All of lore.kernel.org
 help / color / mirror / Atom feed
* Kernel BUG while sending data on 10mbps halfduplex link
@ 2014-07-03  3:37 punnaiah choudary kalluri
  2014-07-03  6:54 ` Eric Dumazet
  0 siblings, 1 reply; 5+ messages in thread
From: punnaiah choudary kalluri @ 2014-07-03  3:37 UTC (permalink / raw)
  To: davem; +Cc: netdev

Hi,

  While sending the data traffic on zynq development board using 10 mbps
 half-duplex link, observed the kernel BUG in skbuff handling.

Zynq setup:
ifconfig eth0 192.186.1.2

Host machine setup:
ifconfig eth0 192.186.1.3
ethtool -s eth0 speed 10 duplex half
tcpreplay -i eth0 kernelpaniccapturejune24.pcap

 Any pointers/directions for finding the root cause for this issue ?

root@zynq:~# [  128.841470] random: nonblocking pool is initialized
[  141.726352] skbuff: skb_over_panic: text:c031b890 len:16383
put:16383 head:eea80000 data:eea80040 tail:0xeea8403f end:0xeea80640
dev:eth0
[  141.726354] ------------[ cut here ]------------
[  141.726354] kernel BUG at net/core/skbuff.c:126!
[  141.726355] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
[  141.726356] Modules linked in: ipv6
[  141.726357] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.13.0-xilinx #1
[  141.726358] task: c06af670 ti: c06a4000 task.ti: c06a4000
[  141.726358] PC is at skb_panic+0x50/0x5c
[  141.726359] LR is at skb_panic+0x50/0x5c
[  141.726360] pc : [<c0494d68>]    lr : [<c0494d68>]    psr: 60070113
[  141.726360] sp : c06a5de8  ip : c07b8da8  fp : 2ea80040
[  141.726362] r10: ef10b810  r9 : c06af344  r8 : 00000000
[  141.726362] r7 : c05d39c4  r6 : eea80000  r5 : eea80040  r4 : eea8403f
[  141.726364] r3 : c06af670  r2 : 00000000  r1 : 60070113  r0 : 0000007d
[  141.726365] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM
Segment kernel
[  141.726366] Control: 18c5387d  Table: 2e9c404a  DAC: 00000015
[  141.726367] Process swapper/0 (pid: 0, stack limit = 0xc06a4240)
[  141.726368] Stack: (0xc06a5de8 to 0xc06a6000)

Regards,
Punnaiah

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernel BUG while sending data on 10mbps halfduplex link
  2014-07-03  3:37 Kernel BUG while sending data on 10mbps halfduplex link punnaiah choudary kalluri
@ 2014-07-03  6:54 ` Eric Dumazet
  2014-07-08  4:27   ` punnaiah choudary kalluri
  0 siblings, 1 reply; 5+ messages in thread
From: Eric Dumazet @ 2014-07-03  6:54 UTC (permalink / raw)
  To: punnaiah choudary kalluri; +Cc: davem, netdev

