* [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue)
@ 2014-08-29 9:31 Sitsofe Wheeler
2014-08-29 17:13 ` KY Srinivasan
2014-08-29 17:18 ` KY Srinivasan
0 siblings, 2 replies; 4+ messages in thread
From: Sitsofe Wheeler @ 2014-08-29 9:31 UTC (permalink / raw)
To: Dexuan Cui
Cc: Greg Kroah-Hartman, Haiyang Zhang, linux-kernel@vger.kernel.org,
Daniel Borkmann, netdev, devel@linuxdriverproject.org,
David Miller
While booting a 10 vcpu system with a post v3.17-rc2 kernel with the
"Drivers: hv: vmbus: Eliminate calls to BUG_ON()", "Drivers: hv: vmbus:
Miscellaneous cleanup" patches and debugging/verification config options
on I'm seeing the following:
[ 31.570860] EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null)
[ 31.799558] systemd-journald[367]: Received request to flush runtime journal from PID 1
[ 32.679811] hv_utils: KVP: user-mode registering done.
[ 39.826001] hv_netvsc vmbus_0_15: net device safe to remove
[ 39.868109] hv_netvsc: hv_netvsc channel opened successfully
[ 41.585834] hv_netvsc vmbus_0_15: Send section size: 6144, Section count:2560
[ 41.644187] hv_netvsc vmbus_0_15: Device MAC 00:15:5d:6f:02:a5 link state up
[ 43.174058] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb
[ 43.174956] IP: [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 43.174956] PGD 2db0067 PUD 207dc0067 PMD 207c12067 PTE 80000001f5bc7060
[ 43.174956] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
[ 43.174956] CPU: 7 PID: 640 Comm: arping Not tainted 3.17.0-rc2.x86_64-00096-g9c6196f #137
[ 43.174956] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 43.174956] task: ffff8800ebc56090 ti: ffff8800ecf04000 task.ti: ffff8800ecf04000
[ 43.174956] RIP: 0010:[<ffffffff814e701d>] [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 43.174956] RSP: 0018:ffff8800ecf07c60 EFLAGS: 00010206
[ 43.174956] RAX: 0000000000000000 RBX: ffff8800f13f0000 RCX: 000000000000ffff
[ 43.174956] RDX: ffff8801f5bb7cb0 RSI: ffff8800ecf47a80 RDI: ffff8800f13f0000
[ 43.174956] RBP: ffff8800ecf07c88 R08: 000000000000002a R09: 0000000000000000
[ 43.174956] R10: ffff8801f99b2290 R11: 000000000000000a R12: ffff8800ecf47a80
[ 43.174956] R13: 0000000000000000 R14: ffff8800ecfb1bd8 R15: ffff8800ecf47a80
[ 43.174956] FS: 00007f69fdf31740(0000) GS:ffff880206ce0000(0000) knlGS:0000000000000000
[ 43.174956] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 43.174956] CR2: ffff8801f5bc7cbb CR3: 00000000ecfc9000 CR4: 00000000000406e0
[ 43.174956] Stack:
[ 43.174956] ffffffff8167f651 ffff8800f13f0000 000000000000001c 0000000000000000
[ 43.174956] ffff8800ecfb1bd8 ffff8800ecf07d48 ffffffff816833bc ffff8800ebc567d0
[ 43.174956] 0000000000000000 ffff8800ecf07d68 0000000000000046 000000000000001c
[ 43.174956] Call Trace:
[ 43.174956] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 43.174956] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 43.174956] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 43.174956] [<ffffffff815b4368>] sock_sendmsg+0x88/0xb0
[ 43.174956] [<ffffffff81185443>] ? might_fault+0xa3/0xb0
[ 43.174956] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 43.174956] [<ffffffff815b449e>] SYSC_sendto+0x10e/0x150
[ 43.174956] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 43.174956] [<ffffffff816a32d5>] ? sysret_check+0x22/0x5d
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff8139c09e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 43.174956] [<ffffffff815b547e>] SyS_sendto+0xe/0x10
[ 43.174956] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 43.174956] Code: 00 4d 85 d2 0f 84 1c 01 00 00 44 8b 9f 8c 03 00 00 31 c0 41 83 fb 01 0f 86 1b 01 00 00 0f b7 8e b4 00 00 00 48 8b 96 c0 00 00 00 <66> 83 7c 0a 0c 08 0f 85 01 01 00 00 55 48 89 e5 41 55 41 54 53
[ 43.174956] RIP [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 43.174956] RSP <ffff8800ecf07c60>
[ 43.174956] CR2: ffff8801f5bc7cbb
[ 43.174956] ---[ end trace d476efa8244dbdc1 ]---
[ 43.174956] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:41
[ 43.174956] in_atomic(): 0, irqs_disabled(): 1, pid: 640, name: arping
[ 43.174956] INFO: lockdep is turned off.
