Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 688944

Summary: Kernel Warnings when starting Mellanox 10Gb network
Product: Red Hat Enterprise Linux 6 Reporter: Tom Tracy <ttracy>
Component: kernelAssignee: Doug Ledford <dledford>
Status: CLOSED ERRATA QA Contact: Network QE <network-qe>
Severity: medium Docs Contact:
Priority: medium    
Version: 6.0CC: arozansk, atzhang, kzhang, ltroan, mwagner, ogerlitz, perfbz, tziporet, vlad, yevgenyp
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: kernel-2.6.32-193.el6 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-12-06 12:45:30 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 643467, 659725, 735499    

Description Tom Tracy 2011-03-18 15:35:08 UTC
Description of problem:
When starting up the network for Mellanox 10Gb cards get kernels warnings

Version-Release number of selected component (if applicable):

Mellanox Technologies MT26448 [ConnectX EN 10GigE, PCIe 2.0 5GT/s] (rev b0)

How reproducible:


Every time you reboot the box and the network starts 

Steps to Reproduce:
1. reboot system
2. network comes up
3. Happens on Both Intel and AMD Boxes
  
Actual results:

Mar 18 10:13:26 pats kernel: WARNING: at net/core/dev.c:2099 get_rps_cpu+0x140/0x3b0() (Not tainted)
Mar 18 10:13:26 pats kernel: Hardware name: ProLiant DL380 G6
Mar 18 10:13:26 pats kernel: eth0 received packet on queue 10, but number of RX queues is 8
Mar 18 10:13:26 pats kernel: Modules linked in: nfsd exportfs autofs4 pcc_cpufreq nfs lockd fscache nfs_acl auth_rpcgss sunrpc ipv6 dm_mirror dm_region_hash dm_log power_meter ipmi_si ipmi_msghandler hpilo hpwdt sg microcode serio_raw iTCO_wdt iTCO_vendor_support bnx2 i7core_edac edac_core mlx4_ib ib_mad ib_core mlx4_en mlx4_core ext4 mbcache jbd2 sd_mod crc_t10dif hpsa radeon ttm drm_kms_helper drm hwmon i2c_algo_bit i2c_core dm_mod [last unloaded: scsi_wait_scan]
Mar 18 10:13:26 pats kernel: Pid: 0, comm: swapper Not tainted 2.6.32-124.el6.x86_64 #1
Mar 18 10:13:26 pats kernel: Call Trace:
Mar 18 10:13:26 pats kernel: <IRQ>  [<ffffffff81066ee7>] ? warn_slowpath_common+0x87/0xc0
Mar 18 10:13:26 pats kernel: [<ffffffff81066fd6>] ? warn_slowpath_fmt+0x46/0x50
Mar 18 10:13:26 pats kernel: [<ffffffff8141bc40>] ? get_rps_cpu+0x140/0x3b0
Mar 18 10:13:26 pats kernel: [<ffffffff8141e2c9>] ? netif_receive_skb+0x29/0x60
Mar 18 10:13:26 pats kernel: [<ffffffffa021a8ca>] ? mlx4_en_process_rx_cq+0x3ca/0x830 [mlx4_en]
Mar 18 10:13:26 pats kernel: [<ffffffffa021ad6f>] ? mlx4_en_poll_rx_cq+0x3f/0x80 [mlx4_en]
Mar 18 10:13:26 pats kernel: [<ffffffffa022c3a2>] ? mlx4_cq_completion+0x42/0x80 [mlx4_core]
Mar 18 10:13:26 pats kernel: [<ffffffff81420a43>] ? net_rx_action+0x103/0x2f0
Mar 18 10:13:26 pats kernel: [<ffffffff8106f4b7>] ? __do_softirq+0xb7/0x1e0
Mar 18 10:13:26 pats kernel: [<ffffffff810d65b0>] ? handle_IRQ_event+0x60/0x170
Mar 18 10:13:26 pats kernel: [<ffffffff8100c2cc>] ? call_softirq+0x1c/0x30
Mar 18 10:13:26 pats kernel: [<ffffffff8100df05>] ? do_softirq+0x65/0xa0
Mar 18 10:13:26 pats kernel: [<ffffffff8106f2a5>] ? irq_exit+0x85/0x90
Mar 18 10:13:26 pats kernel: [<ffffffff814e1935>] ? do_IRQ+0x75/0xf0
Mar 18 10:13:26 pats kernel: [<ffffffff8100bad3>] ? ret_from_intr+0x0/0x11
Mar 18 10:13:26 pats kernel: <EOI>  [<ffffffff81013d27>] ? mwait_idle+0x77/0xd0
Mar 18 10:13:26 pats kernel: [<ffffffff814df18a>] ? atomic_notifier_call_chain+0x1a/0x20
Mar 18 10:13:26 pats kernel: [<ffffffff81009e96>] ? cpu_idle+0xb6/0x110
Mar 18 10:13:26 pats kernel: [<ffffffff814c1b0a>] ? rest_init+0x7a/0x80
Mar 18 10:13:26 pats kernel: [<ffffffff81bbdf23>] ? start_kernel+0x418/0x424
Mar 18 10:13:26 pats kernel: [<ffffffff81bbd33a>] ? x86_64_start_reservations+0x125/0x129
Mar 18 10:13:26 pats kernel: [<ffffffff81bbd438>] ? x86_64_start_kernel+0xfa/0x109
Mar 18 10:13:26 pats kernel: ---[ end trace be9c1481cf8f69f0 ]---


Expected results:


Additional info:

Comment 1 KernelOops Bot 2011-03-18 15:39:26 UTC
 with this guiltyfunc:  bug 527824 bug 528295 bug 528296 bug 528521 bug 528768 bug 530380 bug 536855 bug 536985 bug 542694 bug 562008

Comment 4 RHEL Program Management 2011-04-04 02:41:02 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 5 RHEL Program Management 2011-08-11 21:10:21 UTC
This request was evaluated by Red Hat Product Management for inclusion
in a Red Hat Enterprise Linux maintenance release. Product Management has 
requested further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed 
products. This request is not yet committed for inclusion in an Update release.

