[ovs-dev] Kernel BUG on Xen

Nick Couchman Nick.Couchman at seakr.com
Thu Apr 22 16:58:06 UTC 2010


I'm currently trying to use Open vSwitch to replace Linux bridging on some Xen machines.  I'm using the latest copy from the git repo, and am running into a kernel bug when openvswitch tries to compute checksums on packets coming from Xen guests that don't have checksums computed.  Kernel bug message is below, and seems to occur as soon as the Xen guests tries to send out the first packet(s).

Any hints would be appreciated, and I'm happy to provide more debug output, if needed.

-Nick

[  122.225440] ------------[ cut here ]------------
[  122.225454] kernel BUG at /usr/src/packages/BUILD/kernel-xen-2.6.31.12/linux-2.6.31/net/core/skbuff.c:1204!
[  122.225459] invalid opcode: 0000 [#1] SMP 
[  122.225463] last sysfs file: /sys/devices/xen-backend/vbd-1-768/statistics/wr_sect
[  122.225467] CPU 0 
[  122.225470] Modules linked in: tun gntdev netbk blkbk blkback_pagemap blktap autofs4 edd ipv6 af_packet microcode brcompat_mod openvswitch_mod fuse loop dm_mod iTCO_wdt ppdev i2c
_i801 e1000e serio_raw pcspkr iTCO_vendor_support sr_mod parport_pc i2c_core heci(C) dcdbas intel_agp sg parport agpgart button 8250_pci 8250_pnp 8250 serial_core xenblk cdrom xenne
t pciback xenbus_be fan processor ide_pci_generic ide_core ata_generic thermal thermal_sys hwmon
[  122.225529] Pid: 0, comm: swapper Tainted: G         C 2.6.31.12-0.2-xen #1 OptiPlex 755                 
[  122.225533] RIP: e030:[<ffffffff803b8c9d>]  [<ffffffff803b8c9d>] __pskb_pull_tail+0x6d/0x380
[  122.225572] RSP: e02b:ffffc90000003b10  EFLAGS: 00010282
[  122.225575] RAX: 00000000fffffff2 RBX: ffff8800713028c0 RCX: 00000000ffffffec
[  122.225579] RDX: 0000000000000000 RSI: 0000000000000080 RDI: ffff8800713028c0
[  122.225582] RBP: ffffc90000003b60 R08: ffff88002fd42c48 R09: 0000000000000024
[  122.225585] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000ffffffec
[  122.225588] R13: 0000000000000000 R14: ffff88002fd42c20 R15: 0000000000000000
[  122.225598] FS:  00007fc4cff986f0(0000) GS:ffffc90000000000(0000) knlGS:0000000000000000
[  122.225602] CS:  e033 DS: 0000 ES: 0000 CR0: 000000008005003b
[  122.225605] CR2: 0000000000694098 CR3: 000000007133d000 CR4: 0000000000002660
[  122.225608] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  122.225612] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
[  122.225616] Process swapper (pid: 0, threadinfo ffffffff80736000, task ffffffff807390a0)
[  122.225619] Stack:
[  122.225620]  ffff8800710e74c0 ffff880072060000 ffffc9000000a408 3bf1cce02d8e47c8
[  122.225626] <0> 3bf1cce02d8e47c8 ffff8800713028c0 ffff88002fd42c00 0000000000000000
[  122.225632] <0> ffff88002fd42c20 0000000000000000 ffffc90000003ba0 ffffffffa01e5039
[  122.225639] Call Trace:
[  122.225655]  [<ffffffffa01e5039>] vswitch_skb_checksum_setup+0x159/0x180 [openvswitch_mod]
[  122.225671]  [<ffffffffa01e5132>] dp_output_control+0xd2/0x2f0 [openvswitch_mod]
[  122.225681]  [<ffffffffa01e54af>] dp_process_received_packet+0x15f/0x1c0 [openvswitch_mod]
[  122.225693]  [<ffffffffa01e9dc8>] vport_receive+0x38/0xc0 [openvswitch_mod]
[  122.225709]  [<ffffffffa01ee80f>] netdev_frame_hook+0x7f/0xb0 [openvswitch_mod]
[  122.225726]  [<ffffffff803c55b2>] netif_receive_skb+0x202/0x590
[  122.225733]  [<ffffffff803c59e1>] process_backlog+0xa1/0x140
[  122.225738]  [<ffffffff803c63dc>] net_rx_action+0x14c/0x2e0
[  122.225745]  [<ffffffff80057e03>] __do_softirq+0xe3/0x240
[  122.225753]  [<ffffffff8000d48c>] call_softirq+0x1c/0x30
[  122.225759]  [<ffffffff8000ec05>] do_softirq+0xb5/0x100
[  122.225764]  [<ffffffff80057625>] irq_exit+0x65/0x80
[  122.225771]  [<ffffffff802fc12c>] evtchn_do_upcall+0x20c/0x250
[  122.225777]  [<ffffffff8000ceee>] do_hypervisor_callback+0x1e/0x30
[  122.225784]  [<ffffffff800083aa>] 0xffffffff800083aa
[  122.225793]  [<ffffffff8000f9a8>] xen_safe_halt+0x28/0x50
