[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Kernel 3.7.0-pre-rc1 kernel BUG at drivers/net/xen-netback/netback.c:405 RIP: e030:[<ffffffff814714f9>] [<ffffffff814714f9>] netbk_gop_frag_copy+0x379/0x380
Tuesday, October 9, 2012, 11:23:08 AM, you wrote: > On Tue, 2012-10-09 at 03:24 +0100, Sander Eikelenboom wrote: >> >> Looking at the code, this is what we get: >> >> >> >> /* Data must not cross a page boundary. */ >> >> BUG_ON(size + offset > PAGE_SIZE); >> >>[...] >> After applying the debug patch: >> >> [ 197.876304] netbk_gop_frag_copy failed: skb frag 0 page >> [ 197.884299] copying from offset 0, len 1628 > WTF! This turns into BUG_ON(0 + 1628 > PAGE_SIZE) (where PAGE_SIZE is > 4096) which simply should not be triggering. > Perhaps I screwed up the debugging patch... investigates... no I don't > think so, but someone should definitely check my working. > For belt and braces can you change, in netbk_gop_frag_copy: > /* Data must not cross a page boundary. */ > if (size + offset > PAGE_SIZE) > return -1; > into: > /* Data must not cross a page boundary. */ > if (size + offset > PAGE_SIZE) { > printk(KERN_CRIT "netbk_gop_frag_copy: size %lx offset %lx\n > => %lx > %lx\n", > size, offset, size + offset, PAGE_SIZE); > return -1; > } Done: [ 199.342570] netbk_gop_frag_copy: size 5a8 offset 7102 [ 199.342570] => 76aa > 1000 [ 199.354626] netbk_gop_frag_copy failed: skb frag 0 page [ 199.360930] copying from offset 7102, len 5a8 [ 199.366887] page:ffffea0000b0aa00 count:3 mapcount:0 mapping: (null) index:0x7f40fec00 [ 199.373008] page flags: 0x40000000004000(head) [ 199.379252] ------------[ cut here ]------------ [ 199.385247] kernel BUG at drivers/net/xen-netback/netback.c:548! [ 199.391334] invalid opcode: 0000 [#1] PREEMPT SMP [ 199.397446] Modules linked in: [ 199.403450] CPU 4 [ 199.403500] Pid: 1183, comm: netback/4 Not tainted 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) [ 199.415401] RIP: e030:[<ffffffff8147463a>] [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 199.421690] RSP: e02b:ffff88003792bc20 EFLAGS: 00010282 [ 199.428048] RAX: 0000000000000001 RBX: ffff88003197c600 RCX: 0000000000000000 [ 199.434358] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8800379202b0 [ 199.440582] RBP: ffff88003792bd50 R08: 0000000000000002 R09: 0000000000000000 [ 199.446740] R10: 0000000000000001 R11: ffff88003a26c000 R12: 0000000000000030 [ 199.452965] R13: 0000000000000000 R14: ffff88002c2ae900 R15: 0000000000000001 [ 199.459203] FS: 00007fcec7740700(0000) GS:ffff88003f900000(0000) knlGS:0000000000000000 [ 199.465527] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 199.471735] CR2: 00007fff5f59c000 CR3: 0000000001c0b000 CR4: 0000000000000660 [ 199.477961] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 199.484102] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 199.490274] Process netback/4 (pid: 1183, threadinfo ffff88003792a000, task ffff880037cec140) [ 199.496631] Stack: [ 199.502834] ffff88003792bd1c ffff880037cec7f0 ffff88003792bd00 ffff88003792bc80 [ 199.509198] ffffffff00000001 00000000000005ea ffffc90010851a98 ffffc9001084cf30 [ 199.515579] 0000000001080083 ffffc9001084cee0 0000000000000000 ffff880032b449c0 [ 199.521944] Call Trace: [ 199.528243] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 [ 199.534566] [<ffffffff8147569a>] xen_netbk_kthread+0xba/0xa90 [ 199.540826] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 [ 199.547193] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 [ 199.553450] [<ffffffff814755e0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 [ 199.559683] [<ffffffff810861a6>] kthread+0xd6/0xe0 [ 199.565827] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 [ 199.572086] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 [ 199.578268] [<ffffffff8174e660>] ? gs_change+0x13/0x13 [ 199.584344] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 36 24 c8 ff <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 [ 199.597406] RIP [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 199.604013] RSP <ffff88003792bc20> [ 199.610610] ---[ end trace 03f82ac72747fb5a ]--- [ 199.990340] device vif11.0 entered promiscuous mode [ 200.466710] xen-blkback:ring-ref 9, event-channel 10, protocol 1 (x86_64-abi) [ 200.476634] xen_bridge: port 11(vif11.0) entered forwarding state [ 200.483621] xen_bridge: port 11(vif11.0) entered forwarding state [ 200.653782] pciback 0000:03:06.0: enabling device (0000 -> 0001) [ 200.661499] xen: registering gsi 22 triggering 0 polarity 1 [ 200.669003] Already setup the GSI :22 [ 200.677345] pciback 0000:03:06.0: enabling bus mastering [ 201.267297] xen_bridge: port 9(vif9.0) entered forwarding state [ 205.151290] tty_init_dev: 2 callbacks