Comment 6 Weibing Zhang 2011-08-17 01:58:18 UTC
dell-pet410-01.lab.bos.redhat.com

reproduced on ifconfig eth0 up with already up NIC. 

Linux dell-pet410-01.lab.bos.redhat.com 2.6.32-131.0.15.el6.x86_64 #1 SMP Tue May 10 15:42:40 EDT 2011 x86_64 x86_64 x86_64 GNU/Linux


------------[ cut here ]------------
WARNING: at net/core/dev.c:2157 get_rps_cpu+0x140/0x3b0() (Not tainted)
Hardware name: PowerEdge T410
eth0 received packet on queue 10, but number of RX queues is 8
Modules linked in: mlx4_en ioatdma ip6table_filter ip6_tables ebtable_nat ebtables nfsd lockd nfs_acl auth_rpcgss exportfs ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle iptable_filter ip_tables bridge stp llc vhost_net macvtap macvlan tun kvm_intel kvm autofs4 sunrpc cpufreq_ondemand acpi_cpufreq freq_table ipv6 dm_mirror dm_region_hash dm_log dcdbas microcode serio_raw ghes hed iTCO_wdt iTCO_vendor_support ixgbe dca mdio i7core_edac edac_core niu mlx4_ib ib_mad ib_core mlx4_core sg bnx2 ext4 mbcache jbd2 sr_mod cdrom sd_mod crc_t10dif pata_acpi ata_generic ata_piix mptsas mptscsih mptbase scsi_transport_sas dm_mod [last unloaded: mlx4_en]
Pid: 0, comm: swapper Not tainted 2.6.32-131.0.15.el6.x86_64 #1
Call Trace:
 <IRQ>  [<ffffffff81067137>] ? warn_slowpath_common+0x87/0xc0
 [<ffffffff81067226>] ? warn_slowpath_fmt+0x46/0x50
 [<ffffffff8141d760>] ? get_rps_cpu+0x140/0x3b0
 [<ffffffff81420019>] ? netif_receive_skb+0x29/0x60
 [<ffffffffa04b08ca>] ? mlx4_en_process_rx_cq+0x3ca/0x830 [mlx4_en]
 [<ffffffffa04b0d6f>] ? mlx4_en_poll_rx_cq+0x3f/0x80 [mlx4_en]
 [<ffffffffa01573a2>] ? mlx4_cq_completion+0x42/0x80 [mlx4_core]
 [<ffffffff814225a3>] ? net_rx_action+0x103/0x2f0
 [<ffffffff8106f717>] ? __do_softirq+0xb7/0x1e0
 [<ffffffff810d6940>] ? handle_IRQ_event+0x60/0x170
 [<ffffffff8100c2cc>] ? call_softirq+0x1c/0x30
 [<ffffffff8100df05>] ? do_softirq+0x65/0xa0
 [<ffffffff8106f505>] ? irq_exit+0x85/0x90
 [<ffffffff814e3505>] ? do_IRQ+0x75/0xf0
 [<ffffffff8100bad3>] ? ret_from_intr+0x0/0x11
 <EOI>  [<ffffffff812bb86e>] ? intel_idle+0xde/0x170
 [<ffffffff812bb851>] ? intel_idle+0xc1/0x170
 [<ffffffff813eccb7>] ? cpuidle_idle_call+0xa7/0x140
 [<ffffffff81009e96>] ? cpu_idle+0xb6/0x110
 [<ffffffff814c376a>] ? rest_init+0x7a/0x80
 [<ffffffff81bbdf28>] ? start_kernel+0x41d/0x429
 [<ffffffff81bbd33a>] ? x86_64_start_reservations+0x125/0x129
 [<ffffffff81bbd438>] ? x86_64_start_kernel+0xfa/0x109
---[ end trace a54baaaa132c9ecf ]---

set qa_ack+

Comment 7 Aristeu Rozanski 2011-08-31 14:23:59 UTC
Patch(es) available on kernel-2.6.32-193.el6

Comment 10 Larry Troan 2011-10-24 13:32:22 UTC
Adding Mellanox access to thei Red Hat public bug.

Comment 11 Weibing Zhang 2011-10-26 05:39:56 UTC
Reproduced in comment #6, verified on kernel-2.6.32-196.el6 and kernel-2.6.32-211.el6.
No error message appears with mlx_en card 03:00.0 InfiniBand: Mellanox Technologies MT25448 [ConnectX EN 10GigE, PCIe 2.0 2.5GT/s] (rev a0).
set Verified.

Comment 12 errata-xmlrpc 2011-12-06 12:45:30 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

http://rhn.redhat.com/errata/RHSA-2011-1530.html