<html>
<head>
<base href="https://bugzilla.netfilter.org/" />
</head>
<body><table border="1" cellspacing="0" cellpadding="8">
<tr>
<th>Bug ID</th>
<td><a class="bz_bug_link
bz_status_NEW "
title="NEW - Exactly after 24h of uptime system hungs"
href="https://bugzilla.netfilter.org/show_bug.cgi?id=991">991</a>
</td>
</tr>
<tr>
<th>Summary</th>
<td>Exactly after 24h of uptime system hungs
</td>
</tr>
<tr>
<th>Product</th>
<td>netfilter/iptables
</td>
</tr>
<tr>
<th>Version</th>
<td>unspecified
</td>
</tr>
<tr>
<th>Hardware</th>
<td>sparc64
</td>
</tr>
<tr>
<th>OS</th>
<td>Debian GNU/Linux
</td>
</tr>
<tr>
<th>Status</th>
<td>NEW
</td>
</tr>
<tr>
<th>Severity</th>
<td>blocker
</td>
</tr>
<tr>
<th>Priority</th>
<td>P5
</td>
</tr>
<tr>
<th>Component</th>
<td>ip_tables (kernel)
</td>
</tr>
<tr>
<th>Assignee</th>
<td>netfilter-buglog@lists.netfilter.org
</td>
</tr>
<tr>
<th>Reporter</th>
<td>netfilter@horrify.org
</td>
</tr></table>
<p>
<div>
<pre>On Sun Fire T1000 exactly after each 24h system hungs. There is nothing in
logs. On serial console I can see messages as below. On other SPARC Enterprise
T1000 server there is exactly the same effect.
System: SUNW,Sun-Fire-T1000
Linux mail 3.2.0-4-sparc64-smp #1 SMP Debian 3.2.63-2+deb7u2 sparc64 GNU/Linux
ip_tables: (C) 2000-2006 Netfilter Core Team
nf_conntrack version 0.5.0 (16384 buckets, 65536 max)
[90297.014493] BUG: soft lockup - CPU#9 stuck for 22s! [iptables:9251]
[90297.014690] Modules linked in: xt_conntrack xt_multiport nf_conntrack_ipv4
nf_defrag_ipv4 xt_tcpudp xt_state nf_conntrack iptable_filter ip_tables
x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc ext2 loop flash ext4
crc16 jbd2 mbcache raid1 md_mod dm_mirror dm_region_hash dm_log dm_mod sg
sd_mod crc_t10dif mptsas scsi_transport_sas mptscsih mptbase scsi_mod tg3
libphy [last unloaded: scsi_wait_scan]
[90297.017277] TSTATE: 0000000011001600 TPC: 00000000004482e8 TNPC:
00000000004482ec Y: 00000000 Not tainted
[90297.017421] TPC: <__flush_tlb_kernel_range+0x28/0x40>
[90297.017648] g0: 0000000000000000 g1: 0000000109e48000 g2: ffffff0cd12e8000
g3: 0000000000002000
[90297.017813] g4: fffff803eb6ac1a0 g5: fffff800113e8000 g6: fffff803264e0000
g7: 0000000000000000
[90297.018075] o0: 0000000000000000 o1: 0000000000000000 o2: 0000000000000003
o3: 00000000f0000000
[90297.018287] o4: 0000000109e48000 o5: 0000000109e48000 sp: fffff803264e2f81
ret_pc: 00000000004ff67c
[90297.018583] RPC: <__purge_vmap_area_lazy+0x174/0x1ec>
[90297.018810] l0: 0000000000000046 l1: 00000000000000b0 l2: 0000000000000000
l3: 0000000102c61fa0
[90297.018925] l4: 0000000000000338 l5: 000000000000000f l6: fffff803264e0000
l7: 000000000043fb40
[90297.019184] i0: fffff803264e3900 i1: fffff803264e3908 i2: 0000000000000000
i3: 0000000000000000
[90297.019302] i4: fffff803264e3838 i5: 0000000000005001 i6: fffff803264e3051
i7: 00000000004ffcc4
[90297.019522] I7: <free_vmap_area_noflush+0x5c/0x6c>
[90297.019731] Call Trace:
[90297.019796] [00000000004ffcc4] free_vmap_area_noflush+0x5c/0x6c
[90297.020032] [0000000000500cc4] remove_vm_area+0x88/0xac
[90297.020116] [0000000000500db4] __vunmap+0x34/0xe8
[90297.020251] [00000000104c08fc] compat_get_entries+0x270/0x2b0 [ip_tables]
[90297.020510] [00000000006d15c8] compat_nf_sockopt+0x8c/0xa8
[90297.020751] [00000000006de19c] compat_ip_getsockopt+0xb0/0xe4
[90297.020849] [0000000000699134] compat_sock_common_getsockopt+0x28/0x3c
[90297.021098] [00000000006c2e14] compat_sys_getsockopt+0x17c/0x19c
[90297.021197] [0000000000406134] linux_sparc_syscall32+0x34/0x60
[86296.051981] BUG: soft lockup - CPU#17 stuck for 22s! [iptables:10219]
[86296.052179] Modules linked in: xt_multiport xt_state nf_conntrack_ipv4
nf_defrag_ipv4 xt_tcpudp xt_conntrack nf_conntrack iptable_filter ip_tables
x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc ext2 loop flash ext4
crc16 jbd2 mbcache raid1 md_mod dm_mirror dm_region_hash dm_log dm_mod sg
sd_mod crc_t10dif mptsas scsi_transport_sas mptscsih mptbase scsi_mod tg3
libphy [last unloaded: scsi_wait_scan]
[86296.054814] TSTATE: 0000000011001606 TPC: 00000000004482f4 TNPC:
00000000004482d8 Y: 00000000 Not tainted
[86296.055023] TPC: <__flush_tlb_kernel_range+0x34/0x40>
[86296.055251] g0: 0000000000000000 g1: 0000000109da2000 g2: ffffff0350b0c000
g3: 0000000000002000
[86296.055463] g4: fffff803fac513c0 g5: fffff800114e8000 g6: fffff803ede00000
g7: 0000000000000000
[86296.055727] o0: 0000000000000000 o1: 0000000000000084 o2: 0000000000000003
o3: 00000000f0000000
[86296.055940] o4: 0000000109d9e000 o5: 0000000109da2000 sp: fffff803ede02ed1
ret_pc: 00000000004ff67c
[86296.056221] RPC: <__purge_vmap_area_lazy+0x174/0x1ec>
[86296.056449] l0: 0000000000000022 l1: 00000000000000b0 l2: 0000000000000000
l3: fffff803d57157f8
[86296.056564] l4: 0000000000000338 l5: 000000000000000f l6: fffff803ede00000
l7: 000000000043fb40
[86296.056823] i0: fffff803ede03850 i1: fffff803ede03858 i2: 0000000000000000
i3: 0000000000000000
[86296.056942] i4: fffff803ede03788 i5: 0000000000005001 i6: fffff803ede02fa1
i7: 00000000004ffcc4
[86296.057162] I7: <free_vmap_area_noflush+0x5c/0x6c>
[86296.057372] Call Trace:
[86296.057437] [00000000004ffcc4] free_vmap_area_noflush+0x5c/0x6c
[86296.057673] [0000000000500cc4] remove_vm_area+0x88/0xac
[86296.057757] [0000000000500db4] __vunmap+0x34/0xe8
[86296.057894] [0000000010497160] xt_compat_flush_offsets+0x28/0x48 [x_tables]
[86296.058151] [00000000104a2904] compat_get_entries+0x278/0x2b0 [ip_tables]
[86296.058405] [00000000006d15c8] compat_nf_sockopt+0x8c/0xa8
[86296.058553] [00000000006de19c] compat_ip_getsockopt+0xb0/0xe4
[86296.058798] [0000000000699134] compat_sock_common_getsockopt+0x28/0x3c
[86296.058956] [00000000006c2e14] compat_sys_getsockopt+0x17c/0x19c
[86296.059200] [0000000000406134] linux_sparc_syscall32+0x34/0x60</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are watching all bug changes.</li>
</ul>
</body>
</html>