suppressed [ 206.534137] device vif12.0 entered promiscuous mode [ 206.867366] xen-blkback:ring-ref 8, event-channel 9, protocol 1 (x86_64-abi) [ 206.877552] xen_bridge: port 12(vif12.0) entered forwarding state [ 206.884869] xen_bridge: port 12(vif12.0) entered forwarding state [ 208.574036] xen_bridge: port 10(vif10.0) entered forwarding state [ 209.979799] netbk_gop_frag_copy: size 1080 offset 0 [ 209.979799] => 1080 > 1000 [ 209.994252] netbk_gop_frag_copy failed: skb frag 0 page [ 210.001191] copying from offset 0, len 1080 [ 210.008121] page:ffffea0000b0a800 count:3 mapcount:0 mapping: (null) index:0x7f40fec00 [ 210.015124] page flags: 0x40000000004000(head) [ 210.022122] ------------[ cut here ]------------ [ 210.029035] kernel BUG at drivers/net/xen-netback/netback.c:548! [ 210.035973] invalid opcode: 0000 [#2] PREEMPT SMP [ 210.042819] Modules linked in: [ 210.049467] CPU 0 [ 210.049518] Pid: 1179, comm: netback/0 Tainted: G D 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) [ 210.062788] RIP: e030:[<ffffffff8147463a>] [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 210.069740] RSP: e02b:ffff880037923c20 EFLAGS: 00010282 [ 210.076711] RAX: 0000000000000001 RBX: ffff880031993ae0 RCX: 0000000000000000 [ 210.083744] RDX: ffff8800398a61e0 RSI: 0000000000000001 RDI: ffff8800379202b0 [ 210.090801] RBP: ffff880037923d50 R08: 0000000000000002 R09: 0000000000000000 [ 210.097787] R10: 0000000000000001 R11: ffff88003a26b330 R12: 0000000000000030 [ 210.104759] R13: 0000000000000000 R14: ffff88002b4d8800 R15: 0000000000000001 [ 210.111611] FS: 00007f695df80700(0000) GS:ffff88003f800000(0000) knlGS:0000000000000000 [ 210.118570] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 210.125586] CR2: 00007f695402e000 CR3: 0000000032a8f000 CR4: 0000000000000660 [ 210.132677] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 210.139560] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 210.146350] Process netback/0 (pid: 1179, threadinfo ffff880037922000, task ffff8800398a61e0) [ 210.153213] Stack: [ 210.159974] ffff880037923d1c ffff880037922010 ffff880037923d00 ffff880037923c80 [ 210.166905] ffffffff810800b5 0000000000000662 ffffc90010824bb8 ffffc90010820050 [ 210.173802] 0000000001080083 ffffc90010820000 0000000000000000 ffff8800375849c0 [ 210.180780] Call Trace: [ 210.187656] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 [ 210.194674] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 [ 210.201690] [<ffffffff8147569a>] xen_netbk_kthread+0xba/0xa90 [ 210.208659] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 [ 210.215688] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 [ 210.222665] [<ffffffff814755e0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 [ 210.229651] [<ffffffff810861a6>] kthread+0xd6/0xe0 [ 210.236455] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 [ 210.243111] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 [ 210.249687] [<ffffffff8174e660>] ? gs_change+0x13/0x13 [ 210.256195] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 36 24 c8 ff <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 [ 210.270166] RIP [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 210.276925] RSP <ffff880037923c20> [ 210.284112] ---[ end trace 03f82ac72747fb5b ]--- [ 213.634083] device vif13.0 entered promiscuous mode [ 213.911267] xen-blkback:ring-ref 8, event-channel 9, protocol 1 (x86_64-abi) [ 213.920749] vpn_bridge: port 1(vif13.0) entered forwarding state [ 213.927480] vpn_bridge: port 1(vif13.0) entered forwarding state [ 215.509632] xen_bridge: port 11(vif11.0) entered forwarding state [ 215.825483] netbk_gop_frag_copy: size 2c1 offset 12d6 [ 215.825483] => 1597 > 1000 [ 215.838666] netbk_gop_frag_copy failed: skb frag 0 page [ 215.845265] copying from offset 12d6, len 2c1 [ 215.851790] page:ffffea0000b0a800 count:6 mapcount:0 mapping: (null) index:0x7f40fec00 [ 215.858389] page flags: 0x40000000004000(head) [ 215.864925] ------------[ cut here ]------------ [ 215.871426] kernel BUG at drivers/net/xen-netback/netback.c:548! [ 215.878069] invalid opcode: 0000 [#3] PREEMPT SMP [ 215.884696] Modules linked in: [ 215.891258] CPU 3 [ 215.891308] Pid: 1182, comm: netback/3 Tainted: G D 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) [ 215.904613] RIP: e030:[<ffffffff8147463a>] [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 215.911538] RSP: e02b:ffff880037929c20 EFLAGS: 00010282 [ 215.918336] RAX: 0000000000000001 RBX: ffff88002c361ee0 RCX: 0000000000000000 [ 215.925236] RDX: ffff880037ced190 RSI: 0000000000000001 RDI: ffff8800379202b0 [ 215.932144] RBP: ffff880037929d50 R08: 0000000000000002 R09: 0000000000000000 [ 215.938988] R10: 0000000000000001 R11: ffff88003a26aca0 R12: 