On Thu, 2014-07-03 at 09:07 +0530, punnaiah choudary kalluri wrote:
> Hi,
> 
>   While sending the data traffic on zynq development board using 10 mbps
>  half-duplex link, observed the kernel BUG in skbuff handling.
> 
> Zynq setup:
> ifconfig eth0 192.186.1.2
> 
> Host machine setup:
> ifconfig eth0 192.186.1.3
> ethtool -s eth0 speed 10 duplex half
> tcpreplay -i eth0 kernelpaniccapturejune24.pcap
> 
>  Any pointers/directions for finding the root cause for this issue ?
> 
> root@zynq:~# [  128.841470] random: nonblocking pool is initialized
> [  141.726352] skbuff: skb_over_panic: text:c031b890 len:16383
> put:16383 head:eea80000 data:eea80040 tail:0xeea8403f end:0xeea80640
> dev:eth0
> [  141.726354] ------------[ cut here ]------------
> [  141.726354] kernel BUG at net/core/skbuff.c:126!
> [  141.726355] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
> [  141.726356] Modules linked in: ipv6
> [  141.726357] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.13.0-xilinx #1
> [  141.726358] task: c06af670 ti: c06a4000 task.ti: c06a4000
> [  141.726358] PC is at skb_panic+0x50/0x5c
> [  141.726359] LR is at skb_panic+0x50/0x5c
> [  141.726360] pc : [<c0494d68>]    lr : [<c0494d68>]    psr: 60070113
> [  141.726360] sp : c06a5de8  ip : c07b8da8  fp : 2ea80040
> [  141.726362] r10: ef10b810  r9 : c06af344  r8 : 00000000
> [  141.726362] r7 : c05d39c4  r6 : eea80000  r5 : eea80040  r4 : eea8403f
> [  141.726364] r3 : c06af670  r2 : 00000000  r1 : 60070113  r0 : 0000007d
> [  141.726365] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM
> Segment kernel
> [  141.726366] Control: 18c5387d  Table: 2e9c404a  DAC: 00000015
> [  141.726367] Process swapper/0 (pid: 0, stack limit = 0xc06a4240)
> [  141.726368] Stack: (0xc06a5de8 to 0xc06a6000)
> 
> Regards,

Kernel stack trace would be useful.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernel BUG while sending data on 10mbps halfduplex link
  2014-07-03  6:54 ` Eric Dumazet
@ 2014-07-08  4:27   ` punnaiah choudary kalluri
  2014-07-08  6:41     ` Eric Dumazet
  0 siblings, 1 reply; 5+ messages in thread
From: punnaiah choudary kalluri @ 2014-07-08  4:27 UTC (permalink / raw)
  To: Eric Dumazet; +Cc: davem, netdev, anirudh, svemula

Hi Eric,

    Here is the stack trace dump.