[ 43.174956] irq event stamp: 5710
[ 43.174956] hardirqs last enabled at (5709): [<ffffffff81698cb4>] __slab_alloc+0x50b/0x576
[ 43.174956] hardirqs last disabled at (5710): [<ffffffff816a5326>] error_sti+0x5/0x6
[ 43.174956] softirqs last enabled at (5662): [<ffffffff815cedb0>] __dev_queue_xmit+0x5b0/0x690
[ 43.174956] softirqs last disabled at (5628): [<ffffffff815ce858>] __dev_queue_xmit+0x58/0x690
[ 43.174956] CPU: 7 PID: 640 Comm: arping Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f #137
[ 43.174956] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 43.174956] 0000000000000046 ffff8800ecf078e0 ffffffff8169a70b ffff8800ebc56090
[ 43.174956] ffff8800ecf078f8 ffffffff8109ec65 ffff8801f35eacd8 ffff8800ecf07918
[ 43.174956] ffffffff816a0d44 ffffffff81090f38 ffff8800ebc56090 ffff8800ecf07938
[ 43.174956] Call Trace:
[ 43.174956] [<ffffffff8169a70b>] dump_stack+0x4d/0x66
[ 43.174956] [<ffffffff8109ec65>] __might_sleep+0x115/0x120
[ 43.174956] [<ffffffff816a0d44>] down_read+0x24/0x70
[ 43.174956] [<ffffffff81090f38>] ? __validate_process_creds+0xd8/0xf0
[ 43.174956] [<ffffffff8107f9d4>] exit_signals+0x24/0x140
[ 43.174956] [<ffffffff810737d9>] do_exit+0x129/0xa20
[ 43.174956] [<ffffffff810c4bcc>] ? kmsg_dump+0xfc/0x110
[ 43.174956] [<ffffffff810c4af5>] ? kmsg_dump+0x25/0x110
[ 43.174956] [<ffffffff81006348>] oops_end+0xa8/0xc0
[ 43.174956] [<ffffffff81695288>] no_context+0x322/0x36b
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff8169549c>] __bad_area_nosemaphore+0x1cb/0x1e8
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff816954cc>] bad_area_nosemaphore+0x13/0x15
[ 43.174956] [<ffffffff8104040e>] __do_page_fault+0x1ee/0x4f0
[ 43.174956] [<ffffffff815bcd6e>] ? __alloc_skb+0x4e/0x240
[ 43.174956] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 43.174956] [<ffffffff8139c0dd>] ? trace_hardirqs_off_thunk+0x3a/0x3c
[ 43.174956] [<ffffffff81040762>] do_page_fault+0x22/0x30
[ 43.174956] [<ffffffff816a5108>] page_fault+0x28/0x30
[ 43.174956] [<ffffffff814e701d>] ? netvsc_select_queue+0x3d/0x150
[ 43.174956] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 43.174956] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 43.174956] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 43.174956] [<ffffffff815b4368>] sock_sendmsg+0x88/0xb0
[ 43.174956] [<ffffffff81185443>] ? might_fault+0xa3/0xb0
[ 43.174956] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 43.174956] [<ffffffff815b449e>] SYSC_sendto+0x10e/0x150
[ 43.174956] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 43.174956] [<ffffffff816a32d5>] ? sysret_check+0x22/0x5d
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff8139c09e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 43.174956] [<ffffffff815b547e>] SyS_sendto+0xe/0x10
[ 43.174956] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 43.174956] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:41
[ 43.174956] in_atomic(): 0, irqs_disabled(): 1, pid: 640, name: arping
[ 43.174956] INFO: lockdep is turned off.
[ 43.174956] irq event stamp: 5710
[ 43.174956] hardirqs last enabled at (5709): [<ffffffff81698cb4>] __slab_alloc+0x50b/0x576
[ 43.174956] hardirqs last disabled at (5710): [<ffffffff816a5326>] error_sti+0x5/0x6
[ 43.174956] softirqs last enabled at (5662): [<ffffffff815cedb0>] __dev_queue_xmit+0x5b0/0x690
[ 43.174956] softirqs last disabled at (5628): [<ffffffff815ce858>] __dev_queue_xmit+0x58/0x690
[ 43.174956] CPU: 7 PID: 640 Comm: arping Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f #137
[ 43.174956] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 43.174956] ffff8800ebc56090 ffff8800ecf078d0 ffffffff8169a70b ffff8800ebc56090
[ 43.174956] ffff8800ecf078e8 ffffffff8109ec65 ffff8801f3afba18 ffff8800ecf07908
[ 43.174956] ffffffff816a0d44 ffffffff810d5cb1 ffff8801f35ea880 ffff8800ecf07938
[ 43.174956] Call Trace:
[ 43.174956] [<ffffffff8169a70b>] dump_stack+0x4d/0x66
[ 43.174956] [<ffffffff8109ec65>] __might_sleep+0x115/0x120
[ 43.174956] [<ffffffff816a0d44>] down_read+0x24/0x70
[ 43.174956] [<ffffffff810d5cb1>] ? hrtimer_try_to_cancel+0xf1/0x100
[ 43.174956] [<ffffffff810ec612>] acct_collect+0x52/0x1c0
[ 43.174956] [<ffffffff81074082>] do_exit+0x9d2/0xa20
[ 43.174956] [<ffffffff810c4bcc>] ? kmsg_dump+0xfc/0x110
[ 43.174956] [<ffffffff810c4af5>] ? kmsg_dump+0x25/0x110
[ 43.174956] [<ffffffff81006348>] oops_end+0xa8/0xc0
