Kernel panic in get_rx_page_info() function of kernel module be2net.

Solution Unverified - Updated -

Issue

  • Kernel panic with following call traces.
Kernel BUG at drivers/net/benet/be_main.c:638
invalid opcode: 0000 [1] SMP 
last sysfs file: /devices/pci0000:00/0000:00:07.0/0000:0d:00.1/irq
CPU 7 
Modules linked in: nfs fscache nfs_acl mptctl mptbase ipmi_devintf ipmi_si ipmi_msghandler lockd sunrpc bonding bnx2i libiscsi2 cnic ipv6 xfrm_nalgo crypto_api uio scsi_transport_iscsi2 scsi_transport_iscsi loop dm_multipath scsi_dh video backlight sbs power_meter hwmon i2c_ec i2c_core dell_wmi wmi button battery asus_acpi acpi_memhotplug ac parport_pc lp parport sr_mod cdrom sg be2net bnx2 hpilo shpchp serio_raw pcspkr 8021q dm_raid45 dm_message dm_region_hash dm_mem_cache dm_snapshot dm_zero dm_mirror dm_log dm_mod usb_storage ata_piix libata cciss sd_mod scsi_mod ext3 jbd uhci_hcd ohci_hcd ehci_hcd
Pid: 20770, comm: bptm Not tainted 2.6.18-194.el5 #1
RIP: 0010:[<ffffffff8825b3c2>]  [<ffffffff8825b3c2>] :be2net:get_rx_page_info+0x1f/0x6b
RSP: 0018:ffff81031fcf7dd0  EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff81031df10500 RCX: ffff81031cf0b800
RDX: 0000000000000000 RSI: 00000000000000c0 RDI: ffff81031df10500
RBP: ffff81031df14800 R08: 000000000000000c R09: 0000000000000000
R10: ffff8100780d60c0 R11: 00000000000000c8 R12: 00000000000005ea
R13: ffff81031df10500 R14: 0000000000000000 R15: 0000000000000008
FS:  00002b4a2189b0e0(0000) GS:ffff81061fe433c0(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: 00002b4a3f83f000 CR3: 00000000cf895000 CR4: 00000000000006e0
Process bptm (pid: 20770, threadinfo ffff8100642ba000, task ffff81014dfc17a0)
Stack:  ffff81031df10510 0000000000002008 ffff8100780d60c0 ffffffff8825c9ef
 0000000000000000 00000040b0f5d080 ffff810010120080 00000004b0f5d080
 ffff810010120084 000005ea00000286 000005eaffff0001 0000000100000001
Call Trace:
 <IRQ>  [<ffffffff8825c9ef>] :be2net:be_poll_rx+0xfe/0x858
 [<ffffffff8825d1d4>] :be2net:be_poll+0x8b/0x119
 [<ffffffff882594d6>] :be2net:be_process_mcc+0x10c/0x11c
 [<ffffffff8825b008>] :be2net:be_poll_compat+0x24/0x40
 [<ffffffff8000c88a>] net_rx_action+0xac/0x1e0
 [<ffffffff8825e5b8>] :be2net:be_msix+0x5b/0x83
 [<ffffffff80012409>] __do_softirq+0x89/0x133
 [<ffffffff8005f2fc>] call_softirq+0x1c/0x28
 [<ffffffff8006dba8>] do_softirq+0x2c/0x85
 [<ffffffff8006da30>] do_IRQ+0xec/0xf5
 [<ffffffff8005e615>] ret_from_intr+0x0/0xa
 <EOI>  [<ffffffff80065a88>] _spin_lock+0x3/0xa
 [<ffffffff800d0d45>] page_check_address+0xe7/0x164
 [<ffffffff800d1196>] page_referenced_one+0x6a/0xfb
 [<ffffffff80033834>] page_referenced_file+0x90/0xc3
 [<ffffffff8003c38f>] page_referenced+0xcb/0xe4
 [<ffffffff800cb6e5>] shrink_active_list+0x19c/0x4c4
 [<ffffffff8001312d>] shrink_zone+0x10a/0x18d
 [<ffffffff800ccb68>] try_to_free_pages+0x18b/0x2d7
 [<ffffffff800cd378>] zone_statistics+0x3e/0x6d
 [<ffffffff8000f47f>] __alloc_pages+0x1f8/0x308
 [<ffffffff800da60d>] shmem_getpage+0x464/0x64a
 [<ffffffff800dae0a>] shmem_nopage+0x50/0x7a
 [<ffffffff8000898c>] __handle_mm_fault+0x1fa/0xfaa
 [<ffffffff8002fcd3>] dev_queue_xmit+0x250/0x271
 [<ffffffff80067b55>] do_page_fault+0x4cb/0x874
 [<ffffffff8022ff8d>] dev_hard_start_xmit+0x1b7/0x28a
 [<ffffffff80151248>] __next_cpu+0x19/0x28
 [<ffffffff8008ccb0>] find_busiest_group+0x20d/0x621
 [<ffffffff8005ede9>] error_exit+0x0/0x84
 [<ffffffff80062ded>] copy_user_generic_unrolled+0x65/0xac
 [<ffffffff8003feac>] memcpy_toiovec+0x36/0x66
 [<ffffffff80031a66>] skb_copy_datagram_iovec+0x15c/0x221
 [<ffffffff8001b9ee>] tcp_rcv_established+0x313/0x925
 [<ffffffff8003b875>] tcp_v4_do_rcv+0x2a/0x2fa
 [<ffffffff80228f92>] sk_wait_data+0xac/0xbf
 [<ffffffff800a1ba4>] autoremove_wake_function+0x0/0x2e
 [<ffffffff802540f3>] tcp_prequeue_process+0x34/0x7d
 [<ffffffff8001d59e>] tcp_recvmsg+0x492/0xb2a
 [<ffffffff80031f80>] sock_common_recvmsg+0x2d/0x43
 [<ffffffff800308a3>] sock_recvmsg+0x107/0x15f
 [<ffffffff800a1ba4>] autoremove_wake_function+0x0/0x2e
 [<ffffffff8002a237>] file_update_time+0x30/0xdb
 [<ffffffff80008e01>] __handle_mm_fault+0x66f/0xfaa
 [<ffffffff8022678b>] sock_from_file+0xf/0x60
 [<ffffffff8002b9a9>] sys_recvfrom+0xd4/0x130
 [<ffffffff80063ff8>] thread_return+0x62/0xfe
 [<ffffffff800328cb>] sys_faccessat+0xe4/0x18d
 [<ffffffff8005e116>] system_call+0x7e/0x83

Code: 0f 0b 68 b4 fc 25 88 c2 7e 02 80 7d 12 00 74 2d 48 8b 03 31 
RIP  [<ffffffff8825b3c2>] :be2net:get_rx_page_info+0x1f/0x6b
 RSP <ffff81031fcf7dd0>

Environment

  • Red Hat Enterprise Linux 5
  • Kernel-2.6.18-194.el5
  • be2net

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content