[  122.225799]  [<ffffffff80014999>] xen_idle+0x59/0x120
[  122.225805]  [<ffffffff8000b09b>] cpu_idle+0xbb/0x100
[  122.225811]  [<ffffffff8045b415>] rest_init+0x75/0x90
[  122.225818]  [<ffffffff80793c6b>] start_kernel+0x36d/0x38a
[  122.225824]  [<ffffffff80792d94>] x86_64_start_reservations+0xf4/0x10f
[  122.225830]  [<ffffffff80792dfa>] x86_64_start_kernel+0x4b/0x66
[  122.225833] Code: 47 7c 02 0f 85 40 02 00 00 48 8b 87 e0 00 00 00 8b 73 68 2b 73 6c 89 ca 48 8d 14 10 44 89 e1 48 89 df e8 d7 fc ff ff 85 c0 74 04 <0f> 0b eb fe 8b b3 d8 00 00 00
 4c 8b 83 e0 00 00 00 49 8d 0c 30 
[  122.225881] RIP  [<ffffffff803b8c9d>] __pskb_pull_tail+0x6d/0x380
[  122.225885]  RSP <ffffc90000003b10>
[  122.225890] ---[ end trace b3873e3aeb85de96 ]---
[  122.225893] Kernel panic - not syncing: Fatal exception in interrupt
[  122.225896] Pid: 0, comm: swapper Tainted: G      D  C 2.6.31.12-0.2-xen #1
[  122.225899] Call Trace:
[  122.225905]  [<ffffffff800119b9>] try_stack_unwind+0x189/0x1b0
[  122.225911]  [<ffffffff8000f466>] dump_trace+0xa6/0x1e0
[  122.225938]  [<ffffffff800114c4>] show_trace_log_lvl+0x64/0x90
[  122.225943]  [<ffffffff80011513>] show_trace+0x23/0x40
[  122.225949]  [<ffffffff8046b92c>] dump_stack+0x81/0x9e
[  122.225954]  [<ffffffff8046b9cb>] panic+0x82/0x16e
[  122.225959]  [<ffffffff80470b71>] oops_end+0x151/0x160
[  122.225964]  [<ffffffff800113d2>] die+0x62/0xa0
[  122.225969]  [<ffffffff80470124>] do_trap+0xe4/0x190
[  122.225975]  [<ffffffff8000e242>] do_invalid_op+0xc2/0xf0
[  122.225980]  [<ffffffff8000d115>] invalid_op+0x25/0x30
[  122.225986]  [<ffffffff803b8c9d>] __pskb_pull_tail+0x6d/0x380
[  122.225995]  [<ffffffffa01e5039>] vswitch_skb_checksum_setup+0x159/0x180 [openvswitch_mod]
[  122.226006]  [<ffffffffa01e5132>] dp_output_control+0xd2/0x2f0 [openvswitch_mod]
[  122.226015]  [<ffffffffa01e54af>] dp_process_received_packet+0x15f/0x1c0 [openvswitch_mod]
[  122.226026]  [<ffffffffa01e9dc8>] vport_receive+0x38/0xc0 [openvswitch_mod]
[  122.226042]  [<ffffffffa01ee80f>] netdev_frame_hook+0x7f/0xb0 [openvswitch_mod]
[  122.226058]  [<ffffffff803c55b2>] netif_receive_skb+0x202/0x590
[  122.226064]  [<ffffffff803c59e1>] process_backlog+0xa1/0x140
[  122.226069]  [<ffffffff803c63dc>] net_rx_action+0x14c/0x2e0
[  122.226075]  [<ffffffff80057e03>] __do_softirq+0xe3/0x240
[  122.226080]  [<ffffffff8000d48c>] call_softirq+0x1c/0x30
[  122.226085]  [<ffffffff8000ec05>] do_softirq+0xb5/0x100
[  122.226090]  [<ffffffff80057625>] irq_exit+0x65/0x80
[  122.226096]  [<ffffffff802fc12c>] evtchn_do_upcall+0x20c/0x250
[  122.226101]  [<ffffffff8000ceee>] do_hypervisor_callback+0x1e/0x30
[  122.226107]  [<ffffffff800083aa>] 0xffffffff800083aa
[  122.226117]  [<ffffffff8000f9a8>] xen_safe_halt+0x28/0x50
[  122.226121]  [<ffffffff80014999>] xen_idle+0x59/0x120
[  122.226126]  [<ffffffff8000b09b>] cpu_idle+0xbb/0x100
[  122.226131]  [<ffffffff8045b415>] rest_init+0x75/0x90
[  122.226136]  [<ffffffff80793c6b>] start_kernel+0x36d/0x38a
[  122.226141]  [<ffffffff80792d94>] x86_64_start_reservations+0xf4/0x10f
[  122.226147]  [<ffffffff80792dfa>] x86_64_start_kernel+0x4b/0x66



--------
This e-mail may contain confidential and privileged material for the sole use of the intended recipient.  If this email is not intended for you, or you are not responsible for the delivery of this message to the intended recipient, please note that this message may contain SEAKR Engineering (SEAKR) Privileged/Proprietary Information.  In such a case, you are strictly prohibited from downloading, photocopying, distributing or otherwise using this message, its contents or attachments in any way.  If you have received this message in error, please notify us immediately by replying to this e-mail and delete the message from your mailbox.  Information contained in this message that does not relate to the business of SEAKR is neither endorsed by nor attributable to SEAKR.




More information about the dev mailing list