[ 43.174956] [<ffffffff81695288>] no_context+0x322/0x36b
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff8169549c>] __bad_area_nosemaphore+0x1cb/0x1e8
[ 43.174956] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 43.174956] [<ffffffff816954cc>] bad_area_nosemaphore+0x13/0x15
[ 43.174956] [<ffffffff8104040e>] __do_page_fault+0x1ee/0x4f0
[ 43.174956] [<ffffffff815bcd6e>] ? __alloc_skb+0x4e/0x240
[ 43.174956] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 43.174956] [<ffffffff8139c0dd>] ? trace_hardirqs_off_thunk+0x3a/0x3c
[ 43.174956] [<ffffffff81040762>] do_page_fault+0x22/0x30
[ 43.174956] [<ffffffff816a5108>] page_fault+0x28/0x30
[ 43.174956] [<ffffffff814e701d>] ? netvsc_select_queue+0x3d/0x150
[ 43.174956] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 43.174956] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 43.174956] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 43.174956] [<ffffffff815b4368>] sock_sendmsg+0x88/0xb0
[ 43.174956] [<ffffffff81185443>] ? might_fault+0xa3/0xb0
[ 43.174956] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 48.347217] [<ffffffff815b449e>] SYSC_sendto+0x10e/0x150
[ 48.347217] [<ffffffff811853fa>] ? might_fault+0x5a/0xb0
[ 48.347217] [<ffffffff816a32d5>] ? sysret_check+0x22/0x5d
[ 48.347217] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 48.347217] [<ffffffff8139c09e>] ? trace_hardirqs_on_thunk+0x3a/0x3f
[ 48.347217] [<ffffffff815b547e>] SyS_sendto+0xe/0x10
[ 48.347217] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 48.663676] BUG: unable to handle kernel paging request at ffff8800ee453a23
[ 48.708188] IP:
[ 48.708188] [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 48.708188] PGD 2db0067
[ 48.708188] PUD 2075be067
[ 48.708188] PMD 20744b067
[ 48.708188] PTE 80000000ee453060
[ 48.708188] Oops: 0000 [#2]
[ 48.708188] SMP
[ 48.708188] DEBUG_PAGEALLOC
[ 48.708188] CPU: 7 PID: 609 Comm: dhclient Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f #137
[ 48.708188] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 48.708188] task: ffff8801f9946090 ti: ffff8800ee468000 task.ti: ffff8800ee468000
[ 48.708188] RIP: 0010:[<ffffffff814e701d>]
[ 48.708188] [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 48.708188] RSP: 0018:ffff8800ee46bcd8 EFLAGS: 00010206
[ 48.708188] RAX: 0000000000000000 RBX: ffff8800f13f0000 RCX: 000000000000ffff
[ 48.708188] RDX: ffff8800ee443a18 RSI: ffff8800ecf446c0 RDI: ffff8800f13f0000
[ 48.708188] RBP: ffff8800ee46bd00 R08: 0000000000000156 R09: 0000000000000000
[ 48.708188] R10: ffff8801f99b2290 R11: 000000000000000a R12: ffff8800ecf446c0
[ 48.708188] R13: 0000000000000000 R14: ffff8800ecfb0948 R15: ffff8800ecf446c0
[ 48.708188] FS: 00007f5b90b22880(0000) GS:ffff880206ce0000(0000) knlGS:0000000000000000
[ 48.708188] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 48.708188] CR2: ffff8800ee453a23 CR3: 00000000ec783000 CR4: 00000000000406e0
[ 48.708188] Stack:
[ 48.708188] ffffffff8167f651
[ 48.708188] ffff8800f13f0000
[ 48.708188] 0000000000000156
[ 48.708188] 0000000000000000
[ 48.708188] ffff8800ecfb0948
[ 48.708188] ffff8800ee46bdc0
[ 48.708188] ffffffff816833bc
[ 48.708188] ffffffff00000000
[ 48.708188] 00000000ffffffff
[ 48.708188] ffff8800ee46bd58
[ 48.708188] ffff8800f3354440
[ 48.708188] 0000000000000156
[ 48.708188] Call Trace:
[ 48.708188] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 48.708188] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 48.708188] [<ffffffff815b357b>] sock_aio_write+0xfb/0x120
[ 48.708188] [<ffffffff811c262a>] do_sync_write+0x5a/0x80
[ 48.708188] [<ffffffff811c2925>] vfs_write+0xe5/0x1d0
[ 48.708188] [<ffffffff811c2b09>] SyS_write+0x49/0xb0
[ 48.708188] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 48.708188] Code: 00 4d 85 d2 0f 84 1c 01 00 00 44 8b 9f 8c 03 00 00 31 c0 41 83 fb 01 0f 86 1b 01 00 00 0f b7 8e b4 00 00 00 48 8b 96 c0 00 00 00 <66> 83 7c 0a 0c 08 0f 85 01 01 00 00 55 48 89 e5 41 55 41 54 53
[ 48.708188] RIP [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 48.708188] RSP <ffff8800ee46bcd8>
[ 48.708188] CR2: ffff8800ee453a23
[ 48.708188] ---[ end trace d476efa8244dbdc2 ]---
[ 48.708188] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:41
[ 48.708188] in_atomic(): 0, irqs_disabled(): 1, pid: 609, name: dhclient
[ 48.708188] INFO: lockdep is turned off.