skb_over_panic: text:c0312914 len:11520 put:11520 head:ee349c00
data:ee349c40 tail:0xee34c940 end:0xee34a240 dev:eth0
------------[ cut here ]------------
kernel BUG at /opt/Xilinx/petalinux-v2014.2-final/components/linux-kernel/xlnx-3.14/net/core/skbuff.c:99!
Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
Modules linked in: ipv6
CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.14.2-xilinx #2
task: c0a1b6b0 ti: c0a10000 task.ti: c0a10000
PC is at skb_panic+0x50/0x5c
LR is at skb_panic+0x50/0x5c
pc : [<c0490d0c>]    lr : [<c0490d0c>]    psr: 600f0113
sp : c0a11dd0  ip : c0b220e8  fp : 2e349c40
r10: 00000001  r9 : ee91d810  r8 : c0a1b384
r7 : c05d82a2  r6 : ee349c00  r5 : ee349c40  r4 : ee34c940
r3 : 600f0113  r2 : 00000000  r1 : 00000110  r0 : 0000007d
Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
Control: 18c5387d  Table: 2e19404a  DAC: 00000015
Process swapper/0 (pid: 0, stack limit = 0xc0a10240)
Stack: (0xc0a11dd0 to 0xc0a12000)
1dc0:                                     00002d00 ee349c00 ee349c40 ee34c940
1de0: ee34a240 ee8ff000 00000000 ee34c940 00002d00 00000000 00000000 c03cfa74
1e00: ee8ff71c f01a50b0 ee1f0b40 c0312914 00000001 2e3db840 00000001 c005f7d0
1e20: 2e3db840 ee1f0c00 00000000 ee8ff69c 00002d00 00000600 00000040 00000040
1e40: c0a556ec ee8ff71c eefd58c0 0000012c 00000040 eefd58c8 c0a556ec ffff95ea
1e60: c0a120c0 c03de320 c0a1208c ffff95ea c03de268 c0a10000 00000008 c0a12080
1e80: c0a10018 00000101 c0a1208c 00000001 c0a5e340 c0026cc0 00000000 c00696a0
1ea0: 00000000 00000003 40000003 0000000a 00200000 ffff95e9 00000000 00000004
1ec0: 9c7c1fe7 c0a10028 c0a0e1b4 00000000 c0a11f4c 9c7c1fe7 00000006 c0f84aa8
1ee0: 00000000 c0027104 c0a10000 00000036 c0a0e1b4 c000efa8 f8f00100 c0a11f18
1f00: c0a19238 c0008530 c0398008 200f0013 ffffffff c0012444 00000001 00000004
1f20: 00000000 c0a1b6b0 9c2ebc89 00000006 00000000 eefd4448 9c7c1fe7 00000006
1f40: c0f84aa8 00000000 00000008 c0a11f60 c005ec48 c0398008 200f0013 ffffffff
1f60: 9c7c1fe7 00000006 00000000 eefd4448 c0a10038 eefd4448 00000000 00000000
1f80: 00000000 c0a4c2b8 00000000 c0398180 c0a10000 c0a10038 c0a5d8c0 ffffffff
1fa0: c06a39d8 c0a183c0 ef7fce00 c000f2b0 c0a1b6b0 c0068cec c049b77c c067cab4
1fc0: ffffffff ffffffff c067c570 00000000 00000000 c06a39d8 18c5387d c0a1840c
1fe0: c06a39d4 c0a1cdbc 0000406a 413fc090 00000000 00008074 00000000 00000000
[<c0490d0c>] (skb_panic) from [<c03cfa74>] (skb_put+0x44/0x50)
[<c03cfa74>] (skb_put) from [<c0312914>] (xemacps_rx_poll+0x23c/0x3f0)
[<c0312914>] (xemacps_rx_poll) from [<c03de320>] (net_rx_action+0xb8/0x180)
[<c03de320>] (net_rx_action) from [<c0026cc0>] (__do_softirq+0x120/0x278)
[<c0026cc0>] (__do_softirq) from [<c0027104>] (irq_exit+0x84/0xf4)
[<c0027104>] (irq_exit) from [<c000efa8>] (handle_IRQ+0x6c/0x90)
