[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 --- Comment #5 from Kashyap Chamarthy --- I just saw this again when I attempt to restart OpenvSwitch with Kernel -- 3.16.0-0.rc1.git1.1.fc21.x86_64 - [ 9695.079715] [ 9695.080492] === [ 9695.082559] [ INFO: suspicious RCU usage. ] [ 9695.085105] 3.16.0-0.rc1.git1.1.fc21.x86_64 #1 Not tainted [ 9695.088505] --- [ 9695.090413] net/openvswitch/flow_table.c:255 suspicious rcu_dereference_protected() usage! [ 9695.094887] [ 9695.094887] other info that might help us debug this: [ 9695.094887] [ 9695.100722] [ 9695.100722] rcu_scheduler_active = 1, debug_locks = 0 [ 9695.105699] 1 lock held by ovs-vswitchd/1910: [ 9695.108199] #0: (cb_lock){++}, at: [] genl_rcv+0x19/0x40 [ 9695.113083] [ 9695.113083] stack backtrace: [ 9695.115395] CPU: 0 PID: 1910 Comm: ovs-vswitchd Not tainted 3.16.0-0.rc1.git1.1.fc21.x86_64 #1 [ 9695.121638] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 [ 9695.124076] 2c60696c 8800b64ff968 81807520 [ 9695.127732] 88029ce24d70 8800b64ff998 810fd7f7 [ 9695.131321] 88029ccc6d20 8800b64ffa90 88029ccc6d00 8800b64ff9b8 [ 9695.134931] Call Trace: [ 9695.136158] [] dump_stack+0x4d/0x66 [ 9695.139031] [] lockdep_rcu_suspicious+0xe7/0x120 [ 9695.141850] [] ovs_flow_tbl_destroy+0x60/0x70 [openvswitch] [ 9695.145034] [] ovs_dp_cmd_new+0x311/0x4b0 [openvswitch] [ 9695.148665] [] genl_family_rcv_msg+0x1bc/0x3e0 [ 9695.152987] [] ? sched_clock+0x9/0x10 [ 9695.157925] [] ? sched_clock_local+0x1d/0x90 [ 9695.162486] [] genl_rcv_msg+0x84/0xc0 [ 9695.166797] [] ? genl_family_rcv_msg+0x3e0/0x3e0 [ 9695.171411] [] netlink_rcv_skb+0xa9/0xd0 [ 9695.175809] [] genl_rcv+0x28/0x40 [ 9695.179489] [] netlink_unicast+0x125/0x1a0 [ 9695.184300] [] netlink_sendmsg+0x35f/0x7d0 [ 9695.188510] [] sock_sendmsg+0x9e/0xe0 [ 9695.192580] [] ? might_fault+0x5e/0xc0 [ 9695.196850] [] ? might_fault+0xb9/0xc0 [ 9695.200907] [] ? might_fault+0x5e/0xc0 [ 9695.204862] [] ___sys_sendmsg+0x408/0x420 [ 9695.208962] [] ? __fget_light+0x13d/0x160 [ 9695.213088] [] ? __fget_light+0x13d/0x160 [ 9695.217652] [] __sys_sendmsg+0x51/0x90 [ 9695.220513] [] SyS_sendmsg+0x12/0x20 [ 9695.223422] [] system_call_fastpath+0x16/0x1b - -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 Alan changed: What|Removed |Added CC||a...@lxorguk.ukuu.org.uk Kernel Version|3.13.0-0.rc4.git5.1.fc21.x8 |3.13-rc4 |6_64| -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 Kashyap Chamarthy changed: What|Removed |Added Kernel Version|3.13-rc4|3.13.0-0.rc4.git5.1.fc21.x8 ||6_64 --- Comment #1 from Kashyap Chamarthy --- Just to note this is reproducible, I ran into it again when I booted the VM through its serial console: - . . . [ OK ] Started RPC bind service. [ 23.707895] nf_conntrack version 0.5.0 (16384 buckets, 65536 max) [ 24.460881] gre: GRE over IPv4 demultiplexor driver [ 24.534446] openvswitch: Open vSwitch switching datapath [ 24.764568] device ovs-system entered promiscuous