[ 48.708188] irq event stamp: 97752
[ 48.708188] hardirqs last enabled at (97751): [<ffffffff816a263d>] _raw_spin_unlock_irqrestore+0x4d/0x70
[ 48.708188] hardirqs last disabled at (97752): [<ffffffff816a251d>] _raw_spin_lock_irq+0x1d/0x60
[ 48.708188] softirqs last enabled at (97356): [<ffffffff810753f8>] __do_softirq+0x278/0x320
[ 48.708188] softirqs last disabled at (97341): [<ffffffff81075768>] irq_exit+0x58/0xc0
[ 48.708188] CPU: 7 PID: 609 Comm: dhclient Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f #137
[ 48.708188] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 48.708188] 0000000000000046 ffff8800ee46b950 ffffffff8169a70b ffff8801f9946090
[ 48.708188] ffff8800ee46b968 ffffffff8109ec65 ffff8801f35e9898 ffff8800ee46b988
[ 48.708188] ffffffff816a0d44 ffffffff81090f38 ffff8801f9946090 ffff8800ee46b9a8
[ 48.708188] Call Trace:
[ 48.708188] [<ffffffff8169a70b>] dump_stack+0x4d/0x66
[ 48.708188] [<ffffffff8109ec65>] __might_sleep+0x115/0x120
[ 48.708188] [<ffffffff816a0d44>] down_read+0x24/0x70
[ 48.708188] [<ffffffff81090f38>] ? __validate_process_creds+0xd8/0xf0
[ 48.708188] [<ffffffff8107f9d4>] exit_signals+0x24/0x140
[ 48.708188] [<ffffffff810737d9>] do_exit+0x129/0xa20
[ 48.708188] [<ffffffff810c4bcc>] ? kmsg_dump+0xfc/0x110
[ 48.708188] [<ffffffff810c4af5>] ? kmsg_dump+0x25/0x110
[ 48.708188] [<ffffffff81006348>] oops_end+0xa8/0xc0
[ 48.708188] [<ffffffff81695288>] no_context+0x322/0x36b
[ 48.708188] [<ffffffff8169549c>] __bad_area_nosemaphore+0x1cb/0x1e8
[ 48.708188] [<ffffffff816954cc>] bad_area_nosemaphore+0x13/0x15
[ 48.708188] [<ffffffff8104040e>] __do_page_fault+0x1ee/0x4f0
[ 48.708188] [<ffffffff815bcd6e>] ? __alloc_skb+0x4e/0x240
[ 48.708188] [<ffffffff811a990e>] ? __kmalloc_node_track_caller+0x15e/0x2f0
[ 48.708188] [<ffffffff810b9b0d>] ? trace_hardirqs_off+0xd/0x10
[ 48.708188] [<ffffffff8139c0dd>] ? trace_hardirqs_off_thunk+0x3a/0x3c
[ 48.708188] [<ffffffff81040762>] do_page_fault+0x22/0x30
[ 48.708188] [<ffffffff816a5108>] page_fault+0x28/0x30
[ 48.708188] [<ffffffff814e701d>] ? netvsc_select_queue+0x3d/0x150
[ 48.708188] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 48.708188] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 48.708188] [<ffffffff815b357b>] sock_aio_write+0xfb/0x120
[ 48.708188] [<ffffffff811c262a>] do_sync_write+0x5a/0x80
[ 48.708188] [<ffffffff811c2925>] vfs_write+0xe5/0x1d0
[ 48.708188] [<ffffffff811c2b09>] SyS_write+0x49/0xb0
[ 48.708188] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
In https://lkml.org/lkml/2014/8/19/133 (Re: BUG: unable to handle kernel
paging request at ffff8801f3febe63 (netvsc_select_queue)) there is the
following:
On Tue, Aug 19, 2014 at 10:57:30AM +0200, Daniel Borkmann wrote:
>
> Hmm, I am not really familiar with hyper-v, but it seems 5b54dac856cb
> ("hyperv: Add support for virtual Receive Side Scaling (vRSS)") has
> been introduced after 0fd5d57ba345 ("packet: check for
> ndo_select_queue during queue selection").
>
> arping seems to send a raw packet (AF_PACKET) via normal
> packet_sendmsg() out and when doing the queue selection in
> packet_pick_tx_queue(), we discover that the device has
> ndo_select_queue implemented, so we respect that and call into it. In
> netvsc_select_queue(), the fallback of __packet_pick_tx_queue() is not
> being invoked here.