0000000000000030 [ 215.945835] R13: 0000000000000000 R14: ffff88002b49b400 R15: 0000000000000001 [ 215.952652] FS: 00007f695c355700(0000) GS:ffff88003f8c0000(0000) knlGS:0000000000000000 [ 215.959476] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 215.966165] CR2: 00007faa79583000 CR3: 0000000032a8f000 CR4: 0000000000000660 [ 215.972789] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 215.979339] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 215.985844] Process netback/3 (pid: 1182, threadinfo ffff880037928000, task ffff880037ced190) [ 215.992486] Stack: [ 215.999085] ffff880037929d1c ffff880037928010 ffff880037929d00 ffff880037929c80 [ 216.005896] ffffffff810800b5 00000000000000ba ffffc900108466e0 ffffc90010841b78 [ 216.012651] 0000000101080083 ffffc90010841b28 0000000100000000 ffff880031a869c0 [ 216.019386] Call Trace: [ 216.026026] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 [ 216.032830] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 [ 216.039668] [<ffffffff8147569a>] xen_netbk_kthread+0xba/0xa90 [ 216.046435] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 [ 216.053094] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 [ 216.059670] [<ffffffff814755e0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 [ 216.066279] [<ffffffff810861a6>] kthread+0xd6/0xe0 [ 216.072817] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 [ 216.079308] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 [ 216.085783] [<ffffffff8174e660>] ? gs_change+0x13/0x13 [ 216.092234] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 36 24 c8 ff <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 [ 216.106108] RIP [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 216.113118] RSP <ffff880037929c20> [ 216.120011] ---[ end trace 03f82ac72747fb5c ]--- [ 219.765094] device vif14.0 entered promiscuous mode [ 220.062152] xen-blkback:ring-ref 8, event-channel 9, protocol 1 (x86_64-abi) [ 220.072238] xen_bridge: port 13(vif14.0) entered forwarding state [ 220.079416] xen_bridge: port 13(vif14.0) entered forwarding state [ 221.912781] xen_bridge: port 12(vif12.0) entered forwarding state [ 222.876167] netbk_gop_frag_copy: size 2c1 offset 1858 [ 222.876167] => 1b19 > 1000 [ 222.889279] netbk_gop_frag_copy failed: skb frag 0 page [ 222.895959] copying from offset 1858, len 2c1 [ 222.902484] page:ffffea0000b0a800 count:8 mapcount:0 mapping: (null) index:0x7f40fec00 [ 222.909119] page flags: 0x40000000004000(head) [ 222.915711] ------------[ cut here ]------------ [ 222.922307] kernel BUG at drivers/net/xen-netback/netback.c:548! [ 222.928950] invalid opcode: 0000 [#4] PREEMPT SMP [ 222.935546] Modules linked in: [ 222.942110] CPU 5 [ 222.942161] Pid: 1184, comm: netback/5 Tainted: G D 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) [ 222.955415] RIP: e030:[<ffffffff8147463a>] [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 222.962350] RSP: e02b:ffff88003792dc20 EFLAGS: 00010282 [ 222.969198] RAX: 0000000000000001 RBX: ffff88002b4f4ce0 RCX: 0000000000000000 [ 222.976119] RDX: ffff880037ceb0f0 RSI: 0000000000000001 RDI: ffff8800379202b0 [ 222.982987] RBP: ffff88003792dd50 R08: 0000000000000002 R09: 0000000000000000 [ 222.989869] R10: 0000000000000001 R11: ffff88003a26b380 R12: 0000000000000030 [ 222.996658] R13: 0000000000000000 R14: ffff88002b5a7800 R15: 0000000000000001 [ 223.003490] FS: 00007f71c6ce2740(0000) GS:ffff88003f940000(0000) knlGS:0000000000000000 [ 223.010257] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 223.016868] CR2: 00007f71c66b4d15 CR3: 0000000031f46000 CR4: 0000000000000660 [ 223.023470] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 223.029999] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 223.036478] Process netback/5 (pid: 1184, threadinfo ffff88003792c000, task ffff880037ceb0f0) [ 223.043095] Stack: [ 223.049616] ffff88003792dd1c ffff88003792c010 ffff88003792dd00 ffff88003792dc80 [ 223.056404] ffffffff810800b5 00000000000000ba ffffc9001085ce50 ffffc900108582e8 [ 223.063150] 0000000101080083 ffffc90010858298 0000000100000000 ffff88002c38d9c0 [ 223.069955] Call Trace: [ 223.076591] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 [ 223.083426] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 [ 223.090261] [<ffffffff8147569a>] xen_netbk_kthread+0xba/0xa90 [ 223.096990] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 [ 223.103620] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 [ 223.110195] [<ffffffff814755e0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 [ 223.116768] [<ffffffff810861a6>] kthread+0xd6/0xe0 [ 223.123312] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 [ 223.129794] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 [ 