[<c000efa8>] (handle_IRQ) from [<c0008530>] (gic_handle_irq+0x3c/0x60)
[<c0008530>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
Exception stack(0xc0a11f18 to 0xc0a11f60)
1f00:                                                       00000001 00000004
1f20: 00000000 c0a1b6b0 9c2ebc89 00000006 00000000 eefd4448 9c7c1fe7 00000006
1f40: c0f84aa8 00000000 00000008 c0a11f60 c005ec48 c0398008 200f0013 ffffffff
[<c0012444>] (__irq_svc) from [<c0398008>] (cpuidle_enter_state+0x54/0xe4)
[<c0398008>] (cpuidle_enter_state) from [<c0398180>]
(cpuidle_idle_call+0xe8/0x140)
[<c0398180>] (cpuidle_idle_call) from [<c000f2b0>] (arch_cpu_idle+0x8/0x3c)
[<c000f2b0>] (arch_cpu_idle) from [<c0068cec>] (cpu_startup_entry+0xc4/0x12c)
[<c0068cec>] (cpu_startup_entry) from [<c067cab4>] (start_kernel+0x324/0x380)
Code: e1a0300c e58de010 e59f0008 ebfff908 (e7f001f2)
---[ end trace 53dd86e60cb384f9 ]---
Kernel panic - not syncing: Fatal exception in interrupt
CPU1: stopping
CPU: 1 PID: 0 Comm: swapper/1 Tainted: G      D      3.14.2-xilinx #2
[<c0015658>] (unwind_backtrace) from [<c00119b4>] (show_stack+0x10/0x14)
[<c00119b4>] (show_stack) from [<c0490688>] (dump_stack+0x8c/0xd0)
[<c0490688>] (dump_stack) from [<c0013e64>] (ipi_cpu_stop+0x3c/0x70)
[<c0013e64>] (ipi_cpu_stop) from [<c00144ec>] (handle_IPI+0x68/0xac)
[<c00144ec>] (handle_IPI) from [<c000854c>] (gic_handle_irq+0x58/0x60)
[<c000854c>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
Exception stack(0xee89bf50 to 0xee89bf98)
bf40:                                     c0398004 00000006 00000018 00000000
bf60: a3ed630c 00000006 00000001 eefdc448 b02eba89 00000006 c0f84aa8 00000000
bf80: 00000008 ee89bf98 c0398004 c0398008 600f0013 ffffffff
[<c0012444>] (__irq_svc) from [<c0398008>] (cpuidle_enter_state+0x54/0xe4)
[<c0398008>] (cpuidle_enter_state) from [<c0398180>]
(cpuidle_idle_call+0xe8/0x140)
[<c0398180>] (cpuidle_idle_call) from [<c000f2b0>] (arch_cpu_idle+0x8/0x3c)
[<c000f2b0>] (arch_cpu_idle) from [<c0068cec>] (cpu_startup_entry+0xc4/0x12c)
[<c0068cec>] (cpu_startup_entry) from [<000085e4>] (0x85e4)
------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at
/opt/Xilinx/petalinux-v2014.2-final/components/linux-kernel/xlnx-3.14/kernel/time/tick-broadcast.c:617
tick_handle_oneshot_broadcast+0x144/0x1cc()
Modules linked in: ipv6
CPU: 0 PID: 0 Comm: swapper/0 Tainted: G      D      3.14.2-xilinx #2
[<c0015658>] (unwind_backtrace) from [<c00119b4>] (show_stack+0x10/0x14)
[<c00119b4>] (show_stack) from [<c0490688>] (dump_stack+0x8c/0xd0)
[<c0490688>] (dump_stack) from [<c002295c>] (warn_slowpath_common+0x60/0x84)
[<c002295c>] (warn_slowpath_common) from [<c0022a10>]
(warn_slowpath_null+0x18/0x20)
[<c0022a10>] (warn_slowpath_null) from [<c007bc74>]
(tick_handle_oneshot_broadcast+0x144/0x1cc)