>
> Given that the next log message is "hv_netvsc vmbus_0_15: net device
> safe to remove" ... could it be that your back pointer to the device
> context (the actual struct hv_device) is already invalid when you try
> to get hv_get_drvdata(hdev) as it's sort of decoupled from
> netdev_priv(ndev) ? (Just a wild guess ...)
So I'm guessing this is the same issue.
--
Sitsofe | http://sucs.org/~sits/
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue)
2014-08-29 9:31 [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue) Sitsofe Wheeler
@ 2014-08-29 17:13 ` KY Srinivasan
2014-08-29 17:18 ` KY Srinivasan
1 sibling, 0 replies; 4+ messages in thread
From: KY Srinivasan @ 2014-08-29 17:13 UTC (permalink / raw)
To: Sitsofe Wheeler, Dexuan Cui
Cc: Greg Kroah-Hartman, Haiyang Zhang, linux-kernel@vger.kernel.org,
Daniel Borkmann, netdev@vger.kernel.org,
devel@linuxdriverproject.org, David Miller
> -----Original Message-----
> From: Sitsofe Wheeler [mailto:sitsofe@gmail.com]
> Sent: Friday, August 29, 2014 2:32 AM
> To: Dexuan Cui
> Cc: KY Srinivasan; Greg Kroah-Hartman; Haiyang Zhang;
> devel@linuxdriverproject.org; linux-kernel@vger.kernel.org;
> netdev@vger.kernel.org; David Miller; Daniel Borkmann
> Subject: [hyperv] BUG: unable to handle kernel paging request at
> ffff8801f5bc7cbb (netvsc_select_queue)
>
> While booting a 10 vcpu system with a post v3.17-rc2 kernel with the
> "Drivers: hv: vmbus: Eliminate calls to BUG_ON()", "Drivers: hv: vmbus:
> Miscellaneous cleanup" patches and debugging/verification config options on
> I'm seeing the following:
Were you changing the MTU when this occurred?
Regards,
K. Y
^ permalink raw reply [flat|nested] 4+ messages in thread
* RE: [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue)
2014-08-29 9:31 [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue) Sitsofe Wheeler
2014-08-29 17:13 ` KY Srinivasan
@ 2014-08-29 17:18 ` KY Srinivasan
2014-08-29 19:49 ` Sitsofe Wheeler
1 sibling, 1 reply; 4+ messages in thread
From: KY Srinivasan @ 2014-08-29 17:18 UTC (permalink / raw)
To: Sitsofe Wheeler, Dexuan Cui
Cc: Greg Kroah-Hartman, Haiyang Zhang, devel@linuxdriverproject.org,
linux-kernel@vger.kernel.org, netdev@vger.kernel.org,
David Miller, Daniel Borkmann
> -----Original Message-----
> From: Sitsofe Wheeler [mailto:sitsofe@gmail.com]
> Sent: Friday, August 29, 2014 2:32 AM
> To: Dexuan Cui
> Cc: KY Srinivasan; Greg Kroah-Hartman; Haiyang Zhang;
> devel@linuxdriverproject.org; linux-kernel@vger.kernel.org;
> netdev@vger.kernel.org; David Miller; Daniel Borkmann
> Subject: [hyperv] BUG: unable to handle kernel paging request at
> ffff8801f5bc7cbb (netvsc_select_queue)
>
> While booting a 10 vcpu system with a post v3.17-rc2 kernel with the
> "Drivers: hv: vmbus: Eliminate calls to BUG_ON()", "Drivers: hv: vmbus:
> Miscellaneous cleanup" patches and debugging/verification config options on
> I'm seeing the following:
Sitsofe,
Could you please try the following patch:
>From c8a6a5570f9a7f8b9a2b47f165848e5533091e79 Mon Sep 17 00:00:00 2001
From: K. Y. Srinivasan <kys@microsoft.com>
Date: Fri, 29 Aug 2014 11:18:18 -0700
Subject: [PATCH 1/1] Drivers: net: hyperv: Cleanup netvsc_change_mtu ()
Signed-off-by: K. Y. Srinivasan <kys@microsoft.com>
---
drivers/net/hyperv/netvsc_drv.c | 5 ++++-
1 files changed, 4 insertions(+), 1 deletions(-)
diff --git a/drivers/net/hyperv/netvsc_drv.c b/drivers/net/hyperv/netvsc_drv.c
index a9c5eaa..485f5b7 100644
--- a/drivers/net/hyperv/netvsc_drv.c
+++ b/drivers/net/hyperv/netvsc_drv.c
@@ -696,6 +696,7 @@ static int netvsc_change_mtu(struct net_device *ndev, int mtu)
struct netvsc_device *nvdev = hv_get_drvdata(hdev);
struct netvsc_device_info device_info;
int limit = ETH_DATA_LEN;
+ int ret;
if (nvdev == NULL || nvdev->destroy)
return -ENODEV;
@@ -716,7 +717,9 @@ static int netvsc_change_mtu(struct net_device *ndev, int mtu)
ndevctx->device_ctx = hdev;
hv_set_drvdata(hdev, ndev);
