Kernel panic in get_rx_page_info() function of kernel module be2net.
Issue
- Kernel panic with following call traces.
Kernel BUG at drivers/net/benet/be_main.c:638
invalid opcode: 0000 [1] SMP
last sysfs file: /devices/pci0000:00/0000:00:07.0/0000:0d:00.1/irq
CPU 7
Modules linked in: nfs fscache nfs_acl mptctl mptbase ipmi_devintf ipmi_si ipmi_msghandler lockd sunrpc bonding bnx2i libiscsi2 cnic ipv6 xfrm_nalgo crypto_api uio scsi_transport_iscsi2 scsi_transport_iscsi loop dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec i2c_core dell_wmi wmi button battery asus_acpi acpi_memhotplug ac parport_pc lp parport sr_mod cdrom sg be2net bnx2 hpilo shpchp serio_raw pcspkr 8021q dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod usb_storage ata_piix libata cciss sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 20770, comm: bptm Not tainted 2.6.18-194.el5 #1
RIP: 0010:[<ffffffff8825b3c2>] [<ffffffff8825b3c2>] :be2net:get_rx_page_info+0x1f/0x6b
RSP: 0018:ffff81031fcf7dd0 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff81031df10500 RCX: ffff81031cf0b800
RDX: 0000000000000000 RSI: 00000000000000c0 RDI: ffff81031df10500
RBP: ffff81031df14800 R08: 000000000000000c R09: 0000000000000000
R10: ffff8100780d60c0 R11: 00000000000000c8 R12: 00000000000005ea
R13: ffff81031df10500 R14: 0000000000000000 R15: 0000000000000008
FS: 00002b4a2189b0e0(0000) GS:ffff81061fe433c0(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00002b4a3f83f000 CR3: 00000000cf895000 CR4: 00000000000006e0
Process bptm (pid: 20770, threadinfo ffff8100642ba000, task ffff81014dfc17a0)
Stack: ffff81031df10510 0000000000002008 ffff8100780d60c0 ffffffff8825c9ef
0000000000000000 00000040b0f5d080 ffff810010120080 00000004b0f5d080
ffff810010120084 000005ea00000286 000005eaffff0001 0000000100000001
Call Trace:
<IRQ> [<ffffffff8825c9ef>] :be2net:be_poll_rx+0xfe/0x858
[<ffffffff8825d1d4>] :be2net:be_poll+0x8b/0x119
[<ffffffff882594d6>] :be2net:be_process_mcc+0x10c/0x11c
[<ffffffff8825b008>] :be2net:be_poll_compat+0x24/0x40
[<ffffffff8000c88a>] net_rx_action+0xac/0x1e0
[<ffffffff8825e5b8>] :be2net:be_msix+0x5b/0x83
[<ffffffff80012409>] __do_softirq+0x89/0x133
[<ffffffff8005f2fc>] call_softirq+0x1c/0x28
[<ffffffff8006dba8>] do_softirq+0x2c/0x85
[<ffffffff8006da30>] do_IRQ+0xec/0xf5
[<ffffffff8005e615>] ret_from_intr+0x0/0xa
<EOI> [<ffffffff80065a88>] _spin_lock+0x3/0xa
[<ffffffff800d0d45>] page_check_address+0xe7/0x164
[<ffffffff800d1196>] page_referenced_one+0x6a/0xfb
[<ffffffff80033834>] page_referenced_file+0x90/0xc3
[<ffffffff8003c38f>] page_referenced+0xcb/0xe4
[<ffffffff800cb6e5>] shrink_active_list+0x19c/0x4c4
[<ffffffff8001312d>] shrink_zone+0x10a/0x18d
[<ffffffff800ccb68>] try_to_free_pages+0x18b/0x2d7
[<ffffffff800cd378>] zone_statistics+0x3e/0x6d
[<ffffffff8000f47f>] __alloc_pages+0x1f8/0x308
[<ffffffff800da60d>] shmem_getpage+0x464/0x64a
[<ffffffff800dae0a>] shmem_nopage+0x50/0x7a
[<ffffffff8000898c>] __handle_mm_fault+0x1fa/0xfaa
[<ffffffff8002fcd3>] dev_queue_xmit+0x250/0x271
[<ffffffff80067b55>] do_page_fault+0x4cb/0x874
[<ffffffff8022ff8d>] dev_hard_start_xmit+0x1b7/0x28a
[<ffffffff80151248>] __next_cpu+0x19/0x28
[<ffffffff8008ccb0>] find_busiest_group+0x20d/0x621
[<ffffffff8005ede9>] error_exit+0x0/0x84
[<ffffffff80062ded>] copy_user_generic_unrolled+0x65/0xac
[<ffffffff8003feac>] memcpy_toiovec+0x36/0x66
[<ffffffff80031a66>] skb_copy_datagram_iovec+0x15c/0x221
[<ffffffff8001b9ee>] tcp_rcv_established+0x313/0x925
[<ffffffff8003b875>] tcp_v4_do_rcv+0x2a/0x2fa
[<ffffffff80228f92>] sk_wait_data+0xac/0xbf
[<ffffffff800a1ba4>] autoremove_wake_function+0x0/0x2e
[<ffffffff802540f3>] tcp_prequeue_process+0x34/0x7d
[<ffffffff8001d59e>] tcp_recvmsg+0x492/0xb2a
[<ffffffff80031f80>] sock_common_recvmsg+0x2d/0x43
[<ffffffff800308a3>] sock_recvmsg+0x107/0x15f
[<ffffffff800a1ba4>] autoremove_wake_function+0x0/0x2e
[<ffffffff8002a237>] file_update_time+0x30/0xdb
[<ffffffff80008e01>] __handle_mm_fault+0x66f/0xfaa
[<ffffffff8022678b>] sock_from_file+0xf/0x60
[<ffffffff8002b9a9>] sys_recvfrom+0xd4/0x130
[<ffffffff80063ff8>] thread_return+0x62/0xfe
[<ffffffff800328cb>] sys_faccessat+0xe4/0x18d
[<ffffffff8005e116>] system_call+0x7e/0x83
Code: 0f 0b 68 b4 fc 25 88 c2 7e 02 80 7d 12 00 74 2d 48 8b 03 31
RIP [<ffffffff8825b3c2>] :be2net:get_rx_page_info+0x1f/0x6b
RSP <ffff81031fcf7dd0>
Environment
- Red Hat Enterprise Linux 5
- Kernel-2.6.18-194.el5
- be2net
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.