[<c007bc74>] (tick_handle_oneshot_broadcast) from [<c03af8cc>]
(ttc_clock_event_interrupt+0x18/0x20)
[<c03af8cc>] (ttc_clock_event_interrupt) from [<c0069514>]
(handle_irq_event_percpu+0x2c/0x170)
[<c0069514>] (handle_irq_event_percpu) from [<c0069694>]
(handle_irq_event+0x3c/0x5c)
[<c0069694>] (handle_irq_event) from [<c006c340>] (handle_fasteoi_irq+0xb4/0xfc)
[<c006c340>] (handle_fasteoi_irq) from [<c0068d84>]
(generic_handle_irq+0x20/0x30)
[<c0068d84>] (generic_handle_irq) from [<c000efa4>] (handle_IRQ+0x68/0x90)
[<c000efa4>] (handle_IRQ) from [<c0008530>] (gic_handle_irq+0x3c/0x60)
[<c0008530>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
Exception stack(0xc0a11bf0 to 0xc0a11c38)
1be0:                                     c048e054 00000000 00000103 00000000
1c00: 00000000 0000000b 00000000 c0a5dec8 c0a1cd8c c0490d0c 00000000 00000001
1c20: c00673bc c0a11c38 c048e054 c048e058 600f0113 ffffffff
[<c0012444>] (__irq_svc) from [<c048e058>] (panic+0x164/0x1dc)
[<c048e058>] (panic) from [<c0011c38>] (die+0x280/0x39c)
[<c0011c38>] (die) from [<c00082cc>] (do_undefinstr+0x88/0x17c)
[<c00082cc>] (do_undefinstr) from [<c00124f0>] (__und_svc_finish+0x0/0x30)
Exception stack(0xc0a11d88 to 0xc0a11dd0)
1d80:                   0000007d 00000110 00000000 600f0113 ee34c940 ee349c40
1da0: ee349c00 c05d82a2 c0a1b384 ee91d810 00000001 2e349c40 c0b220e8 c0a11dd0
1dc0: c0490d0c c0490d0c 600f0113 ffffffff
[<c00124f0>] (__und_svc_finish) from [<c0490d0c>] (skb_panic+0x50/0x5c)
[<c0490d0c>] (skb_panic) from [<c03cfa74>] (skb_put+0x44/0x50)
[<c03cfa74>] (skb_put) from [<c0312914>] (xemacps_rx_poll+0x23c/0x3f0)
[<c0312914>] (xemacps_rx_poll) from [<c03de320>] (net_rx_action+0xb8/0x180)
[<c03de320>] (net_rx_action) from [<c0026cc0>] (__do_softirq+0x120/0x278)
[<c0026cc0>] (__do_softirq) from [<c0027104>] (irq_exit+0x84/0xf4)
[<c0027104>] (irq_exit) from [<c000efa8>] (handle_IRQ+0x6c/0x90)
[<c000efa8>] (handle_IRQ) from [<c0008530>] (gic_handle_irq+0x3c/0x60)
[<c0008530>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
Exception stack(0xc0a11f18 to 0xc0a11f60)
1f00:                                                       00000001 00000004
1f20: 00000000 c0a1b6b0 9c2ebc89 00000006 00000000 eefd4448 9c7c1fe7 00000006
1f40: c0f84aa8 00000000 00000008 c0a11f60 c005ec48 c0398008 200f0013 ffffffff
[<c0012444>] (__irq_svc) from [<c0398008>] (cpuidle_enter_state+0x54/0xe4)
[<c0398008>] (cpuidle_enter_state) from [<c0398180>]
(cpuidle_idle_call+0xe8/0x140)
[<c0398180>] (cpuidle_idle_call) from [<c000f2b0>] (arch_cpu_idle+0x8/0x3c)
[<c000f2b0>] (arch_cpu_idle) from [<c0068cec>] (cpu_startup_entry+0xc4/0x12c)
[<c0068cec>] (cpu_startup_entry) from [<c067cab4>] (start_kernel+0x324/0x380)
---[ end trace 53dd86e60cb384fa ]---
random: nonblocking pool is initialized