device_info.ring_size = ring_size;
- rndis_filter_device_add(hdev, &device_info);
+ ret = rndis_filter_device_add(hdev, &device_info);
+ if (ret)
+ return ret;
netif_tx_wake_all_queues(ndev);
return 0;
--
1.7.4.1
^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue)
2014-08-29 17:18 ` KY Srinivasan
@ 2014-08-29 19:49 ` Sitsofe Wheeler
0 siblings, 0 replies; 4+ messages in thread
From: Sitsofe Wheeler @ 2014-08-29 19:49 UTC (permalink / raw)
To: KY Srinivasan
Cc: Greg Kroah-Hartman, Haiyang Zhang, linux-kernel@vger.kernel.org,
Daniel Borkmann, netdev@vger.kernel.org,
devel@linuxdriverproject.org, David Miller
On Fri, Aug 29, 2014 at 05:18:51PM +0000, KY Srinivasan wrote:
>
> > -----Original Message-----
> > From: Sitsofe Wheeler [mailto:sitsofe@gmail.com]
> > Sent: Friday, August 29, 2014 2:32 AM
> > To: Dexuan Cui
> > Cc: KY Srinivasan; Greg Kroah-Hartman; Haiyang Zhang;
> > devel@linuxdriverproject.org; linux-kernel@vger.kernel.org;
> > netdev@vger.kernel.org; David Miller; Daniel Borkmann
> > Subject: [hyperv] BUG: unable to handle kernel paging request at
> > ffff8801f5bc7cbb (netvsc_select_queue)
> >
> > While booting a 10 vcpu system with a post v3.17-rc2 kernel with the
> > "Drivers: hv: vmbus: Eliminate calls to BUG_ON()", "Drivers: hv: vmbus:
> > Miscellaneous cleanup" patches and debugging/verification config options on
> > I'm seeing the following:
>
> Could you please try the following patch:
>
> >From c8a6a5570f9a7f8b9a2b47f165848e5533091e79 Mon Sep 17 00:00:00 2001
> From: K. Y. Srinivasan <kys@microsoft.com>
> Date: Fri, 29 Aug 2014 11:18:18 -0700
> Subject: [PATCH 1/1] Drivers: net: hyperv: Cleanup netvsc_change_mtu ()
With this issue I'm just booting but one interface has been configured
to have an MTU of 9000. The guest has three interfaces - one for each of
the two real network cards and one private interface.
Here's what I see with your previous patches and the patch from your
email:
[ 28.340343] psmouse serio1: trackpoint: IBM TrackPoint firmware: 0x01, buttons: 0/0
[ 28.393371] input: TPPS/2 IBM TrackPoint as /devices/platform/i8042/serio1/input/input4
[ 29.511276] EXT4-fs (sda1): re-mounted. Opts: (null)
[ 29.555201] systemd-udevd[362]: starting version 208
[ 30.498472] md: bind<sdc>
[ 30.563501] md: personality for level -1 is not loaded!
[ 30.673633] EXT4-fs (sdb1): mounted filesystem with ordered data mode. Opts: (null)
[ 30.915000] systemd-journald[366]: Received request to flush runtime journal from PID 1
[ 32.050485] hv_utils: KVP: user-mode registering done.
[ 33.574365] BUG: unable to handle kernel paging request at ffff8801f39ba503
[ 33.574588] IP: [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 33.574588] PGD 2db0067 PUD 207dc0067 PMD 207c23067 PTE 80000001f39ba060
[ 33.574588] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC
[ 33.574588] CPU: 3 PID: 543 Comm: dhclient Not tainted 3.17.0-rc2.x86_64-00096-g9c6196f-dirty #138
[ 33.574588] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 33.574588] task: ffff8800ecfce090 ti: ffff8801f9850000 task.ti: ffff8801f9850000
[ 33.574588] RIP: 0010:[<ffffffff814e701d>] [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 33.574588] RSP: 0018:ffff8801f9853cd8 EFLAGS: 00010206
[ 33.574588] RAX: 0000000000000000 RBX: ffff8801f7dfc520 RCX: 000000000000ffff
[ 33.574588] RDX: ffff8801f39aa4f8 RSI: ffff8801f366d200 RDI: ffff8801f7dfc520
[ 33.574588] RBP: ffff8801f9853d00 R08: 0000000000000156 R09: 0000000000000000
[ 33.574588] R10: ffff8801f7dfb3d8 R11: 000000000000000a R12: ffff8801f366d200
[ 33.574588] R13: 0000000000000000 R14: ffff8801f37eb7b0 R15: ffff8801f366d200
[ 33.574588] FS: 00007f19e6182880(0000) GS:ffff880206c60000(0000) knlGS:0000000000000000
[ 33.574588] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 33.574588] CR2: ffff8801f39ba503 CR3: 00000001f3671000 CR4: 00000000000406e0
[ 33.574588] Stack:
[ 33.574588] ffffffff8167f651 ffff8801f7dfc520 0000000000000156 0000000000000000
[ 33.574588] ffff8801f37eb7b0 ffff8801f9853dc0 ffffffff816833bc ffffffff00000000
[ 33.574588] 00000000ffffffff ffff8801f9853d58 ffff8801f9f224c0 0000000000000156
[ 33.574588] Call Trace:
[ 33.574588] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 33.574588] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 33.574588] [<ffffffff815b357b>] sock_aio_write+0xfb/0x120
[ 33.574588] [<ffffffff811c262a>] do_sync_write+0x5a/0x80
[ 33.574588] [<ffffffff811c2925>] vfs_write+0xe5/0x1d0
[ 33.574588] [<ffffffff811c2b09>] SyS_write+0x49/0xb0
[ 33.574588] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 33.574588] Code: 00 4d 85 d2 0f 84 1c 01 00 00 44 8b 9f 8c 03 00 00 31 c0 41 83 fb 01 0f 86 1b 01 00 00 0f b7 8e b4 00 00 00 48 8b 96 c0 00 00 00 <66> 83 7c 0a 0c 08 0f 85 01 01 00 00 55 48 89 e5 41 55 41 54 53
[ 33.574588] RIP [<ffffffff814e701d>] netvsc_select_queue+0x3d/0x150
[ 33.574588] RSP <ffff8801f9853cd8>
[ 33.574588] CR2: ffff8801f39ba503
[ 33.574588] ---[ end trace 760148d3316306ec ]---
[ 33.574588] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:41
[ 33.574588] in_atomic(): 0, irqs_disabled(): 1, pid: 543, name: dhclient
[ 33.574588] INFO: lockdep is turned off.
[ 33.574588] irq event stamp: 95826
[ 33.574588] hardirqs last enabled at (95825): [<ffffffff81698cb4>] __slab_alloc+0x50b/0x576
[ 33.574588] hardirqs last disabled at (95826): [<ffffffff816a5326>] error_sti+0x5/0x6
[ 33.574588] softirqs last enabled at (95758): [<ffffffff815ba278>] release_sock+0x1b8/0x210
[ 33.574588] softirqs last disabled at (95756): [<ffffffff815ba0f4>] release_sock+0x34/0x210
[ 35.698953] CPU: 3 PID: 543 Comm: dhclient Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f-dirty #138
[ 35.698953] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 35.698953] 0000000000000046 ffff8801f9853950 ffffffff8169a70b ffff8800ecfce090
[ 35.698953] ffff8801f9853968 ffffffff8109ec65 ffff8800eced62d8 ffff8801f9853988
[ 35.698953] ffffffff816a0d44 ffffffff81090f38 ffff8800ecfce090 ffff8801f98539a8
[ 35.698953] Call Trace:
[ 35.698953] [<ffffffff8169a70b>] dump_stack+0x4d/0x66
[ 35.698953] [<ffffffff8109ec65>] __might_sleep+0x115/0x120
[ 35.698953] [<ffffffff816a0d44>] down_read+0x24/0x70
[ 35.698953] [<ffffffff81090f38>] ? __validate_process_creds+0xd8/0xf0
[ 35.698953] [<ffffffff8107f9d4>] exit_signals+0x24/0x140
[ 35.698953] [<ffffffff810737d9>] do_exit+0x129/0xa20
[ 35.698953] [<ffffffff810c4bcc>] ? kmsg_dump+0xfc/0x110
[ 35.698953] [<ffffffff810c4af5>] ? kmsg_dump+0x25/0x110
[ 35.698953] [<ffffffff81006348>] oops_end+0xa8/0xc0
[ 35.698953] [<ffffffff81695288>] no_context+0x322/0x36b
[ 35.698953] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 35.698953] [<ffffffff8169549c>] __bad_area_nosemaphore+0x1cb/0x1e8
[ 35.698953] [<ffffffff816954cc>] bad_area_nosemaphore+0x13/0x15
[ 35.698953] [<ffffffff8104040e>] __do_page_fault+0x1ee/0x4f0
[ 35.698953] [<ffffffff8109c9db>] ? try_to_wake_up+0x3eb/0x400
[ 35.698953] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 35.698953] [<ffffffff8139c0dd>] ? trace_hardirqs_off_thunk+0x3a/0x3c
[ 35.698953] [<ffffffff81040762>] do_page_fault+0x22/0x30
[ 35.698953] [<ffffffff816a5108>] page_fault+0x28/0x30
[ 35.698953] [<ffffffff814e701d>] ? netvsc_select_queue+0x3d/0x150
[ 35.698953] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 35.698953] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 35.698953] [<ffffffff815b357b>] sock_aio_write+0xfb/0x120
[ 35.698953] [<ffffffff811c262a>] do_sync_write+0x5a/0x80
[ 35.698953] [<ffffffff811c2925>] vfs_write+0xe5/0x1d0
[ 35.698953] [<ffffffff811c2b09>] SyS_write+0x49/0xb0
[ 35.698953] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 35.698953] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:41
[ 35.698953] in_atomic(): 0, irqs_disabled(): 1, pid: 543, name: dhclient
[ 35.698953] INFO: lockdep is turned off.
