Login
[x]
Log in using an account from:
Fedora Account System
Red Hat Associate
Red Hat Customer
Or login using a Red Hat Bugzilla account
Forgot Password
Login:
Hide Forgot
Create an Account
Red Hat Bugzilla – Attachment 891502 Details for
Bug 1093337
OVS: kernel deadlock while updating flow stats
[?]
New
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
|
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh83 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
This site requires JavaScript to be enabled to function correctly, please enable it.
OVS Panic
file_1093337.txt (text/plain), 5.60 KB, created by
Ofer Blaut
on 2014-05-01 12:43:13 UTC
(
hide
)
Description:
OVS Panic
Filename:
MIME Type:
Creator:
Ofer Blaut
Created:
2014-05-01 12:43:13 UTC
Size:
5.60 KB
patch
obsolete
>[root@cougar16 ~]# [12860.524113] BUG: soft lockup - CPU#2 stuck for 23s! [ovs-vswitchd:989] >[12860.524926] Modules linked in: binfmt_misc vhost_net macvtap macvlan tun xt_nat nf_conntrack_ipv6 nf_defrag_ipv6 xt_mac xt_physdev veth ip6table_filter ip6_tables ebtable_nat ebtables 8021q garp mrp openvswitch vxlan ip_tunnel gre libcrc32c ipt_REJECT xt_comment xt_conntrack xt_multiport iptable_filter iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle ip_tables sg nfsd ixgbe igb ptp auth_rpcgss dcdbas nfs_acl lockd kvm_amd mdio sunrpc pps_core loop dm_mirror dm_region_hash dm_log bridge dm_mod stp ipmi_devintf dca llc kvm amd64_edac_mod edac_mce_amd pcspkr edac_core k10temp sp5100_tco i2c_piix4 shpchp ipmi_si ipmi_msghandler acpi_cpufreq mperf ext4 mbcache jbd2 sd_mod crc_t10dif crct10dif_common ata_generic ast syscopyarea sysfillrect sysimgblt i2c_algo_bit drm_kms_helper ttm pata_acpi ahci drm libahci pata_atiixp i2c_core libata >[12860.534903] CPU: 2 PID: 989 Comm: ovs-vswitchd Not tainted 3.10.0-121.el7.x86_64 #1 >[12860.535765] Hardware name: Dell Inc. PowerEdge C6105 /0MVKG0, BIOS 2.0.9 01/19/2012 >[12860.536736] task: ffff8807de402220 ti: ffff8807e4b4a000 task.ti: ffff8807e4b4a000 >[12860.537629] RIP: 0010:[<ffffffff815f37ed>] [<ffffffff815f37ed>] _raw_spin_lock+0x3d/0x50 >[12860.538504] RSP: 0018:ffff88081fc43b50 EFLAGS: 00000202 >[12860.539137] RAX: 00000000000016c7 RBX: ffffffffa03b4598 RCX: 0000000000005572 >[12860.540187] RDX: 0000000000005574 RSI: 0000000000005574 RDI: ffff8800d8de8a18 >[12860.541086] RBP: ffff88081fc43b50 R08: ffff8807555aaf08 R09: ffff88081fc43a98 >[12860.541888] R10: 0000000000000010 R11: ffffea001f9208c0 R12: ffff88081fc43ac8 >[12860.542669] R13: ffffffff815fd49d R14: ffff88081fc43b50 R15: ffff8800d8de8a00 >[12860.543430] FS: 00007f2ba0f95a40(0000) GS:ffff88081fc40000(0000) knlGS:0000000000000000 >[12860.544375] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 >[12860.545045] CR2: 00007fcb69434018 CR3: 00000007e49fc000 CR4: 00000000000007e0 >[12860.545829] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 >[12860.546589] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 >[12860.547462] Stack: >[12860.547663] ffff88081fc43b80 ffffffffa04e729f ffff8807ca315900 ffffe8ffffc40070 >[12860.548510] ffff8807e69fee80 ffff88081fc43bb8 ffff88081fc43c68 ffffffffa04e69a4 >[12860.549524] 000000039e49d5fb ffff8807ca314500 ffff88081fc58d20 0000000000000034 >[12860.550391] Call