Regards,
Punnaiah

On Thu, Jul 3, 2014 at 12:24 PM, Eric Dumazet <eric.dumazet@gmail.com> wrote:
> On Thu, 2014-07-03 at 09:07 +0530, punnaiah choudary kalluri wrote:
>> Hi,
>>
>>   While sending the data traffic on zynq development board using 10 mbps
>>  half-duplex link, observed the kernel BUG in skbuff handling.
>>
>> Zynq setup:
>> ifconfig eth0 192.186.1.2
>>
>> Host machine setup:
>> ifconfig eth0 192.186.1.3
>> ethtool -s eth0 speed 10 duplex half
>> tcpreplay -i eth0 kernelpaniccapturejune24.pcap
>>
>>  Any pointers/directions for finding the root cause for this issue ?
>>
>> root@zynq:~# [  128.841470] random: nonblocking pool is initialized
>> [  141.726352] skbuff: skb_over_panic: text:c031b890 len:16383
>> put:16383 head:eea80000 data:eea80040 tail:0xeea8403f end:0xeea80640
>> dev:eth0
>> [  141.726354] ------------[ cut here ]------------
>> [  141.726354] kernel BUG at net/core/skbuff.c:126!
>> [  141.726355] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>> [  141.726356] Modules linked in: ipv6
>> [  141.726357] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.13.0-xilinx #1
>> [  141.726358] task: c06af670 ti: c06a4000 task.ti: c06a4000
>> [  141.726358] PC is at skb_panic+0x50/0x5c
>> [  141.726359] LR is at skb_panic+0x50/0x5c
>> [  141.726360] pc : [<c0494d68>]    lr : [<c0494d68>]    psr: 60070113
>> [  141.726360] sp : c06a5de8  ip : c07b8da8  fp : 2ea80040
>> [  141.726362] r10: ef10b810  r9 : c06af344  r8 : 00000000
>> [  141.726362] r7 : c05d39c4  r6 : eea80000  r5 : eea80040  r4 : eea8403f
>> [  141.726364] r3 : c06af670  r2 : 00000000  r1 : 60070113  r0 : 0000007d
>> [  141.726365] Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM
>> Segment kernel
>> [  141.726366] Control: 18c5387d  Table: 2e9c404a  DAC: 00000015
>> [  141.726367] Process swapper/0 (pid: 0, stack limit = 0xc06a4240)
>> [  141.726368] Stack: (0xc06a5de8 to 0xc06a6000)
>>
>> Regards,
>
> Kernel stack trace would be useful.
>
>
>
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernel BUG while sending data on 10mbps halfduplex link
  2014-07-08  4:27   ` punnaiah choudary kalluri
@ 2014-07-08  6:41     ` Eric Dumazet
  2014-07-08  6:55       ` punnaiah choudary kalluri
  0 siblings, 1 reply; 5+ messages in thread
From: Eric Dumazet @ 2014-07-08  6:41 UTC (permalink / raw)
  To: punnaiah choudary kalluri; +Cc: davem, netdev, anirudh, svemula