223.136217] [<ffffffff8174e660>] ? gs_change+0x13/0x13 [ 223.142658] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 36 24 c8 ff <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 [ 223.156486] RIP [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 223.163337] RSP <ffff88003792dc20> [ 223.170212] ---[ end trace 03f82ac72747fb5d ]--- [ 228.705439] device vif15.0 entered promiscuous mode [ 228.880399] device vif15.0-emu entered promiscuous mode [ 228.889286] xen_bridge: port 15(vif15.0-emu) entered forwarding state [ 228.895546] xen_bridge: port 15(vif15.0-emu) entered forwarding state [ 228.956267] vpn_bridge: port 1(vif13.0) entered forwarding state [ 229.119709] pciback 0000:06:00.0: restoring config space at offset 0x3c (was 0x100, writing 0x10a) [ 229.126644] pciback 0000:06:00.0: restoring config space at offset 0x10 (was 0x4, writing 0xf9a00004) [ 229.133434] pciback 0000:06:00.0: restoring config space at offset 0xc (was 0x0, writing 0x10) [ 234.170536] tty_init_dev: 15 callbacks suppressed [ 235.092664] xen_bridge: port 13(vif14.0) entered forwarding state [ 235.684229] device vif16.0 entered promiscuous mode [ 235.805155] device vif16.0-emu entered promiscuous mode [ 235.813948] xen_bridge: port 17(vif16.0-emu) entered forwarding state [ 235.820242] xen_bridge: port 17(vif16.0-emu) entered forwarding state [ 239.632852] xen_bridge: port 15(vif15.0-emu) entered disabled state [ 239.641629] xen_bridge: port 15(vif15.0-emu) entered disabled state [ 239.650288] device vif15.0-emu left promiscuous mode [ 239.658618] xen_bridge: port 15(vif15.0-emu) entered disabled state [ 240.982436] tty_init_dev: 15 callbacks suppressed [ 241.386562] xen-blkback:ring-ref 8, event-channel 25, protocol 1 (x86_64-abi) [ 241.400247] xen-blkback:ring-ref 9, event-channel 26, protocol 1 (x86_64-abi) [ 241.454701] xen_bridge: port 14(vif15.0) entered forwarding state [ 241.463330] xen_bridge: port 14(vif15.0) entered forwarding state [ 246.690393] xen_bridge: port 17(vif16.0-emu) entered disabled state [ 246.699042] xen_bridge: port 17(vif16.0-emu) entered disabled state [ 246.708731] device vif16.0-emu left promiscuous mode [ 246.717465] xen_bridge: port 17(vif16.0-emu) entered disabled state [ 249.449321] xen-blkback:ring-ref 8, event-channel 25, protocol 1 (x86_64-abi) [ 249.619531] xen_bridge: port 16(vif16.0) entered forwarding state [ 249.628307] xen_bridge: port 16(vif16.0) entered forwarding state [ 256.489967] xen_bridge: port 14(vif15.0) entered forwarding state [ 264.654183] xen_bridge: port 16(vif16.0) entered forwarding state [ 414.296535] tty_init_dev: 16 callbacks suppressed [ 458.898093] netbk_gop_frag_copy: size 5a8 offset 3602 [ 458.898093] => 3baa > 1000 [ 458.920252] netbk_gop_frag_copy failed: skb frag 0 page [ 458.928746] copying from offset 3602, len 5a8 [ 458.937114] page:ffffea0000ada800 count:32749 mapcount:0 mapping: (null) index:0xffff88002b6a6100 [ 458.945813] page flags: 0x40000000004000(head) [ 458.954314] ------------[ cut here ]------------ [ 458.962655] kernel BUG at drivers/net/xen-netback/netback.c:548! [ 458.970929] invalid opcode: 0000 [#5] PREEMPT SMP [ 458.979113] Modules linked in: [ 458.987128] CPU 1 [ 458.987178] Pid: 1180, comm: netback/1 Tainted: G D 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) [ 459.003052] RIP: e030:[<ffffffff8147463a>] [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 459.011121] RSP: e02b:ffff880037925c20 EFLAGS: 00010282 [ 459.019135] RAX: 0000000000000001 RBX: ffff88002ab0bf00 RCX: 0000000000000000 [ 459.027199] RDX: ffff8800398a30f0 RSI: 0000000000000001 RDI: ffff8800379202b0 [ 459.035081] RBP: ffff880037925d50 R08: 0000000000000002 R09: 0000000000000000 [ 459.042816] R10: 0000000000000001 R11: ffff88003a26bdb0 R12: 0000000000000030 [ 459.050308] R13: 0000000000000000 R14: ffff88002b6a2e00 R15: 0000000000000001 [ 459.057725] FS: 00007f8e25af5760(0000) GS:ffff88003f840000(0000) knlGS:0000000000000000 [ 459.065052] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b [ 459.072248] CR2: 00007fe6b4d12fb0 CR3: 000000002c2f6000 CR4: 0000000000000660 [ 459.079480] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 459.086512] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 [ 459.093386] Process netback/1 (pid: 1180, threadinfo ffff880037924000, task ffff8800398a30f0) [ 459.100357] Stack: [ 459.107071] ffff880037925d1c ffff880037924010 ffff880037925d00 ffff880037925c80 [ 459.113808] ffffffff810800b5 000000000000042a ffffc9001082ff70 ffffc9001082b408 [ 459.120494] 0000000001080083 ffffc9001082b3b8 0000000000000000 ffff8800329249c0 [ 459.127129] Call Trace: [ 459.133509] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 [ 459.140118] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 [ 459.146604] [<ffffffff8147569a>] xen_netbk_kthread+0xba/0xa90 [ 459.153504] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 [ 459.159949] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 [ 459.166431] [<ffffffff814755e0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 [ 459.172778] [<ffffffff810861a6>] kthread+0xd6/0xe0 [ 459.179018] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 [ 459.185291] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 [ 459.191523] [<ffffffff8174e660>] ? gs_change+0x13/0x13 [ 459.197862] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 36 24 c8 ff <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 [ 459.211184] RIP [<ffffffff8147463a>] xen_netbk_rx_action+0x89a/0x910 [ 459.217785] RSP <ffff880037925c20> [ 459.224501] ---[ end trace 03f82ac72747fb5e ]--- > This made me notice that offset and len in the caller are variously > unsigned int, u16 or u32 while gop_frag_copy takes them as unsigned > longs. None of the numbers involved here are anywhere big enough to > cause any sort of overflow related error though. >> [ 197.892781] page:ffffea0000b18400 count:3 mapcount:0 mapping: >> (null) index:0x0 >> [ 197.900778] page flags: 0x40000000004000(head) >> [ 197.907074] ------------[ cut here ]------------ >> [ 197.913345] kernel BUG at drivers/net/xen-netback/netback.c:546! >> [ 197.919626] invalid opcode: 0000 [#1] PREEMPT SMP >> [ 197.921573] xen_bridge: port 10(vif10.0) entered forwarding state >> [ 197.932106] Modules linked in: >> [ 197.938370] CPU 0 >> [ 197.938420] Pid: 1180, comm: netback/0 Not tainted >> 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) >> [ 197.951203] RIP: e030:[<ffffffff8147462a>] [<ffffffff8147462a>] >> xen_netbk_rx_action+0x89a/0x910 >> [ 197.957775] RSP: e02b:ffff880037911c20 EFLAGS: 00010282 >> [ 197.964290] RAX: 0000000000000001 RBX: ffff880036862ee0 RCX: >> 0000000000000000 >> [ 197.970956] RDX: 0000000000000001 RSI: 0000000000000001 RDI: >> ffff8800379102b0 >> [ 197.977679] RBP: ffff880037911d50 R08: 0000000000000002 R09: >> 0000000000000000 >> [ 197.984361] R10: 0000000000000001 R11: ffff880039925e40 R12: >> 0000000000000030 >> [ 197.990958] R13: 0000000000000000 R14: ffff880031e71800 R15: >> 0000000000000001 >> [ 197.997459] FS: 00007fb5dfcf7700(0000) GS:ffff88003f800000(0000) >> knlGS:0000000000000000 >> [ 198.004123] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b >> [ 198.010827] CR2: 00007fb5d802d000 CR3: 0000000031fd3000 CR4: >> 0000000000000660 >> [ 198.017534] DR0: 0000000000000000 DR1: 0000000000000000 DR2: >> 0000000000000000 >> [ 198.024168] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: >> 0000000000000400 >> [ 198.030717] Process netback/0 (pid: 1180, threadinfo ffff880037910000, >> task ffff88003997d190) >> [ 198.037326] Stack: >> [ 198.043817] ffff880037911d1c ffff88003997d840 ffff880037911d00 >> ffff880037911c80 >> [ 198.050573] ffffffff00000001 0000000000000662 ffffc90010824bb8 >> ffffc90010820050 >> [ 198.057413] 0000000001080083 ffffc90010820000 0000000000000000 >> ffff880031cf09c0 >> [ 198.064228] Call Trace: >> [ 198.070887] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 >> [ 198.077604] [<ffffffff8147568a>] xen_netbk_kthread+0xba/0xa90 >> [ 198.084394] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 >> [ 198.091109] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 >> [ 198.097726] [<ffffffff814755d0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 >> [ 198.104343] [<ffffffff810861a6>] kthread+0xd6/0xe0 >> [ 198.111001] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 >> [ 198.117737] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 >> [ 198.124425] [<ffffffff8174e660>] ? gs_change+0x13/0x13 >> [ 198.131008] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 >> 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 46 24 c8 ff >> <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 >> [ 198.145094] RIP [<ffffffff8147462a>] xen_netbk_rx_action+0x89a/0x910 >> [ 198.152192] RSP <ffff880037911c20> >> [ 198.159344] ---[ end trace cbdd0e4e80268fa8 ]--- >> [ 199.703539] tty_init_dev: 2 callbacks suppressed >> [ 200.712098] device vif12.0 entered promiscuous mode >> [ 201.010433] xen-blkback:ring-ref 8, event-channel 9, protocol 1 >> (x86_64-abi) >> [ 201.020644] xen_bridge: port 12(vif12.0) entered forwarding state >> [ 201.027833] xen_bridge: port 12(vif12.0) entered forwarding state >> [ 206.774576] netbk_gop_frag_copy failed: skb frag 0 page >> [ 206.777945] device vif13.0 entered promiscuous mode >> [ 206.788845] copying from offset 1ba4, len 2c1 >> [ 206.795791] page:ffffea0000b18400 count:6 mapcount:0 mapping: >> (null) index:0x0 >> [ 206.802771] page flags: 