With all those fixes backported we still got a kernel lockup: Apr 21 11:55:25 kernel: [992864.965769] Pid: 0, comm: swapper/0 Tainted: P C O 3.2.0-77-generic #112hf79117v20150224b1-Ubuntu Apr 21 11:55:25 kernel: [992864.965772] Call Trace: Apr 21 11:55:25 kernel: [992864.965773] <IRQ> [<ffffffff8106845f>] warn_slowpath_common+0x7f/0xc0 Apr 21 11:55:25 kernel: [992864.965786] [<ffffffff8104f624>] ? __enqueue_entity+0x74/0x80 Apr 21 11:55:25 kernel: [992864.965790] [<ffffffff81068556>] warn_slowpath_fmt+0x46/0x50 Apr 21 11:55:25 kernel: [992864.965794] [<ffffffff81025712>] ? x86_pmu_enable+0x1f2/0x270 Apr 21 11:55:25 kernel: [992864.965800] [<ffffffff81568e0a>] dev_watchdog+0x25a/0x270 Apr 21 11:55:25 kernel: [992864.965805] [<ffffffff811133f0>] ? perf_rotate_context+0x110/0x220 Apr 21 11:55:25 kernel: [992864.965809] [<ffffffff81568bb0>] ? qdisc_reset+0x50/0x50 Apr 21 11:55:25 kernel: [992864.965813] [<ffffffff81568bb0>] ? qdisc_reset+0x50/0x50 Apr 21 11:55:25 kernel: [992864.965819] [<ffffffff81077466>] call_timer_fn+0x46/0x160 Apr 21 11:55:25 kernel: [992864.965823] [<ffffffff81568bb0>] ? qdisc_reset+0x50/0x50 Apr 21 11:55:25 kernel: [992864.965827] [<ffffffff81078db2>] run_timer_softirq+0x132/0x2a0 Apr 21 11:55:25 kernel: [992864.965833] [<ffffffff81096675>] ? ktime_get+0x65/0xe0 Apr 21 11:55:25 kernel: [992864.965836] [<ffffffff8106fcf8>] __do_softirq+0xa8/0x210 Apr 21 11:55:25 kernel: [992864.965841] [<ffffffff8109d714>] ? tick_program_event+0x24/0x30 Apr 21 11:55:25 kernel: [992864.965845] [<ffffffff8166f06c>] call_softirq+0x1c/0x30 Apr 21 11:55:25 kernel: [992864.965851] [<ffffffff810164e5>] do_softirq+0x65/0xa0 Apr 21 11:55:25 kernel: [992864.965854] [<ffffffff810700de>] irq_exit+0x8e/0xb0 Apr 21 11:55:25 kernel: [992864.965858] [<ffffffff8166fa1e>] smp_apic_timer_interrupt+0x6e/0x99 Apr 21 11:55:25 kernel: [992864.965863] [<ffffffff8166d8de>] apic_timer_interrupt+0x6e/0x80 Apr 21 11:55:25 kernel: [992864.965865] <EOI> [<ffffffff8109c184>] ? clockevents_program_event+0x74/0x100 Apr 21 11:55:25 kernel: [992864.965873] [<ffffffff81371a5d>] ? intel_idle+0xed/0x150 Apr 21 11:55:25 kernel: [992864.965877] [<ffffffff81371a3f>] ? intel_idle+0xcf/0x150 Apr 21 11:55:25 kernel: [992864.965883] [<ffffffff8150e921>] cpuidle_idle_call+0xc1/0x290 Apr 21 11:55:25 kernel: [992864.965887] [<ffffffff8101322a>] cpu_idle+0xca/0x120 Apr 21 11:55:25 kernel: [992864.965892] [<ffffffff8162af5e>] rest_init+0x72/0x74 Apr 21 11:55:25 kernel: [992864.965897] [<ffffffff81cfbc0b>] start_kernel+0x3ba/0x3c7 Apr 21 11:55:25 kernel: [992864.965902] [<ffffffff81cfb388>] x86_64_start_reservations+0x132/0x136 Apr 21 11:55:25 kernel: [992864.965907] [<ffffffff81cfb140>] ? early_idt_handlers+0x140/0x140 Apr 21 11:55:25 kernel: [992864.965911] [<ffffffff81cfb459>] x86_64_start_kernel+0xcd/0xdc Apr 21 11:55:25 kernel: [992864.965914] ---[ end trace f20333a4474e470d ]--- Apr 21 11:55:25 kernel: [992864.965930] e1000e 0000:00:19.0: eth0: Reset adapter Apr 21 11:55:29 kernel: [992868.720990] e1000e: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: Rx/Tx
It looks like network interface was restored after some time but I asked for a kernel dump and more information regarding the network topology. ** Tags removed: verification-needed-precise ** Tags added: cts verification-failed-precise -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1425333 Title: Precise kernel lockup with Intel Corporation 82579LM network interfaces To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1425333/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs