Hey guys,

I got a really wired bug that shows skb_over_panic when
ixgbevf_clean_rx_irq calls skb_put(skb, len). In normal case, the
packet length (len) should be less than my mtu (1500), and skb_put
works fine. I have added the memory barrier patch discussed at
"http://www.mail-archive.com/[email protected]/msg02915.html";
but still the same.

BTW, this BUG happens *only* when I just boot up my VM with Linux
2.6.38 kernel, as soon as  I loaded the VF driver, the very first few
packets trigger this BUG. When VM crashes and I reboot it again, the
VF driver works perfectly fine and this BUG never happens!

Could someone give me some hints about this issue?

Thanks!
William (Cheng-Chun Tu)

Messages:
[  162.857652] ixgbevf_clean_rx_irq: packet length:55579
[  162.858513] skb_over_panic: text:ffffffffa018f35e len:55579
put:55579 head:ffffc90001913800 data:ffffc90001913840 tail:0xd95b
end:0x640 dev:eth1
[  162.858618] ------------[ cut here ]------------
[  162.858618] kernel BUG at net/core/skbuff.c:127!
[  162.858618] invalid opcode: 0000 [#1] SMP
[  162.858618] last sysfs file: /sys/devices/pci0000:00/0000:00:07.0/uevent
[  162.858618] CPU 0
[  162.858618] Modules linked in: ixgbevf sunrpc ip6t_REJECT
nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6_tables
snd_hda_intel snd_hda_codec snd_hwdep snd_seq snd_seq_device snd_pcm
snd_timer joydev snd soundcore snd_page_alloc i2c_piix4 i2c_core
microcode virtio_balloon virtio_net ipv6 virtio_blk [last unloaded:
ixgbevf]
[  162.858618]
[  162.858618] Pid: 0, comm: swapper Not tainted
2.6.38.6-26.rc1.fc15.x86_64 #1 Bochs Bochs
[  162.858618] RIP: 0010:[<ffffffff813bb3ed>]  [<ffffffff813bb3ed>]
skb_put+0x80/0x87
[  162.858618] RSP: 0018:ffff88003fc03d70  EFLAGS: 00010286
[  162.858618] RAX: 000000000000009a RBX: ffff8800374c0a00 RCX: 0000000000000879
[  162.858618] RDX: 0000000000000000 RSI: 0000000000000046 RDI: 0000000000000246
[  162.858618] RBP: ffff88003fc03d90 R08: 0000000000000100 R09: ffffffff81b3a300
[  162.858618] R10: 0000ffff00066c0a R11: 0000000000000003 R12: ffff88003aa976c0
[  162.858618] R13: ffff88003a349900 R14: ffffc900005987a8 R15: ffffc90001900230
[  162.858618] FS:  0000000000000000(0000) GS:ffff88003fc00000(0000)
knlGS:0000000000000000
[  162.858618] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
[  162.858618] CR2: 00007f017e4bb000 CR3: 000000003102b000 CR4: 00000000000006f0
[  162.858618] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  162.858618] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  162.858618] Process swapper (pid: 0, threadinfo ffffffff81a00000,
task ffffffff81a0b020)
[  162.858618] Stack:
[  162.858618]  000000000000d95b 0000000000000640 ffff88003aa97000
ffff8800374c0a00
[  162.858618]  ffff88003fc03e20 ffffffffa018f35e ffff88000000d91b
0000000100000000
[  162.858618]  ffff8800a0c1ab43 ffff88003105d6c8 000000403fc03dd0
ffff88003fc03e3c
[  162.858618] Call Trace:
[  162.858618]  <IRQ>
[  162.858618]  [<ffffffffa018f35e>] ixgbevf_clean_rx_irq+0x16e/0x48f [ixgbevf]
[  162.858618]  [<ffffffffa018f7ed>] ixgbevf_clean_rxonly+0x58/0xa6 [ixgbevf]
[  162.858618]  [<ffffffff813c496e>] net_rx_action+0xa9/0x1ac
[  162.858618]  [<ffffffff8105ae40>] __do_softirq+0xd2/0x19d
[  162.858618]  [<ffffffff81010150>] ? sched_clock+0x9/0xd
[  162.858618]  [<ffffffff8100aadc>] call_softirq+0x1c/0x30
[  162.858618]  [<ffffffff8100c101>] do_softirq+0x46/0x81
[  162.858618]  [<ffffffff8105afc4>] irq_exit+0x49/0x8b
[  162.858618]  [<ffffffff8147bec6>] do_IRQ+0x8e/0xa5
[  162.858618]  [<ffffffff81475dd3>] ret_from_intr+0x0/0x15

------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
E1000-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/e1000-devel
To learn more about Intel&#174; Ethernet, visit 
http://communities.intel.com/community/wired

Reply via email to