mode [ 25.109235] device br-int entered promiscuous mode [ 25.121450] [ 25.122468] === [ 25.124704] [ INFO: suspicious RCU usage. ] [ 25.126644] 3.13.0-0.rc4.git5.1.fc21.x86_64 #1 Not tainted [ 25.129110] --- [ 25.132497] net/openvswitch/flow_table.c:436 suspicious rcu_dereference_check() usage! [ 25.135792] [ 25.135792] other info that might help us debug this: [ 25.135792] [ 25.139221] [ 25.139221] rcu_scheduler_active = 1, debug_locks = 0 [ 25.142044] 2 locks held by ovs-vswitchd/719: [ 25.143934] #0: (cb_lock){++}, at: [] genl_rcv+0x19/0x40 [ 25.148294] #1: (ovs_mutex){+.+.+.}, at: [] ovs_flow_cmd_new_or_set+0xf9/0x600 [openvswitch] [ 25.153885] [ 25.153885] stack backtrace: [ 25.156553] CPU: 10 PID: 719 Comm: ovs-vswitchd Not tainted 3.13.0-0.rc4.git5.1.fc21.x86_64 #1 [ 25.162587] Hardware name: Red Hat KVM, BIOS Bochs 01/01/2011 [ 25.165237] 0001 8800370877e0 8175b6d2 880499f6 [ 25.169376] 880037087810 810cd2f7 88049bfb1260 88003708787c [ 25.175682] 8800daaa7d68 8800daaa7d48 880037087860 a01b6608 [ 25.180373] Call Trace: [ 25.181540] [] dump_stack+0x4d/0x66 [ 25.183970] [] lockdep_rcu_suspicious+0xe7/0x120 [ 25.186854] [] ovs_flow_tbl_lookup+0x188/0x1b0 [openvswitch] [ 25.189780] [] ovs_flow_cmd_new_or_set+0x136/0x600 [openvswitch] [ 25.193182] [] ? genl_family_rcv_msg+0x2c1/0x370 [ 25.195832] [] genl_family_rcv_msg+0x18d/0x370 [ 25.198584] [] ? genl_family_rcv_msg+0x370/0x370 [ 25.201229] [] genl_rcv_msg+0x8e/0xd0 [ 25.203439] [] netlink_rcv_skb+0xa9/0xc0 [ 25.205736] [] genl_rcv+0x28/0x40 [ 25.207802] [] netlink_unicast+0xd5/0x1a0 [ 25.210136] [] netlink_sendmsg+0x337/0x750 [ 25.212643] [] sock_sendmsg+0x8b/0xc0 [ 25.214964] [] ? might_fault+0x5f/0xb0 [ 25.217209] [] ? might_fault+0xa8/0xb0 [ 25.219443] [] ? might_fault+0x5f/0xb0 [ 25.221785] [] ? verify_iovec+0x5e/0xe0 [ 25.224309] [] ___sys_sendmsg+0x3d9/0x3f0 [ 25.227001] [] ? kvm_clock_read+0x27/0x40 [ 25.229696] [] ? sched_clock+0x9/0x10 [ 25.232047] [] ? sched_clock_local+0x1d/0x80 [ 25.235062] [] ? sched_clock_cpu+0xa8/0x100 [ 25.238061] [] ? trace_hardirqs_off+0xd/0x10 [ 25.240594] [] ? local_clock+0x5f/0x70 [ 25.243667] [] ? lock_release_holdtime.part.29+0xf/0x190 [ 25.246875] [] ? fget_light+0xed/0x4f0 [ 25.249346] [] ? fget_light+0x3c/0x4f0 [ 25.252287] [] __sys_sendmsg+0x42/0x80 [ 25.254691] [] SyS_sendmsg+0x12/0x20 [ 25.257184] [] system_call_fastpath+0x16/0x1b [ 25.359076] device br-tun entered promiscuous mode Fedora release 20 (Heisenbug) Kernel 3.13.0-0.rc4.git5.1.fc21.x86_64 on an x86_64 (ttyS0) - -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 --- Comment #2 from Kashyap Chamarthy --- Created attachment 119731 --> https://bugzilla.kernel.org/attachment.cgi?id=119731&action=edit Full dmesg output captured from the VM -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 --- Comment #3 from Kashyap Chamarthy --- Still able to reproduce with 3.14.0-0.rc0.git9.1.fc21.x86_64: - [ 933.596722] === [ 