0x40000000004000(head) >> [ 206.809619] ------------[ cut here ]------------ >> [ 206.816498] kernel BUG at drivers/net/xen-netback/netback.c:546! >> [ 206.823465] invalid opcode: 0000 [#2] PREEMPT SMP >> [ 206.830354] Modules linked in: >> [ 206.837176] CPU 3 >> [ 206.837234] Pid: 1183, comm: netback/3 Tainted: G D >> 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) >> [ 206.850881] RIP: e030:[<ffffffff8147462a>] [<ffffffff8147462a>] >> xen_netbk_rx_action+0x89a/0x910 >> [ 206.857935] RSP: e02b:ffff880037917c20 EFLAGS: 00010282 >> [ 206.864972] RAX: 0000000000000001 RBX: ffff880003313ae0 RCX: >> 0000000000000000 >> [ 206.872049] RDX: ffff88003997b0f0 RSI: 0000000000000001 RDI: >> ffff8800379102b0 >> [ 206.879147] RBP: ffff880037917d50 R08: 0000000000000002 R09: >> 0000000000000000 >> [ 206.886242] R10: 0000000000000001 R11: ffff880039925640 R12: >> 0000000000000030 >> [ 206.893163] R13: 0000000000000000 R14: ffff88002c7c4400 R15: >> 0000000000000001 >> [ 206.900041] FS: 00007f800341a700(0000) GS:ffff88003f8c0000(0000) >> knlGS:0000000000000000 >> [ 206.907145] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b >> [ 206.914126] CR2: 00007f8002b31fb0 CR3: 0000000001c0b000 CR4: >> 0000000000000660 >> [ 206.921181] DR0: 0000000000000000 DR1: 0000000000000000 DR2: >> 0000000000000000 >> [ 206.927996] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: >> 0000000000000400 >> [ 206.934711] Process netback/3 (pid: 1183, threadinfo ffff880037916000, >> task ffff88003997b0f0) >> [ 206.941494] Stack: >> [ 206.948105] ffff880037917d1c ffff880037916010 ffff880037917d00 >> ffff880037917c80 >> [ 206.955062] ffffffff810800b5 00000000000000ba ffffc900108466e0 >> ffffc90010841b78 >> [ 206.962007] 0000000101080083 ffffc90010841b28 0000000100000000 >> ffff88002c5bb9c0 >> [ 206.968967] Call Trace: >> [ 206.975830] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 >> [ 206.982789] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 >> [ 206.989662] [<ffffffff8147568a>] xen_netbk_kthread+0xba/0xa90 >> [ 206.996570] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 >> [ 207.003523] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 >> [ 207.010333] [<ffffffff814755d0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 >> [ 207.017171] [<ffffffff810861a6>] kthread+0xd6/0xe0 >> [ 207.023890] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 >> [ 207.030540] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 >> [ 207.037275] [<ffffffff8174e660>] ? gs_change+0x13/0x13 >> [ 207.043890] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 >> 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 46 24 c8 ff >> <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 >> [ 207.057976] RIP [<ffffffff8147462a>] xen_netbk_rx_action+0x89a/0x910 >> [ 207.065064] RSP <ffff880037917c20> >> [ 207.072056] ---[ end trace cbdd0e4e80268fa9 ]--- >> [ 207.079366] xen-blkback:ring-ref 8, event-channel 9, protocol 1 >> (x86_64-abi) >> [ 207.090256] vpn_bridge: port 1(vif13.0) entered forwarding state >> [ 207.097403] vpn_bridge: port 1(vif13.0) entered forwarding state >> [ 208.636257] xen_bridge: port 11(vif11.0) entered forwarding state >> [ 211.515779] netbk_gop_frag_copy failed: skb frag 0 page >> [ 211.522711] copying from offset 2126, len 2c1 >> [ 211.529403] page:ffffea0000b18400 count:8 mapcount:0 mapping: >> (null) index:0x0 >> [ 211.536142] page flags: 0x40000000004000(head) >> [ 211.542942] ------------[ cut here ]------------ >> [ 211.549664] kernel BUG at drivers/net/xen-netback/netback.c:546! >> [ 211.556408] invalid opcode: 0000 [#3] PREEMPT SMP >> [ 211.563168] Modules linked in: >> [ 211.569739] CPU 4 >> [ 211.569789] Pid: 1184, comm: netback/4 Tainted: G D >> 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) >> [ 211.583126] RIP: e030:[<ffffffff8147462a>] [<ffffffff8147462a>] >> xen_netbk_rx_action+0x89a/0x910 >> [ 211.590041] RSP: e02b:ffff880037921c20 EFLAGS: 00010282 >> [ 211.596868] RAX: 0000000000000001 RBX: ffff8800375bc4e0 RCX: >> 0000000000000000 >> [ 211.603890] RDX: ffff88003997a0a0 RSI: 0000000000000001 RDI: >> ffff8800379202b0 >> [ 211.610792] RBP: ffff880037921d50 R08: 0000000000000002 R09: >> 0000000000000000 >> [ 211.617608] R10: 0000000000000001 R11: ffff8800399249e0 R12: >> 0000000000000030 >> [ 211.624537] R13: 0000000000000000 R14: ffff88002b98d400 R15: >> 0000000000000001 >> [ 211.631302] FS: 00007f332d735740(0000) GS:ffff88003f900000(0000) >> knlGS:0000000000000000 >> [ 211.638090] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b >> [ 211.644965] CR2: 00007f1023d22000 CR3: 0000000031fba000 CR4: >> 0000000000000660 >> [ 211.651894] DR0: 0000000000000000 DR1: 0000000000000000 DR2: >> 0000000000000000 >> [ 