From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wei Liu Subject: Re: kernel bug in netback.c Date: Sun, 20 Jul 2014 20:11:36 +0100 Message-ID: <20140720191136.GA29535@zion.uk.xensource.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Content-Disposition: inline In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: William Dauchy Cc: wei.liu2@citrix.com, xen-devel List-Id: xen-devel@lists.xenproject.org On Sat, Jul 19, 2014 at 10:41:37AM +0200, William Dauchy wrote: > Hello, > > Using xen-4.1 and dom0 3.4.97, I'm getting the following trace. I was > wondering if the 3.4.x stable tree was not missing any patch. > > ------------[ cut here ]------------ > kernel BUG at drivers/net/xen-netback/netback.c:1737! I gusse you have some other patches applied? There is no BUG_ON at vanilla 3.4.97 L1737. > invalid opcode: 0000 [#1] SMP > Modules linked in: ebt_arp sd_mod crc_t10dif ebt_ip6 ebt_dnat ebt_ip > ebtable_broute ebt_snat ebtable_nat ebtable_filter ebtables bridge stp > llc ipmi_devintf iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi > scsi_mod ipmi_si ipmi_msghandler aoe(O) rtc_cmos button > > Pid: 1407, comm: netback/9 Tainted: G O > 3.4.97-dom0-a801fd8-i386 #68 /0D61XP And this version number contains a hash doesn't exist in vanilla kernel. So it suggests the kernel has some custom patches applied. You can look at the stable patches in 3.10.y tree which I think should apply to 3.4.y kernel. Of course you might need to adjust them as needed. Wei. > EIP: 0061:[] EFLAGS: 00010287 CPU: 9 > EIP is at xen_netbk_idx_release+0x109/0x120 > EAX: 0000006f EBX: f5093584 ECX: 00000000 EDX: 0000006f > ESI: 0000006f EDI: 0000006f EBP: ed473ee8 ESP: ed473ecc > DS: 007b ES: 007b FS: 00d8 GS: 0000 SS: 0069 > CR0: 8005003b CR2: 08acb2f8 CR3: 27013000 CR4: 00002660 > DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000 > DR6: ffff0ff0 DR7: 00000400 > Process netback/9 (pid: 1407, ti=ed472000 task=eeb0b500 task.ti=ed472000) > Stack: > 0000007f ffffffff e70eac00 00000071 f5093584 f5094e00 ffffffff ed473fb8 > c1250564 f3ec1da0 00000086 00000840 ed473fa8 c1059d04 e8ab4d40 0000007d > ed473fa0 ed473f8c ed473f6c f3128300 e8ab4c40 eeb0b500 eeb0b500 f5094de8 > Call Trace: > [] xen_netbk_kthread+0x954/0xe20 > [] ? idle_balance+0xd4/0x120 > [] ? wake_up_bit+0x30/0x30 > [] ? xen_netbk_tx_build_gops+0xe90/0xe90 > [] kthread+0x74/0x80 > [] ? kthread_freezable_should_stop+0x50/0x50 > [] kernel_thread_helper+0x6/0x10 > Code: 8b 44 93 0c c7 40 04 00 00 00 00 8b 44 93 0c e8 de f7 e3 ff 8b > 7d e4 c7 44 bb 0c 00 00 00 00 83 c4 10 5b 5e 5f c9 c3 0f 0b eb fe <0f> > 0b eb fe 0f 0b eb fe eb 0d 90 90 90 90 90 90 90 90 90 90 90 > EIP: [] xen_netbk_idx_release+0x109/0x120 SS:ESP 0069:ed473ecc > ---[ end trace b51200cc1b02fe07 ]--- > vif vif-50-0: 2 reading script > p47: port 5(vif50.0) entered disabled state > > > -- > William > > _______________________________________________ > Xen-devel mailing list > Xen-devel@lists.xen.org > http://lists.xen.org/xen-devel