Hi, guys.
My name is S. Han. I am a user of OVS in XenServer.

I would like to confirm that the following problem is solved in the latest
OVS version (2.3.0).


I tried running OVS 2.1.2 in XenServer 6.2. After the installation, the
XenServer hosts frequently crash due to kernel panic. XenServer crash
messages are written in ‘/var/crash/.’

According to the crash messages, in my opinion, stats_read() in the kernel
module openvswitch attempted acquiring a spinlock and then the task hung.
The watchdog detected it. Thus the XenServer Dom0 crashed.


I presume that this problem is related to issue of the following URL.

http://openvswitch.org/pipermail/dev/2014-March/038115.html

I verified that the buggy code was patched in OVS 2.1.3.

But, in the latest OVS (2.3.0), stats_read() has been removed. The caller
ovs_flow_stats_get() has been renewed thoroughly. And I cannot
explicitly find that the bug has been fixed in documents of OVS 2.3.0.

So I can't verify that the problem has been solved in OVS 2.3.0.


The following is system information of XenServer 6.2.



# *uname -a*
Linux xcnc026.nclp 2.6.32.43-0.4.1.xs1.8.0.847.170785xen #1 SMP Thu Nov 14
13:49:56 EST 2013 i686 i686 i386 GNU/Linux



The following is a part of the kernel panic message. I attached the kernel
panic message file.



==============================================



<4>[2654864.272868] Call Trace:
<4>[2654864.272873]  [<c02ddef1>] ? xen_poll_irq+0x91/0xe0
<4>[2654864.272877]  [<c02e40aa>] xen_spin_wait+0x12a/0x2a0
<4>[2654864.272881]  [<c03d8678>] _spin_lock+0xe8/0x100
<4>[2654864.272885]  [<c0396138>] tcp_v4_rcv+0x598/0x890
<4>[2654864.272889]  [<ee3f6270>] ? ipv4_confirm+0x0/0x160
[nf_conntrack_ipv4]
<4>[2654864.272892]  [<c0378fd2>] ip_local_deliver_finish+0xe2/0x250
<4>[2654864.272895]  [<c0378ef0>] ? ip_local_deliver_finish+0x0/0x250
<4>[2654864.272898]  [<c0379582>] ip_local_deliver+0x32/0xa0
<4>[2654864.272900]  [<c0378ef0>] ? ip_local_deliver_finish+0x0/0x250
<4>[2654864.272903]  [<c0378ccf>] ip_rcv_finish+0x14f/0x370
<4>[2654864.272905]  [<c0378b80>] ? ip_rcv_finish+0x0/0x370
<4>[2654864.272908]  [<c0379462>] ip_rcv+0x202/0x2f0
<4>[2654864.272910]  [<c0378b80>] ? ip_rcv_finish+0x0/0x370
<4>[2654864.272913]  [<c0379260>] ? ip_rcv+0x0/0x2f0
<4>[2654864.272916]  [<c03528f7>] netif_receive_skb+0x437/0x6a0
<4>[2654864.272919]  [<c0356197>] process_backlog+0x97/0xf0
<4>[2654864.272922]  [<c0355ec5>] net_rx_action+0x155/0x260
<4>[2654864.272926]  [<c013a8c2>] __do_softirq+0xc2/0x200
<4>[2654864.272929]  [<c02dfbc5>] ? end_pirq+0x95/0x110
<4>[2654864.272932]  [<c013aa75>] do_softirq+0x75/0x80
<4>[2654864.272933]  [<c013b135>] irq_exit+0x35/0x40
<4>[2654864.272936]  [<c03dc75c>] evtchn_do_upcall+0x2fc/0x4a9
<4>[2654864.272939]  [<c010477f>] hypervisor_callback+0x43/0x4b
<4>[2654864.272942]  [<c026007b>] ? radix_tree_delete+0xab/0x230
<4>[2654864.272945]  [<c02dde3d>] ? force_evtchn_callback+0xd/0x10
<4>[2654864.272947]  [<c03d860a>] _spin_lock+0x7a/0x100
<4>[2654864.272952]  [<ee42fbfa>] stats_read+0x9a/0xc0 [openvswitch]
<4>[2654864.272956]  [<ee430750>] ovs_flow_stats_get+0x70/0xc0 [openvswitch]
<4>[2654864.272960]  [<ee42d371>] ovs_flow_cmd_fill_info+0x201/0x300
[openvswitch]
<4>[2654864.272964]  [<ee42d4c1>] ovs_flow_cmd_build_info+0x51/0x80
[openvswitch]
<4>[2654864.272968]  [<ee42f69c>] ovs_flow_cmd_get+0xcc/0x130 [openvswitch]
<4>[2654864.272971]  [<c0371b63>] genl_rcv_msg+0x183/0x1c0
<4>[2654864.272973]  [<c03719e0>] ? genl_rcv_msg+0x0/0x1c0
<4>[2654864.272975]  [<c036ec8d>] netlink_rcv_skb+0x7d/0xa0
<4>[2654864.272978]  [<c0370821>] genl_rcv+0x21/0x30
<4>[2654864.272979]  [<c036ea21>] netlink_unicast+0x241/0x250
<4>[2654864.272982]  [<c034c99c>] ? memcpy_fromiovec+0x4c/0x70
<4>[2654864.272984]  [<c036f711>] netlink_sendmsg+0x1c1/0x280
<4>[2654864.272987]  [<c0342ea7>] sock_sendmsg+0xd7/0x100
<4>[2654864.272990]  [<c014e8c0>] ? autoremove_wake_function+0x0/0x50
<4>[2654864.272993]  [<c0379582>] ? ip_local_deliver+0x32/0xa0
<4>[2654864.272995]  [<c014e8c0>] ? autoremove_wake_function+0x0/0x50
<4>[2654864.272997]  [<c0378b80>] ? ip_rcv_finish+0x0/0x370
<4>[2654864.273000]  [<c02644b1>] ? copy_from_user+0x41/0x70
<4>[2654864.273002]  [<c034ccc6>] ? verify_iovec+0x36/0xa0
<4>[2654864.273005]  [<c0342fe6>] sys_sendmsg+0x116/0x230
<4>[2654864.273007]  [<c0343b9a>] ? sys_recvmsg+0x1ba/0x1c0
<4>[2654864.273009]  [<c03561b8>] ? process_backlog+0xb8/0xf0
<4>[2654864.273012]  [<c0106730>] ? xen_clocksource_read+0x20/0x130
<4>[2654864.273015]  [<c013aa75>] ? do_softirq+0x75/0x80
<4>[2654864.273018]  [<c0344277>] sys_socketcall+0x247/0x270
<4>[2654864.273021]  [<c0264683>] ? copy_to_user+0x43/0x60
<4>[2654864.273023]  [<c014d380>] ? posix_ktime_get_ts+0x0/0x20
<4>[2654864.273025]  [<c0104571>] syscall_call+0x7/0xb
<0>[2654864.273027] Kernel panic - not syncing: softlockup: hung tasks
<4>[2654864.273032] Pid: 6586, comm: ovs-vswitchd Not tainted
2.6.32.43-0.4.1.xs1.8.0.847.170785xen #1



Thank you
S. Han
_______________________________________________
discuss mailing list
[email protected]
http://openvswitch.org/mailman/listinfo/discuss

Reply via email to