On Tue, 2014-07-08 at 09:57 +0530, punnaiah choudary kalluri wrote:
> Hi Eric,
> 
>     Here is the stack trace dump.
> 
> skb_over_panic: text:c0312914 len:11520 put:11520 head:ee349c00
> data:ee349c40 tail:0xee34c940 end:0xee34a240 dev:eth0
> ------------[ cut here ]------------
> kernel BUG at /opt/Xilinx/petalinux-v2014.2-final/components/linux-kernel/xlnx-3.14/net/core/skbuff.c:99!
> Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
> Modules linked in: ipv6
> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.14.2-xilinx #2
> task: c0a1b6b0 ti: c0a10000 task.ti: c0a10000
> PC is at skb_panic+0x50/0x5c
> LR is at skb_panic+0x50/0x5c
> pc : [<c0490d0c>]    lr : [<c0490d0c>]    psr: 600f0113
> sp : c0a11dd0  ip : c0b220e8  fp : 2e349c40
> r10: 00000001  r9 : ee91d810  r8 : c0a1b384
> r7 : c05d82a2  r6 : ee349c00  r5 : ee349c40  r4 : ee34c940
> r3 : 600f0113  r2 : 00000000  r1 : 00000110  r0 : 0000007d
> Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
> Control: 18c5387d  Table: 2e19404a  DAC: 00000015
> Process swapper/0 (pid: 0, stack limit = 0xc0a10240)
> Stack: (0xc0a11dd0 to 0xc0a12000)
> 1dc0:                                     00002d00 ee349c00 ee349c40 ee34c940
> 1de0: ee34a240 ee8ff000 00000000 ee34c940 00002d00 00000000 00000000 c03cfa74
> 1e00: ee8ff71c f01a50b0 ee1f0b40 c0312914 00000001 2e3db840 00000001 c005f7d0
> 1e20: 2e3db840 ee1f0c00 00000000 ee8ff69c 00002d00 00000600 00000040 00000040
> 1e40: c0a556ec ee8ff71c eefd58c0 0000012c 00000040 eefd58c8 c0a556ec ffff95ea
> 1e60: c0a120c0 c03de320 c0a1208c ffff95ea c03de268 c0a10000 00000008 c0a12080
> 1e80: c0a10018 00000101 c0a1208c 00000001 c0a5e340 c0026cc0 00000000 c00696a0
> 1ea0: 00000000 00000003 40000003 0000000a 00200000 ffff95e9 00000000 00000004
> 1ec0: 9c7c1fe7 c0a10028 c0a0e1b4 00000000 c0a11f4c 9c7c1fe7 00000006 c0f84aa8
> 1ee0: 00000000 c0027104 c0a10000 00000036 c0a0e1b4 c000efa8 f8f00100 c0a11f18
> 1f00: c0a19238 c0008530 c0398008 200f0013 ffffffff c0012444 00000001 00000004
> 1f20: 00000000 c0a1b6b0 9c2ebc89 00000006 00000000 eefd4448 9c7c1fe7 00000006
> 1f40: c0f84aa8 00000000 00000008 c0a11f60 c005ec48 c0398008 200f0013 ffffffff
> 1f60: 9c7c1fe7 00000006 00000000 eefd4448 c0a10038 eefd4448 00000000 00000000
> 1f80: 00000000 c0a4c2b8 00000000 c0398180 c0a10000 c0a10038 c0a5d8c0 ffffffff
> 1fa0: c06a39d8 c0a183c0 ef7fce00 c000f2b0 c0a1b6b0 c0068cec c049b77c c067cab4
> 1fc0: ffffffff ffffffff c067c570 00000000 00000000 c06a39d8 18c5387d c0a1840c
> 1fe0: c06a39d4 c0a1cdbc 0000406a 413fc090 00000000 00008074 00000000 00000000
> [<c0490d0c>] (skb_panic) from [<c03cfa74>] (skb_put+0x44/0x50)
> [<c03cfa74>] (skb_put) from [<c0312914>] (xemacps_rx_poll+0x23c/0x3f0)
> [<c0312914>] (xemacps_rx_poll) from [<c03de320>] (net_rx_action+0xb8/0x180)
> [<c03de320>] (net_rx_action) from [<c0026cc0>] (__do_softirq+0x120/0x278)
> [<c0026cc0>] (__do_softirq) from [<c0027104>] (irq_exit+0x84/0xf4)
> [<c0027104>] (irq_exit) from [<c000efa8>] (handle_IRQ+0x6c/0x90)
> [<c000efa8>] (handle_IRQ) from [<c0008530>] (gic_handle_irq+0x3c/0x60)
> [<c0008530>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
> Exception stack(0xc0a11f18 to 0xc0a11f60)