Trace: >[12860.550634] <IRQ> >[12860.550927] [<ffffffffa04e729f>] ovs_flow_stats_update+0x4f/0xd0 [openvswitch] >[12860.551758] [<ffffffffa04e69a4>] ovs_dp_process_received_packet+0x84/0x120 [openvswitch] >[12860.552618] [<ffffffffa04ed01a>] ovs_vport_receive+0x2a/0x30 [openvswitch] >[12860.553471] [<ffffffffa04edf21>] netdev_frame_hook+0xc1/0x120 [openvswitch] >[12860.554254] [<ffffffff814da0c2>] __netif_receive_skb_core+0x282/0x870 >[12860.554976] [<ffffffff8101a0d9>] ? read_tsc+0x9/0x20 >[12860.555570] [<ffffffff814da6c8>] __netif_receive_skb+0x18/0x60 >[12860.556241] [<ffffffff814da750>] netif_receive_skb+0x40/0xd0 >[12860.556896] [<ffffffff814db1a8>] napi_gro_receive+0x58/0x80 >[12860.557546] [<ffffffffa045a0ac>] ixgbe_clean_rx_irq+0x7ac/0xb00 [ixgbe] >[12860.558278] [<ffffffffa045b0f1>] ixgbe_poll+0x481/0x7e0 [ixgbe] >[12860.558935] [<ffffffff814dab1a>] net_rx_action+0x15a/0x250 >[12860.559621] [<ffffffff81067047>] __do_softirq+0xf7/0x290 >[12860.560235] [<ffffffff815fe15c>] call_softirq+0x1c/0x30 >[12860.560841] [<ffffffff81014d25>] do_softirq+0x55/0x90 >[12860.561435] [<ffffffff810673e5>] irq_exit+0x115/0x120 >[12860.562037] [<ffffffff815fea58>] do_IRQ+0x58/0xf0 >[12860.562618] [<ffffffff815f3bad>] common_interrupt+0x6d/0x6d >[12860.563282] <EOI> >[12860.563474] [<ffffffff815f37c2>] ? _raw_spin_lock+0x12/0x50 >[12860.564119] [<ffffffffa04e7453>] ovs_flow_stats_get+0x133/0x180 [openvswitch] >[12860.564886] [<ffffffffa04e47b7>] ovs_flow_cmd_fill_info+0x1c7/0x320 [openvswitch] >[12860.565789] [<ffffffffa04e4999>] ovs_flow_cmd_dump+0x89/0xf0 [openvswitch] >[12860.566563] [<ffffffff81505cae>] netlink_dump+0x7e/0x230 >[12860.567186] [<ffffffff81506945>] __netlink_dump_start+0x195/0x1c0 >[12860.567873] [<ffffffff8150a4cf>] genl_family_rcv_msg+0x34f/0x3d0 >[12860.568550] [<ffffffff811c3c1c>] ? poll_freewait+0x8c/0xa0 >[12860.569205] [<ffffffffa04e4910>] ? ovs_flow_cmd_fill_info+0x320/0x320 [openvswitch] >[12860.570041] [<ffffffff8150a550>] ? genl_family_rcv_msg+0x3d0/0x3d0 >[12860.570834] [<ffffffff8150a5e1>] genl_rcv_msg+0x91/0xd0 >[12860.571355] [<ffffffff81508699>] netlink_rcv_skb+0xa9/0xc0 >[12860.571943] [<ffffffff81508bc8>] genl_rcv+0x28/0x40 >[12860.572499] [<ffffffff81507cbd>] netlink_unicast+0xed/0x1b0 >[12860.573116] [<ffffffff815080a7>] netlink_sendmsg+0x327/0x760 >[12860.573744] [<ffffffff812545b5>] ? sock_has_perm+0x75/0x90 >[12860.574356] [<ffffffff814c20b0>] sock_sendmsg+0xb0/0xf0 >[12860.574946] [<ffffffff814c1356>] ? sock_aio_read.part.7+0x146/0x160 >[12860.575626] [<ffffffff815efc02>] ? mutex_lock+0x12/0x2f >[12860.576211] [<ffffffff814c2621>] SYSC_sendto+0x121/0x1c0 >[12860.576811] [<ffffffff811af965>] ? vfs_read+0x145/0x170 >[12860.577405] [<ffffffff814c30ae>] SyS_sendto+0xe/0x10 >[12860.577983] [<ffffffff815fc819>] system_call_fastpath+0x16/0x1b >[12860.578642] Code: 89 c2 c1 ea 10 66 39 c2 75 02 5d c3 83 e2 fe 0f b7 f2 b8 00 80 00 00 eb 0c 0f 1f 44 00 00 f3 90 83 e8 01 74 0a 0f b7 0f 66 39 ca <75> f1 5d c3 66 66 66 90 66 66 90 eb da 66 0f 1f 44 00 00 66 66 > >Message from syslogd@cougar16 at May 1 15:38:34 ... > kernel:BUG: soft lockup - CPU#2 stuck for 23s! [ovs-vswitchd:989] >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1093337
: 891502 |
891517
|
891519