From: bugzilla-daemon@bugzilla.kernel.org
To: kvm@vger.kernel.org
Subject: [Bug 67751] Stack trace with suspicious RCU usage, when starting ovs-switchd
Date: Tue, 28 Jan 2014 08:28:09 +0000 [thread overview]
Message-ID: <bug-67751-28872-voMr1ailwA@https.bugzilla.kernel.org/> (raw)
In-Reply-To: <bug-67751-28872@https.bugzilla.kernel.org/>
https://bugzilla.kernel.org/show_bug.cgi?id=67751
--- Comment #3 from Kashyap Chamarthy <kashyap.cv@gmail.com> ---
Still able to reproduce with 3.14.0-0.rc0.git9.1.fc21.x86_64:
---------------------
[ 933.596722] ===============================
[ 933.599241] [ INFO: suspicious RCU usage. ]
[ 933.601825] 3.14.0-0.rc0.git9.1.fc21.x86_64 #1 Not tainted
[ 933.605019] -------------------------------
[ 933.607412] net/openvswitch/flow_table.c:436 suspicious
rcu_dereference_check() usage!
[ 933.611737]
[ 933.611737] other info that might help us debug this:
[ 933.611737]
[ 933.616302]
[ 933.616302] rcu_scheduler_active = 1, debug_locks = 0
[ 933.619503] 2 locks held by ovs-vswitchd/729:
[ 933.621820] #0: (cb_lock){++++++}, at: [<ffffffff8168c549>]
genl_rcv+0x19/0x40
[ 933.626678] #1: (ovs_mutex){+.+.+.}, at: [<ffffffffa020fd8a>]
ovs_flow_cmd_new_or_set+0xea/0x5e0 [openvswitch]
[ 933.632616]
[ 933.632616] stack backtrace:
[ 933.634813] CPU: 18 PID: 729 Comm: ovs-vswitchd Not tainted
3.14.0-0.rc0.git9.1.fc21.x86_64 #1
[ 933.638912] Hardware name: Red Hat KVM, BIOS Bochs 01/01/2011
[ 933.641710] 0000000000000001 ffff8804aef0f7e8 ffffffff81793c95
ffff8804aed68000
[ 933.646034] ffff8804aef0f818 ffffffff810f0227 ffff8800c4286338
ffff8804aef0f884
[ 933.650781] ffff8804ae77ba18 ffff8804ae77b9f8 ffff8804aef0f868
ffffffffa0217548
[ 933.655559] Call Trace:
[ 933.657021] [<ffffffff81793c95>] dump_stack+0x4d/0x66
[ 933.659752] [<ffffffff810f0227>] lockdep_rcu_suspicious+0xe7/0x120
[ 933.662843] [<ffffffffa0217548>] ovs_flow_tbl_lookup+0x188/0x1b0
[openvswitch]
[ 933.666377] [<ffffffffa020fdc7>] ovs_flow_cmd_new_or_set+0x127/0x5e0
[openvswitch]
[ 933.669879] [<ffffffff810f1b75>] ? trace_hardirqs_on_caller+0x105/0x1d0
[ 933.673063] [<ffffffff8168e241>] ? genl_family_rcv_msg+0x2c1/0x370
[ 933.676001] [<ffffffff8168e10d>] genl_family_rcv_msg+0x18d/0x370
[ 933.678936] [<ffffffff8168e2f0>] ? genl_family_rcv_msg+0x370/0x370
[ 933.681919] [<ffffffff8168e37e>] genl_rcv_msg+0x8e/0xd0
[ 933.684516] [<ffffffff8168bff9>] netlink_rcv_skb+0xa9/0xc0
[ 933.687138] [<ffffffff8168c558>] genl_rcv+0x28/0x40
[ 933.689583] [<ffffffff8168b625>] netlink_unicast+0xd5/0x1a0
[ 933.692306] [<ffffffff8168ba27>] netlink_sendmsg+0x337/0x750
[ 933.694977] [<ffffffff81639b5b>] sock_sendmsg+0x8b/0xc0
[ 933.697504] [<ffffffff811cf1cf>] ? might_fault+0x5f/0xb0
[ 933.700255] [<ffffffff811cf218>] ? might_fault+0xa8/0xb0
[ 933.702754] [<ffffffff811cf1cf>] ? might_fault+0x5f/0xb0
[ 933.705292] [<ffffffff8164974e>] ? verify_iovec+0x5e/0xe0
[ 933.707888] [<ffffffff81639f69>] ___sys_sendmsg+0x389/0x3a
[ 933.710357] [<ffffffff8105a597>] ? kvm_clock_read+0x27/0x40
[ 933.712658] [<ffffffff81023119>] ? sched_clock+0x9/0x10
[ 933.714032] [<ffffffff810d6cde>] ? local_clock+0xe/0x30
[ 933.715441] [<ffffffff810ef01f>] ? lock_release_holdtime.part.29+0xf/0x190
[ 933.717454] [<ffffffff8124411d>] ? fget_light+0xed/0x4f0
[ 933.719799] [<ffffffff8124406c>] ? fget_light+0x3c/0x4f0
[ 933.721273] [<ffffffff8163b422>] __sys_sendmsg+0x42/0x80
[ 933.722749] [<ffffffff8163b472>] SyS_sendmsg+0x12/0x20
[ 933.724359] [<ffffffff817a6f29>] system_call_fastpath+0x16/0x1b
[ 933.774858] device br-tun entered promiscuous mode
[ 936.966368] systemd-udevd (530) used greatest stack depth: 3272 bytes left
Fedora release 20 (Heisenbug)
Kernel 3.14.0-0.rc0.git9.1.fc21.x86_64 on an x86_64 (ttyS0)
---------------------
--
You are receiving this mail because:
You are watching the assignee of the bug.
next prev parent reply other threads:[~2014-01-28 8:28 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-12-26 9:49 [Bug 67751] New: Stack trace with suspicious RCU usage, when starting ovs-switchd bugzilla-daemon
2013-12-27 12:21 ` [Bug 67751] " bugzilla-daemon
2013-12-27 13:56 ` bugzilla-daemon
2013-12-27 14:32 ` bugzilla-daemon
2014-01-28 8:28 ` bugzilla-daemon [this message]
2014-01-31 16:25 ` bugzilla-daemon
2014-06-24 9:53 ` bugzilla-daemon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=bug-67751-28872-voMr1ailwA@https.bugzilla.kernel.org/ \
--to=bugzilla-daemon@bugzilla.kernel.org \
--cc=kvm@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).