[Bug 991] New: Exactly after 24h of uptime system hungs

bugzilla-daemon at netfilter.org bugzilla-daemon at netfilter.org
Fri Dec 12 15:54:59 CET 2014


https://bugzilla.netfilter.org/show_bug.cgi?id=991

            Bug ID: 991
           Summary: Exactly after 24h of uptime system hungs
           Product: netfilter/iptables
           Version: unspecified
          Hardware: sparc64
                OS: Debian GNU/Linux
            Status: NEW
          Severity: blocker
          Priority: P5
         Component: ip_tables (kernel)
          Assignee: netfilter-buglog at lists.netfilter.org
          Reporter: netfilter at horrify.org

On Sun Fire T1000 exactly after each 24h system hungs. There is nothing in
logs. On serial console I can see messages as below. On other SPARC Enterprise
T1000  server there is exactly the same effect. 

System: SUNW,Sun-Fire-T1000
Linux mail 3.2.0-4-sparc64-smp #1 SMP Debian 3.2.63-2+deb7u2 sparc64 GNU/Linux
ip_tables: (C) 2000-2006 Netfilter Core Team
nf_conntrack version 0.5.0 (16384 buckets, 65536 max)


[90297.014493] BUG: soft lockup - CPU#9 stuck for 22s! [iptables:9251]
[90297.014690] Modules linked in: xt_conntrack xt_multiport nf_conntrack_ipv4
nf_defrag_ipv4 xt_tcpudp xt_state nf_conntrack iptable_filter ip_tables
x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc ext2 loop flash ext4
crc16 jbd2 mbcache raid1 md_mod dm_mirror dm_region_hash dm_log dm_mod sg
sd_mod crc_t10dif mptsas scsi_transport_sas mptscsih mptbase scsi_mod tg3
libphy [last unloaded: scsi_wait_scan]
[90297.017277] TSTATE: 0000000011001600 TPC: 00000000004482e8 TNPC:
00000000004482ec Y: 00000000    Not tainted
[90297.017421] TPC: <__flush_tlb_kernel_range+0x28/0x40>
[90297.017648] g0: 0000000000000000 g1: 0000000109e48000 g2: ffffff0cd12e8000
g3: 0000000000002000
[90297.017813] g4: fffff803eb6ac1a0 g5: fffff800113e8000 g6: fffff803264e0000
g7: 0000000000000000
[90297.018075] o0: 0000000000000000 o1: 0000000000000000 o2: 0000000000000003
o3: 00000000f0000000
[90297.018287] o4: 0000000109e48000 o5: 0000000109e48000 sp: fffff803264e2f81
ret_pc: 00000000004ff67c
[90297.018583] RPC: <__purge_vmap_area_lazy+0x174/0x1ec>
[90297.018810] l0: 0000000000000046 l1: 00000000000000b0 l2: 0000000000000000
l3: 0000000102c61fa0
[90297.018925] l4: 0000000000000338 l5: 000000000000000f l6: fffff803264e0000
l7: 000000000043fb40
[90297.019184] i0: fffff803264e3900 i1: fffff803264e3908 i2: 0000000000000000
i3: 0000000000000000
[90297.019302] i4: fffff803264e3838 i5: 0000000000005001 i6: fffff803264e3051
i7: 00000000004ffcc4
[90297.019522] I7: <free_vmap_area_noflush+0x5c/0x6c>
[90297.019731] Call Trace:
[90297.019796]  [00000000004ffcc4] free_vmap_area_noflush+0x5c/0x6c
[90297.020032]  [0000000000500cc4] remove_vm_area+0x88/0xac
[90297.020116]  [0000000000500db4] __vunmap+0x34/0xe8
[90297.020251]  [00000000104c08fc] compat_get_entries+0x270/0x2b0 [ip_tables]
[90297.020510]  [00000000006d15c8] compat_nf_sockopt+0x8c/0xa8
[90297.020751]  [00000000006de19c] compat_ip_getsockopt+0xb0/0xe4
[90297.020849]  [0000000000699134] compat_sock_common_getsockopt+0x28/0x3c
[90297.021098]  [00000000006c2e14] compat_sys_getsockopt+0x17c/0x19c
[90297.021197]  [0000000000406134] linux_sparc_syscall32+0x34/0x60




[86296.051981] BUG: soft lockup - CPU#17 stuck for 22s! [iptables:10219]
[86296.052179] Modules linked in: xt_multiport xt_state nf_conntrack_ipv4
nf_defrag_ipv4 xt_tcpudp xt_conntrack nf_conntrack iptable_filter ip_tables
x_tables nfsd nfs nfs_acl auth_rpcgss fscache lockd sunrpc ext2 loop flash ext4
crc16 jbd2 mbcache raid1 md_mod dm_mirror dm_region_hash dm_log dm_mod sg
sd_mod crc_t10dif mptsas scsi_transport_sas mptscsih mptbase scsi_mod tg3
libphy [last unloaded: scsi_wait_scan]
[86296.054814] TSTATE: 0000000011001606 TPC: 00000000004482f4 TNPC:
00000000004482d8 Y: 00000000    Not tainted
[86296.055023] TPC: <__flush_tlb_kernel_range+0x34/0x40>
[86296.055251] g0: 0000000000000000 g1: 0000000109da2000 g2: ffffff0350b0c000
g3: 0000000000002000
[86296.055463] g4: fffff803fac513c0 g5: fffff800114e8000 g6: fffff803ede00000
g7: 0000000000000000
[86296.055727] o0: 0000000000000000 o1: 0000000000000084 o2: 0000000000000003
o3: 00000000f0000000
[86296.055940] o4: 0000000109d9e000 o5: 0000000109da2000 sp: fffff803ede02ed1
ret_pc: 00000000004ff67c
[86296.056221] RPC: <__purge_vmap_area_lazy+0x174/0x1ec>
[86296.056449] l0: 0000000000000022 l1: 00000000000000b0 l2: 0000000000000000
l3: fffff803d57157f8
[86296.056564] l4: 0000000000000338 l5: 000000000000000f l6: fffff803ede00000
l7: 000000000043fb40
[86296.056823] i0: fffff803ede03850 i1: fffff803ede03858 i2: 0000000000000000
i3: 0000000000000000
[86296.056942] i4: fffff803ede03788 i5: 0000000000005001 i6: fffff803ede02fa1
i7: 00000000004ffcc4
[86296.057162] I7: <free_vmap_area_noflush+0x5c/0x6c>
[86296.057372] Call Trace:
[86296.057437]  [00000000004ffcc4] free_vmap_area_noflush+0x5c/0x6c
[86296.057673]  [0000000000500cc4] remove_vm_area+0x88/0xac
[86296.057757]  [0000000000500db4] __vunmap+0x34/0xe8
[86296.057894]  [0000000010497160] xt_compat_flush_offsets+0x28/0x48 [x_tables]
[86296.058151]  [00000000104a2904] compat_get_entries+0x278/0x2b0 [ip_tables]
[86296.058405]  [00000000006d15c8] compat_nf_sockopt+0x8c/0xa8
[86296.058553]  [00000000006de19c] compat_ip_getsockopt+0xb0/0xe4
[86296.058798]  [0000000000699134] compat_sock_common_getsockopt+0x28/0x3c
[86296.058956]  [00000000006c2e14] compat_sys_getsockopt+0x17c/0x19c
[86296.059200]  [0000000000406134] linux_sparc_syscall32+0x34/0x60

-- 
You are receiving this mail because:
You are watching all bug changes.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.netfilter.org/pipermail/netfilter-buglog/attachments/20141212/0671ad62/attachment.html>


More information about the netfilter-buglog mailing list