests as well. All the details > > have been described in kernel bugzilla issue: > > https://urldefense.proofpoint.com/v2/url?u=https-3A__bugzilla.kernel.org_show-5Fbug.cgi-3Fid-3D205061&d=DwIFAg&c=MHZppzMdXMt3JYjCV71UsQ&r=RFH8dgrFzz0_hnNXpEl_u3TZqD-B6kYLzfvbDuCKw3U&m=opeh64GEVevn0071vriL-kH2B_orc25yacBPa3YdgLI&s=CKuyBZ0VdAQocDiZGOIDyDC6GG9w4E7OikmGvzblazU&e= > > Thanks for the reports! > > Ben also added a bug in bugzilla[1], let's use that one for tracking > (I'll mark Sergey's as a duplicate). > > This is a know issue and our PHY team is already working on it > internally. I don't have much more details at the moment, but I'll > update the bugzilla entry as soon as we know more. Actually the bug Sergey pointed out is not the same. It's a different sysassert, 0x103C and it will be investigated separately. -- Cheers, Luca.