Hey guys, I got a really wired bug that shows skb_over_panic when ixgbevf_clean_rx_irq calls skb_put(skb, len). In normal case, the packet length (len) should be less than my mtu (1500), and skb_put works fine. I have added the memory barrier patch discussed at "http://www.mail-archive.com/[email protected]/msg02915.html" but still the same.
BTW, this BUG happens *only* when I just boot up my VM with Linux 2.6.38 kernel, as soon as I loaded the VF driver, the very first few packets trigger this BUG. When VM crashes and I reboot it again, the VF driver works perfectly fine and this BUG never happens! Could someone give me some hints about this issue? Thanks! William (Cheng-Chun Tu) Messages: [ 162.857652] ixgbevf_clean_rx_irq: packet length:55579 [ 162.858513] skb_over_panic: text:ffffffffa018f35e len:55579 put:55579 head:ffffc90001913800 data:ffffc90001913840 tail:0xd95b end:0x640 dev:eth1 [ 162.858618] ------------[ cut here ]------------ [ 162.858618] kernel BUG at net/core/skbuff.c:127! [ 162.858618] invalid opcode: 0000 [#1] SMP [ 162.858618] last sysfs file: /sys/devices/pci0000:00/0000:00:07.0/uevent [ 162.858618] CPU 0 [ 162.858618] Modules linked in: ixgbevf sunrpc ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm snd_timer joydev snd soundcore snd_page_alloc i2c_piix4 i2c_core microcode virtio_balloon virtio_net ipv6 virtio_blk [last unloaded: ixgbevf] [ 162.858618] [ 162.858618] Pid: 0, comm: swapper Not tainted 2.6.38.6-26.rc1.fc15.x86_64 #1 Bochs Bochs [ 162.858618] RIP: 0010:[<ffffffff813bb3ed>] [<ffffffff813bb3ed>] skb_put+0x80/0x87 [ 162.858618] RSP: 0018:ffff88003fc03d70 EFLAGS: 00010286 [ 162.858618] RAX: 000000000000009a RBX: ffff8800374c0a00 RCX: 0000000000000879 [ 162.858618] RDX: 0000000000000000 RSI: 0000000000000046 RDI: 0000000000000246 [ 162.858618] RBP: ffff88003fc03d90 R08: 0000000000000100 R09: ffffffff81b3a300 [ 162.858618] R10: 0000ffff00066c0a R11: 0000000000000003 R12: ffff88003aa976c0 [ 162.858618] R13: ffff88003a349900 R14: ffffc900005987a8 R15: ffffc90001900230 [ 162.858618] FS: 0000000000000000(0000) GS:ffff88003fc00000(0000) knlGS:0000000000000000 [ 162.858618] CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b [ 162.858618] CR2: 00007f017e4bb000 CR3: 000000003102b000 CR4: 00000000000006f0 [ 162.858618] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 162.858618] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 162.858618] Process swapper (pid: 0, threadinfo ffffffff81a00000, task ffffffff81a0b020) [ 162.858618] Stack: [ 162.858618] 000000000000d95b 0000000000000640 ffff88003aa97000 ffff8800374c0a00 [ 162.858618] ffff88003fc03e20 ffffffffa018f35e ffff88000000d91b 0000000100000000 [ 162.858618] ffff8800a0c1ab43 ffff88003105d6c8 000000403fc03dd0 ffff88003fc03e3c [ 162.858618] Call Trace: [ 162.858618] <IRQ> [ 162.858618] [<ffffffffa018f35e>] ixgbevf_clean_rx_irq+0x16e/0x48f [ixgbevf] [ 162.858618] [<ffffffffa018f7ed>] ixgbevf_clean_rxonly+0x58/0xa6 [ixgbevf] [ 162.858618] [<ffffffff813c496e>] net_rx_action+0xa9/0x1ac [ 162.858618] [<ffffffff8105ae40>] __do_softirq+0xd2/0x19d [ 162.858618] [<ffffffff81010150>] ? sched_clock+0x9/0xd [ 162.858618] [<ffffffff8100aadc>] call_softirq+0x1c/0x30 [ 162.858618] [<ffffffff8100c101>] do_softirq+0x46/0x81 [ 162.858618] [<ffffffff8105afc4>] irq_exit+0x49/0x8b [ 162.858618] [<ffffffff8147bec6>] do_IRQ+0x8e/0xa5 [ 162.858618] [<ffffffff81475dd3>] ret_from_intr+0x0/0x15 ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ E1000-devel mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/e1000-devel To learn more about Intel® Ethernet, visit http://communities.intel.com/community/wired