[ 35.698953] irq event stamp: 95826
[ 35.698953] hardirqs last enabled at (95825): [<ffffffff81698cb4>] __slab_alloc+0x50b/0x576
[ 35.698953] hardirqs last disabled at (95826): [<ffffffff816a5326>] error_sti+0x5/0x6
[ 35.698953] softirqs last enabled at (95758): [<ffffffff815ba278>] release_sock+0x1b8/0x210
[ 35.698953] softirqs last disabled at (95756): [<ffffffff815ba0f4>] release_sock+0x34/0x210
[ 35.698953] CPU: 3 PID: 543 Comm: dhclient Tainted: G D 3.17.0-rc2.x86_64-00096-g9c6196f-dirty #138
[ 37.503488] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS 090006 05/23/2012
[ 37.503488] ffff8800ecfce090 ffff8801f9853940 ffffffff8169a70b ffff8800ecfce090
[ 37.503488] ffff8801f9853958 ffffffff8109ec65 ffff8801f3473a18 ffff8801f9853978
[ 37.503488] ffffffff816a0d44 ffffffff810d5cb1 ffff8800eced5e80 ffff8801f98539a8
[ 37.503488] Call Trace:
[ 37.503488] [<ffffffff8169a70b>] dump_stack+0x4d/0x66
[ 37.503488] [<ffffffff8109ec65>] __might_sleep+0x115/0x120
[ 37.503488] [<ffffffff816a0d44>] down_read+0x24/0x70
[ 37.503488] [<ffffffff810d5cb1>] ? hrtimer_try_to_cancel+0xf1/0x100
[ 37.503488] [<ffffffff810ec612>] acct_collect+0x52/0x1c0
[ 37.503488] [<ffffffff81074082>] do_exit+0x9d2/0xa20
[ 37.503488] [<ffffffff810c4bcc>] ? kmsg_dump+0xfc/0x110
[ 37.503488] [<ffffffff810c4af5>] ? kmsg_dump+0x25/0x110
[ 37.503488] [<ffffffff81006348>] oops_end+0xa8/0xc0
[ 37.503488] [<ffffffff81695288>] no_context+0x322/0x36b
[ 37.503488] [<ffffffff810b97fd>] ? trace_hardirqs_on_caller+0x17d/0x210
[ 37.503488] [<ffffffff8169549c>] __bad_area_nosemaphore+0x1cb/0x1e8
[ 37.503488] [<ffffffff816954cc>] bad_area_nosemaphore+0x13/0x15
[ 37.503488] [<ffffffff8104040e>] __do_page_fault+0x1ee/0x4f0
[ 37.503488] [<ffffffff8109c9db>] ? try_to_wake_up+0x3eb/0x400
[ 37.503488] [<ffffffff810bd106>] ? lock_release_non_nested+0xc6/0x330
[ 37.503488] [<ffffffff8139c0dd>] ? trace_hardirqs_off_thunk+0x3a/0x3c
[ 37.503488] [<ffffffff81040762>] do_page_fault+0x22/0x30
[ 37.503488] [<ffffffff816a5108>] page_fault+0x28/0x30
[ 37.503488] [<ffffffff814e701d>] ? netvsc_select_queue+0x3d/0x150
[ 37.503488] [<ffffffff8167f651>] ? packet_pick_tx_queue+0x31/0xa0
[ 37.503488] [<ffffffff816833bc>] packet_sendmsg+0xc1c/0xdd0
[ 37.503488] [<ffffffff815b357b>] sock_aio_write+0xfb/0x120
[ 37.503488] [<ffffffff811c262a>] do_sync_write+0x5a/0x80
[ 37.503488] [<ffffffff811c2925>] vfs_write+0xe5/0x1d0
[ 37.503488] [<ffffffff811c2b09>] SyS_write+0x49/0xb0
[ 37.503488] [<ffffffff816a32a9>] system_call_fastpath+0x16/0x1b
[ 37.504231] [sched_delayed] sched: RT throttling activated
[ 39.104323] hv_netvsc vmbus_0_15: net device safe to remove
[ 39.149816] hv_netvsc: hv_netvsc channel opened successfully
[ 40.899617] hv_netvsc vmbus_0_15: Send section size: 6144, Section count:2560
[ 40.947265] hv_netvsc vmbus_0_15: Device MAC 00:15:5d:6f:02:a5 link state up
The network interface that stopped working after the above was not the
one set to have an MTU of 9000...
--
Sitsofe | http://sucs.org/~sits/
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2014-08-29 19:49 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-08-29 9:31 [hyperv] BUG: unable to handle kernel paging request at ffff8801f5bc7cbb (netvsc_select_queue) Sitsofe Wheeler
2014-08-29 17:13 ` KY Srinivasan
2014-08-29 17:18 ` KY Srinivasan
2014-08-29 19:49 ` Sitsofe Wheeler
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).