933.599241] [ INFO: suspicious RCU usage. ] [ 933.601825] 3.14.0-0.rc0.git9.1.fc21.x86_64 #1 Not tainted [ 933.605019] --- [ 933.607412] net/openvswitch/flow_table.c:436 suspicious rcu_dereference_check() usage! [ 933.611737] [ 933.611737] other info that might help us debug this: [ 933.611737] [ 933.616302] [ 933.616302] rcu_scheduler_active = 1, debug_locks = 0 [ 933.619503] 2 locks held by ovs-vswitchd/729: [ 933.621820] #0: (cb_lock){++}, at: [] genl_rcv+0x19/0x40 [ 933.626678] #1: (ovs_mutex){+.+.+.}, at: [] ovs_flow_cmd_new_or_set+0xea/0x5e0 [openvswitch] [ 933.632616] [ 933.632616] stack backtrace: [ 933.634813] CPU: 18 PID: 729 Comm: ovs-vswitchd Not tainted 3.14.0-0.rc0.git9.1.fc21.x86_64 #1 [ 933.638912] Hardware name: Red Hat KVM, BIOS Bochs 01/01/2011 [ 933.641710] 0001 8804aef0f7e8 81793c95 8804aed68000 [ 933.646034] 8804aef0f818 810f0227 8800c4286338 8804aef0f884 [ 933.650781] 8804ae77ba18 8804ae77b9f8 8804aef0f868 a0217548 [ 933.69] Call Trace: [ 933.657021] [] dump_stack+0x4d/0x66 [ 933.659752] [] lockdep_rcu_suspicious+0xe7/0x120 [ 933.662843] [] ovs_flow_tbl_lookup+0x188/0x1b0 [openvswitch] [ 933.666377] [] ovs_flow_cmd_new_or_set+0x127/0x5e0 [openvswitch] [ 933.669879] [] ? trace_hardirqs_on_caller+0x105/0x1d0 [ 933.673063] [] ? genl_family_rcv_msg+0x2c1/0x370 [ 933.676001] [] genl_family_rcv_msg+0x18d/0x370 [ 933.678936] [] ? genl_family_rcv_msg+0x370/0x370 [ 933.681919] [] genl_rcv_msg+0x8e/0xd0 [ 933.684516] [] netlink_rcv_skb+0xa9/0xc0 [ 933.687138] [] genl_rcv+0x28/0x40 [ 933.689583] [] netlink_unicast+0xd5/0x1a0 [ 933.692306] [] netlink_sendmsg+0x337/0x750 [ 933.694977] [] sock_sendmsg+0x8b/0xc0 [ 933.697504] [] ? might_fault+0x5f/0xb0 [ 933.700255] [] ? might_fault+0xa8/0xb0 [ 933.702754] [] ? might_fault+0x5f/0xb0 [ 933.705292] [] ? verify_iovec+0x5e/0xe0 [ 933.707888] [] ___sys_sendmsg+0x389/0x3a [ 933.710357] [] ? kvm_clock_read+0x27/0x40 [ 933.712658] [] ? sched_clock+0x9/0x10 [ 933.714032] [] ? local_clock+0xe/0x30 [ 933.715441] [] ? lock_release_holdtime.part.29+0xf/0x190 [ 933.717454] [] ? fget_light+0xed/0x4f0 [ 933.719799] [] ? fget_light+0x3c/0x4f0 [ 933.721273] [] __sys_sendmsg+0x42/0x80 [ 933.722749] [] SyS_sendmsg+0x12/0x20 [ 933.724359] [] system_call_fastpath+0x16/0x1b [ 933.774858] device br-tun entered promiscuous mode [ 936.966368] systemd-udevd (530) used greatest stack depth: 3272 bytes left Fedora release 20 (Heisenbug) Kernel 3.14.0-0.rc0.git9.1.fc21.x86_64 on an x86_64 (ttyS0) - -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
[Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
https://bugzilla.kernel.org/show_bug.cgi?id=67751 --- Comment #4 from Kashyap Chamarthy --- For reference, I briefly discussed this with Thomas Graf. "It's nothing serious, but the warnings should be silenced", he said. -- You are receiving this mail because: You are watching the assignee of the bug. -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html