211.658652] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: >> 0000000000000400 >> [ 211.665288] Process netback/4 (pid: 1184, threadinfo ffff880037920000, >> task ffff88003997a0a0) >> [ 211.671884] Stack: >> [ 211.678376] ffff880037921d1c ffff880037920010 ffff880037921d00 >> ffff880037921c80 >> [ 211.685145] ffffffff810800b5 00000000000000ba ffffc90010851a98 >> ffffc9001084cf30 >> [ 211.691837] 0000000101080083 ffffc9001084cee0 0000000100000000 >> ffff88002c5bd9c0 >> [ 211.698581] Call Trace: >> [ 211.705349] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 >> [ 211.712156] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 >> [ 211.718907] [<ffffffff8147568a>] xen_netbk_kthread+0xba/0xa90 >> [ 211.725654] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 >> [ 211.732369] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 >> [ 211.739111] [<ffffffff814755d0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 >> [ 211.745858] [<ffffffff810861a6>] kthread+0xd6/0xe0 >> [ 211.752449] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 >> [ 211.758975] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 >> [ 211.765575] [<ffffffff8174e660>] ? gs_change+0x13/0x13 >> [ 211.772016] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 >> 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 46 24 c8 ff >> <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 >> [ 211.785816] RIP [<ffffffff8147462a>] xen_netbk_rx_action+0x89a/0x910 >> [ 211.792586] RSP <ffff880037921c20> >> [ 211.799394] ---[ end trace cbdd0e4e80268faa ]--- >> [ 212.852714] device vif14.0 entered promiscuous mode >> [ 213.234995] xen-blkback:ring-ref 8, event-channel 9, protocol 1 >> (x86_64-abi) >> [ 213.245054] xen_bridge: port 13(vif14.0) entered forwarding state >> [ 213.252087] xen_bridge: port 13(vif14.0) entered forwarding state >> [ 214.691532] netbk_gop_frag_copy failed: skb frag 0 page >> [ 214.698515] copying from offset 26a8, len 2c1 >> [ 214.705472] page:ffffea0000b18400 count:10 mapcount:0 mapping: >> (null) index:0x0 >> [ 214.712415] page flags: 0x40000000004000(head) >> [ 214.719170] ------------[ cut here ]------------ >> [ 214.725887] kernel BUG at drivers/net/xen-netback/netback.c:546! >> [ 214.732563] invalid opcode: 0000 [#4] PREEMPT SMP >> [ 214.739221] Modules linked in: >> [ 214.745808] CPU 5 >> [ 214.745859] Pid: 1185, comm: netback/5 Tainted: G D >> 3.6.0pre-rc1-20121008bisect #1 MSI MS-7640/890FXA-GD70 (MS-7640) >> [ 214.759156] RIP: e030:[<ffffffff8147462a>] [<ffffffff8147462a>] >> xen_netbk_rx_action+0x89a/0x910 >> [ 214.766127] RSP: e02b:ffff880037923c20 EFLAGS: 00010282 >> [ 214.773012] RAX: 0000000000000001 RBX: ffff8800379172e0 RCX: >> 0000000000000000 >> [ 214.780010] RDX: ffff880039ac8000 RSI: 0000000000000001 RDI: >> ffff8800379202b0 >> [ 214.786988] RBP: ffff880037923d50 R08: 0000000000000002 R09: >> 0000000000000000 >> [ 214.793870] R10: 0000000000000001 R11: ffff880039924460 R12: >> 0000000000000030 >> [ 214.800812] R13: 0000000000000000 R14: ffff88002b8b4800 R15: >> 0000000000000001 >> [ 214.807668] FS: 00007f236d331700(0000) GS:ffff88003f940000(0000) >> knlGS:0000000000000000 >> [ 214.814545] CS: e033 DS: 0000 ES: 0000 CR0: 000000008005003b >> [ 214.821415] CR2: 00007f236c42b6b0 CR3: 0000000039275000 CR4: >> 0000000000000660 >> [ 214.828435] DR0: 0000000000000000 DR1: 0000000000000000 DR2: >> 0000000000000000 >> [ 214.835337] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: >> 0000000000000400 >> [ 214.841963] Process netback/5 (pid: 1185, threadinfo ffff880037922000, >> task ffff880039ac8000) >> [ 214.848655] Stack: >> [ 214.855220] ffff880037923d1c ffff880037922010 ffff880037923d00 >> ffff880037923c80 >> [ 214.861945] ffffffff810800b5 00000000000000ba ffffc9001085ce50 >> ffffc900108582e8 >> [ 214.868699] 0000000101080083 ffffc90010858298 0000000100000000 >> ffff880031e939c0 >> [ 214.875477] Call Trace: >> [ 214.882247] [<ffffffff810800b5>] ? __alloc_workqueue_key+0x265/0x5d0 >> [ 214.889083] [<ffffffff810acf3d>] ? trace_hardirqs_on+0xd/0x10 >> [ 214.895851] [<ffffffff8147568a>] xen_netbk_kthread+0xba/0xa90 >> [ 214.902612] [<ffffffff810957e6>] ? try_to_wake_up+0x1b6/0x310 >> [ 214.909343] [<ffffffff81086810>] ? wake_up_bit+0x40/0x40 >> [ 214.916115] [<ffffffff814755d0>] ? xen_netbk_tx_build_gops+0xa70/0xa70 >> [ 214.922856] [<ffffffff810861a6>] kthread+0xd6/0xe0 >> [ 214.929527] [<ffffffff8174e664>] kernel_thread_helper+0x4/0x10 >> [ 214.936178] [<ffffffff8174cb37>] ? retint_restore_args+0x13/0x13 >> [ 214.942781] [<ffffffff8174e660>] ? gs_change+0x13/0x13 >> [ 214.949279] Code: 00 00 00 42 8b 54 30 3c 41 8b 74 04 08 31 c0 e8 e5 37 >> 2d 00 8b 83 c4 00 00 00 4c 03 b3 c8 00 00 00 4a 8b 7c 30 30 e8 46 24 c8 ff >> <0f> 0b eb fe 48 