This is an out of tree driver.

You should add a pointer to the source code if you want some help from
us.

Hint: before trusting frame length given by the hardware, add a check to
make sure its not bigger than allocated skb.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: Kernel BUG while sending data on 10mbps halfduplex link
  2014-07-08  6:41     ` Eric Dumazet
@ 2014-07-08  6:55       ` punnaiah choudary kalluri
  0 siblings, 0 replies; 5+ messages in thread
From: punnaiah choudary kalluri @ 2014-07-08  6:55 UTC (permalink / raw)
  To: Eric Dumazet; +Cc: davem, netdev, anirudh, svemula

On Tue, Jul 8, 2014 at 12:11 PM, Eric Dumazet <eric.dumazet@gmail.com> wrote:
> On Tue, 2014-07-08 at 09:57 +0530, punnaiah choudary kalluri wrote:
>> Hi Eric,
>>
>>     Here is the stack trace dump.
>>
>> skb_over_panic: text:c0312914 len:11520 put:11520 head:ee349c00
>> data:ee349c40 tail:0xee34c940 end:0xee34a240 dev:eth0
>> ------------[ cut here ]------------
>> kernel BUG at /opt/Xilinx/petalinux-v2014.2-final/components/linux-kernel/xlnx-3.14/net/core/skbuff.c:99!
>> Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM
>> Modules linked in: ipv6
>> CPU: 0 PID: 0 Comm: swapper/0 Not tainted 3.14.2-xilinx #2
>> task: c0a1b6b0 ti: c0a10000 task.ti: c0a10000
>> PC is at skb_panic+0x50/0x5c
>> LR is at skb_panic+0x50/0x5c
>> pc : [<c0490d0c>]    lr : [<c0490d0c>]    psr: 600f0113
>> sp : c0a11dd0  ip : c0b220e8  fp : 2e349c40
>> r10: 00000001  r9 : ee91d810  r8 : c0a1b384
>> r7 : c05d82a2  r6 : ee349c00  r5 : ee349c40  r4 : ee34c940
>> r3 : 600f0113  r2 : 00000000  r1 : 00000110  r0 : 0000007d
>> Flags: nZCv  IRQs on  FIQs on  Mode SVC_32  ISA ARM  Segment kernel
>> Control: 18c5387d  Table: 2e19404a  DAC: 00000015
>> Process swapper/0 (pid: 0, stack limit = 0xc0a10240)
>> Stack: (0xc0a11dd0 to 0xc0a12000)
>> 1dc0:                                     00002d00 ee349c00 ee349c40 ee34c940
>> 1de0: ee34a240 ee8ff000 00000000 ee34c940 00002d00 00000000 00000000 c03cfa74
>> 1e00: ee8ff71c f01a50b0 ee1f0b40 c0312914 00000001 2e3db840 00000001 c005f7d0
>> 1e20: 2e3db840 ee1f0c00 00000000 ee8ff69c 00002d00 00000600 00000040 00000040
>> 1e40: c0a556ec ee8ff71c eefd58c0 0000012c 00000040 eefd58c8 c0a556ec ffff95ea
>> 1e60: c0a120c0 c03de320 c0a1208c ffff95ea c03de268 c0a10000 00000008 c0a12080
>> 1e80: c0a10018 00000101 c0a1208c 00000001 c0a5e340 c0026cc0 00000000 c00696a0
>> 1ea0: 00000000 00000003 40000003 0000000a 00200000 ffff95e9 00000000 00000004
>> 1ec0: 9c7c1fe7 c0a10028 c0a0e1b4 00000000 c0a11f4c 9c7c1fe7 00000006 c0f84aa8
>> 1ee0: 00000000 c0027104 c0a10000 00000036 c0a0e1b4 c000efa8 f8f00100 c0a11f18
>> 1f00: c0a19238 c0008530 c0398008 200f0013 ffffffff c0012444 00000001 00000004
>> 1f20: 00000000 c0a1b6b0 9c2ebc89 00000006 00000000 eefd4448 9c7c1fe7 00000006
>> 1f40: c0f84aa8 00000000 00000008 c0a11f60 c005ec48 c0398008 200f0013 ffffffff
>> 1f60: 9c7c1fe7 00000006 00000000 eefd4448 c0a10038 eefd4448 00000000 00000000
>> 1f80: 00000000 c0a4c2b8 00000000 c0398180 c0a10000 c0a10038 c0a5d8c0 ffffffff
>> 1fa0: c06a39d8 c0a183c0 ef7fce00 c000f2b0 c0a1b6b0 c0068cec c049b77c c067cab4
>> 1fc0: ffffffff ffffffff c067c570 00000000 00000000 c06a39d8 18c5387d c0a1840c
>> 1fe0: c06a39d4 c0a1cdbc 0000406a 413fc090 00000000 00008074 00000000 00000000
>> [<c0490d0c>] (skb_panic) from [<c03cfa74>] (skb_put+0x44/0x50)
>> [<c03cfa74>] (skb_put) from [<c0312914>] (xemacps_rx_poll+0x23c/0x3f0)
>> [<c0312914>] (xemacps_rx_poll) from [<c03de320>] (net_rx_action+0xb8/0x180)
>> [<c03de320>] (net_rx_action) from [<c0026cc0>] (__do_softirq+0x120/0x278)
>> [<c0026cc0>] (__do_softirq) from [<c0027104>] (irq_exit+0x84/0xf4)
>> [<c0027104>] (irq_exit) from [<c000efa8>] (handle_IRQ+0x6c/0x90)
>> [<c000efa8>] (handle_IRQ) from [<c0008530>] (gic_handle_irq+0x3c/0x60)
>> [<c0008530>] (gic_handle_irq) from [<c0012444>] (__irq_svc+0x44/0x78)
>> Exception stack(0xc0a11f18 to 0xc0a11f60)
>
> This is an out of tree driver.
>
> You should add a pointer to the source code if you want some help from
> us.

Here is the link for source code

https://github.com/Xilinx/linux-xlnx/blob/master-next/drivers/net/ethernet/xilinx/xilinx_emacps.c

>
> Hint: before trusting frame length given by the hardware, add a check to
> make sure its not bigger than allocated skb.

Thanks for the hit. I will add this check to the driver and see if
hardware reports invalid length

Regards,
Punnaiah
>
>
>
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at  http://vger.kernel.org/majordomo-info.html

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2014-07-08  6:55 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-07-03  3:37 Kernel BUG while sending data on 10mbps halfduplex link punnaiah choudary kalluri
2014-07-03  6:54 ` Eric Dumazet
2014-07-08  4:27   ` punnaiah choudary kalluri
2014-07-08  6:41     ` Eric Dumazet
2014-07-08  6:55       ` punnaiah choudary kalluri

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.