General
cancel
Showing results for 
Search instead for 
Did you mean: 

Bug in linux hpsa driver for P420i controller?

robert-adesam
Occasional Contributor

Bug in linux hpsa driver for P420i controller?

Dear HP users,

 

we have a ProLiant DL360p Gen8 with

  • a P420i controller 2GB fbwc and latest firmware 3.04

running

  • CentOS 6.3, kernel 2.6.32-279.9.1.el6.x86_64 with
  • latest rhel hpsa driver 3.1.0-4 for kernel 2.6.32-79 which installed ok.

But when stress-testing the disk we get soft lockups:

  • kernel:BUG: soft lockup - CPU#0 stuck for 67s! [jbd2/sda2-8:869]

We have also checked each disk for errors running HP Insight Diagnostics test suite on each sas2 hdd, includes SMART and scattered read tests etc. All passed.

 

We think this might be a bug in the HP hpsa driver? Anyone seen this before or have any other suggestions or thoughts what is going on? We are considering reporting it to HP so they can update their driver...

 

The dmesg reports

Pid: 869, comm: jbd2/sda2-8 Not tainted 2.6.32-279.9.1.el6.x86_64 #1 HP ProLiant DL360p Gen8
RIP: 0010:[<ffffffff81113eff>]  [<ffffffff81113eff>] find_get_pages_tag+0x6f/0x120
RSP: 0018:ffff881013e3daf0  EFLAGS: 00000297
RAX: ffff881e57eef6f8 RBX: ffff881013e3db40 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffffea006c0039a8
RBP: ffffffff8100bc0e R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000000e R11: ffff881e57eef908 R12: 0000000000000000
R13: 0000000000000018 R14: ffff881013e3da68 R15: 0000000000000202
FS:  0000000000000000(0000) GS:ffff880061600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0018 ES: 0018 CR0: 000000008005003b
CR2: 00007f2e2cbab140 CR3: 0000002017d97000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process jbd2/sda2-8 (pid: 869, threadinfo ffff881013e3c000, task ffff8810165c3540)
Stack:
 0000000000000012 ffff881013e3db28 ffff881fbcf761e8 ffff881fbcf761e8
<d> ffff881013e3db60 ffff881013e3dbd0 ffff881013e3dcb0 ffff880df80fe6e0
<d> ffff881fbcf76310 0000000000000000 ffff881013e3db60 ffffffff8112ab35
Call Trace:
 [<ffffffff8112ab35>] ? pagevec_lookup_tag+0x25/0x40
 [<ffffffff81129907>] ? write_cache_pages+0x117/0x4a0
 [<ffffffff81054a54>] ? check_preempt_wakeup+0x1a4/0x260
 [<ffffffff81128610>] ? __writepage+0x0/0x40
 [<ffffffff8106010c>] ? try_to_wake_up+0x24c/0x3e0
 [<ffffffff81129cb4>] ? generic_writepages+0x24/0x30
 [<ffffffffa00884e7>] ? journal_submit_inode_data_buffers+0x47/0x50 [jbd2]
 [<ffffffffa00889f5>] ? jbd2_journal_commit_transaction+0x375/0x14b0 [jbd2]
 [<ffffffff810096f0>] ? __switch_to+0xd0/0x320
 [<ffffffff8107e08c>] ? lock_timer_base+0x3c/0x70
 [<ffffffff81092150>] ? autoremove_wake_function+0x0/0x40
 [<ffffffffa008ef78>] ? kjournald2+0xb8/0x220 [jbd2]
 [<ffffffff81092150>] ? autoremove_wake_function+0x0/0x40
 [<ffffffffa008eec0>] ? kjournald2+0x0/0x220 [jbd2]
 [<ffffffff81091de6>] ? kthread+0x96/0xa0
 [<ffffffff8100c14a>] ? child_rip+0xa/0x20
 [<ffffffff81091d50>] ? kthread+0x0/0xa0
 [<ffffffff8100c140>] ? child_rip+0x0/0x20
Code: 0f 84 b0 00 00 00 49 89 df 31 d2 31 c9 0f 1f 80 00 00 00 00 49 8b 07 48 8b 38 40 f6 c7 01 75 c6 48 85 ff 74 3c 48 83 ff ff 74 bb <44> 8b 47 08 45 85 c0 74 e3 45 8d 58 01 49 63 c0 4c 8d 57 08 4d 
Call Trace:
 [<ffffffff8112ab35>] ? pagevec_lookup_tag+0x25/0x40
 [<ffffffff81129907>] ? write_cache_pages+0x117/0x4a0
 [<ffffffff81054a54>] ? check_preempt_wakeup+0x1a4/0x260
 [<ffffffff81128610>] ? __writepage+0x0/0x40
 [<ffffffff8106010c>] ? try_to_wake_up+0x24c/0x3e0
 [<ffffffff81129cb4>] ? generic_writepages+0x24/0x30
 [<ffffffffa00884e7>] ? journal_submit_inode_data_buffers+0x47/0x50 [jbd2]
 [<ffffffffa00889f5>] ? jbd2_journal_commit_transaction+0x375/0x14b0 [jbd2]
 [<ffffffff810096f0>] ? __switch_to+0xd0/0x320
 [<ffffffff8107e08c>] ? lock_timer_base+0x3c/0x70
 [<ffffffff81092150>] ? autoremove_wake_function+0x0/0x40
 [<ffffffffa008ef78>] ? kjournald2+0xb8/0x220 [jbd2]
 [<ffffffff81092150>] ? autoremove_wake_function+0x0/0x40
 [<ffffffffa008eec0>] ? kjournald2+0x0/0x220 [jbd2]
 [<ffffffff81091de6>] ? kthread+0x96/0xa0
 [<ffffffff8100c14a>] ? child_rip+0xa/0x20
 [<ffffffff81091d50>] ? kthread+0x0/0xa0
 [<ffffffff8100c140>] ? child_rip+0x0/0x20