8b b3 d0 00 00 00 48 c7 c2 c0 36 47 81 48 c7 c7 >> [ 214.963107] RIP [<ffffffff8147462a>] xen_netbk_rx_action+0x89a/0x910 >> [ 214.969952] RSP <ffff880037923c20> >> [ 214.976802] ---[ end trace cbdd0e4e80268fab ]--- >> [ 216.045946] xen_bridge: port 12(vif12.0) entered forwarding state >> [ 220.405869] device vif15.0 entered promiscuous mode >> [ 220.607946] device vif15.0-emu entered promiscuous mode >> [ 220.625075] xen_bridge: port 15(vif15.0-emu) entered forwarding state >> [ 220.633333] xen_bridge: port 15(vif15.0-emu) entered forwarding state >> [ 220.890237] pciback 0000:06:00.0: restoring config space at offset 0x3c >> (was 0x100, writing 0x10a) >> [ 220.898814] pciback 0000:06:00.0: restoring config space at offset 0x10 >> (was 0x4, writing 0xf9a00004) >> [ 220.907406] pciback 0000:06:00.0: restoring config space at offset 0xc >> (was 0x0, writing 0x10) >> [ 222.122750] vpn_bridge: port 1(vif13.0) entered forwarding state >> [ 225.943971] tty_init_dev: 14 callbacks suppressed >> [ 226.654618] device vif16.0 entered promiscuous mode >> [ 226.775073] device vif16.0-emu entered promiscuous mode >> [ 226.784025] xen_bridge: port 17(vif16.0-emu) entered forwarding state >> [ 226.790188] xen_bridge: port 17(vif16.0-emu) entered forwarding state >> [ 228.253024] xen_bridge: port 13(vif14.0) entered forwarding state >> [ 229.788197] xen_bridge: port 15(vif15.0-emu) entered disabled state >> [ 229.796826] xen_bridge: port 15(vif15.0-emu) entered disabled state >> [ 229.805243] device vif15.0-emu left promiscuous mode >> [ 229.813385] xen_bridge: port 15(vif15.0-emu) entered disabled state >> [ 231.558329] xen-blkback:ring-ref 8, event-channel 25, protocol 1 >> (x86_64-abi) >> [ 231.569080] xen-blkback:ring-ref 9, event-channel 26, protocol 1 >> (x86_64-abi) >> [ 231.609663] xen_bridge: port 14(vif15.0) entered forwarding state >> [ 231.617943] xen_bridge: port 14(vif15.0) entered forwarding state >> [ 231.934347] tty_init_dev: 25 callbacks suppressed >> >> >> >> >> >> >> > Ian. >> >> > diff --git a/drivers/net/xen-netback/netback.c >> > b/drivers/net/xen-netback/netback.c >> > index 05593d8..ca4c47d 100644 >> > --- a/drivers/net/xen-netback/netback.c >> > +++ b/drivers/net/xen-netback/netback.c >> > @@ -386,7 +386,7 @@ static struct netbk_rx_meta *get_next_rx_buffer(struct >> > xenvif *vif, >> > * Set up the grant operations for this fragment. If it's a flipping >> > * interface, we also set up the unmap request from here. >> > */ >> > -static void netbk_gop_frag_copy(struct xenvif *vif, struct sk_buff *skb, >> > +static int netbk_gop_frag_copy(struct xenvif *vif, struct sk_buff *skb, >> > struct netrx_pending_operations *npo, >> > struct page *page, unsigned long size, >> > unsigned long offset, int *head) >> > @@ -402,7 +402,8 @@ static void netbk_gop_frag_copy(struct xenvif *vif, >> > struct sk_buff *skb, >> > unsigned long bytes; >> > >> > /* Data must not cross a page boundary. */ >> > - BUG_ON(size + offset > PAGE_SIZE); >> > + if (size + offset > PAGE_SIZE) >> > + return -1; >> > >> > meta = npo->meta + npo->meta_prod - 1; >> > >> > @@ -459,6 +460,7 @@ static void netbk_gop_frag_copy(struct xenvif *vif, >> > struct sk_buff *skb, >> > *head = 0; /* There must be something in this buffer now. >> > */ >> > >> > } >> > + return 0; >> > } >> > >> > /* >> > @@ -517,17 +519,31 @@ static int netbk_gop_skb(struct sk_buff *skb, >> > if (data + len > skb_tail_pointer(skb)) >> > len = skb_tail_pointer(skb) - data; >> > >> > - netbk_gop_frag_copy(vif, skb, npo, >> > - virt_to_page(data), len, offset, >> > &head); >> > + if (netbk_gop_frag_copy(vif, skb, npo, >> > + virt_to_page(data), len, offset, &head) < >> > 0) { >> > +printk(KERN_CRIT "netbk_gop_frag_copy failed: skb head %p-%p\n", >> + skb->>data, skb_tail_pointer); >> > +printk(KERN_CRIT "copying from %p-%p, offset %x, len %x\n", >> > + data, data+len, offset, len); >> > +dump_page(virt_to_page(data)); >> > +BUG(); >> > + } >> > data += len; >> > } >> > >> > for (i = 0; i < nr_frags; i++) { >> > - netbk_gop_frag_copy(vif, skb, npo, >> > + if (netbk_gop_frag_copy(vif, skb, npo, >> > >> > skb_frag_page(&skb_shinfo(skb)->frags[i]), >> > >> > skb_frag_size(&skb_shinfo(skb)->frags[i]), >> > skb_shinfo(skb)->frags[i].page_offset, >> > - &head); >> > + &head) < 0) { >> > +printk(KERN_CRIT "netbk_gop_frag_copy failed: skb frag %d page\n", i); >> > +printk(KERN_CRIT "copying from offset %x, len %x\n", >> > + skb_shinfo(skb)->frags[i].page_offset, >> > + skb_frag_size(&skb_shinfo(skb)->frags[i])); >> > +dump_page(skb_frag_page(&skb_shinfo(skb)->frags[i])); >> > +BUG(); >> > + } >> > } >> > >> > return npo->meta_prod - old_meta_prod; >> >> >> >> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |