[zesty] mlx5 OVS vxlan ipv6 LNST test cause Oops
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Expired
|
Medium
|
Unassigned | ||
Zesty |
Expired
|
Medium
|
Unassigned |
Bug Description
After running offload enabled LNST ipv6 vxlan ovs test (recipes/
The test itself and other LNST tests pass, it's the shutdown phase that causes this.
There are different stack traces that usually relate to some kind of allocation (or ext4, inode), see one below.
scenario :
1. Install lnst tests
git clone https:/
2. prepare OVS offload enable setup (2 machines) connected Back to Back
3. enable 2 VM's on the mlnx5 Physical Function on each machine
4. setup lnst on vm and HV (run lnst-slave)
5. run IPv VXLAN lnst test in loop
for example #lnst-ctl -d --pools=talat run recipes/
Call trace
kernel: [76406.381439] Oops: 0000 [#1] SMP
kernel: [76406.419297] Modules linked in: act_mirred act_gact act_tunnel_key cls_flower sch_ingress vport_vxlan vxlan ip6_udp_tunnel udp_tunnel vfio_pci vfio_iommu_type1 vfio_virqfd vfio mlx5_ib ib_core nfsv3 nfs fscache xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_
kernel: [76406.981750] mei_me dcdbas intel_rapl_perf shpchp mei ipmi_msghandler lpc_ich mac_hid acpi_power_meter configfs nfsd auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear mlx4_en hid_generic tg3 mlx5_core usbhid mlx4_core ahci ptp mxm_wmi hid libahci megaraid_sas devlink pps_core fjes wmi
kernel: [76407.335099] CPU: 25 PID: 5253 Comm: ip Not tainted 4.10.0-19-generic #21-Ubuntu
kernel: [76407.446475] Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.3.4 11/08/2016
kernel: [76407.558645] task: ffff9a2b76f89680 task.stack: ffffbda6c76a8000
kernel: [76407.618666] RIP: 0010:rb_
kernel: [76407.676596] RSP: 0018:ffffbda6c7
kernel: [76407.735460] RAX: ffff9a2c2cc30bc0 RBX: ffff9a2c53372d18 RCX: 0000000000000000
kernel: [76407.797100] RDX: 0000000000000000 RSI: ffff9a2c53372d20 RDI: ffff9a2c2cc30a40
kernel: [76407.858831] RBP: ffffbda6c76ab4f0 R08: 0000000000000000 R09: 000000018040002e
kernel: [76407.921323] R10: ffff9a2c2cc30b40 R11: 00000000000f9e00 R12: ffff9a2c2cc30a40
kernel: [76407.984793] R13: ffff9a2c53372d18 R14: 0000000000000046 R15: ffff9a2c5536b800
kernel: [76408.048453] FS: 00007f3d96082d8
kernel: [76408.166912] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: [76408.227997] CR2: 0000000000000000 CR3: 00000010181b5000 CR4: 00000000003426e0
kernel: [76408.290488] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kernel: [76408.351513] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
kernel: [76408.410855] Call Trace:
kernel: [76408.463227] private_
kernel: [76408.516647] iova_magazine_
kernel: [76408.569805] free_iova_
kernel: [76408.620830] flush_unmaps_
kernel: [76408.671569] intel_unmap+
kernel: [76408.720173] intel_unmap_
kernel: [76408.767571] mlx5e_page_
kernel: [76408.816057] mlx5e_destroy_
kernel: [76408.863341] mlx5e_close_
kernel: [76408.910105] mlx5e_close_
kernel: [76408.955876] mlx5e_close_
kernel: [76409.000267] mlx5e_close+
kernel: [76409.042831] __dev_close_
kernel: [76409.083537] __dev_close+
kernel: [76409.122035] __dev_change_
kernel: [76409.160600] dev_change_
kernel: [76409.198250] do_setlink+
kernel: [76409.235159] ? nla_parse+
kernel: [76409.270899] rtnl_newlink+
kernel: [76409.306535] ? security_
kernel: [76409.341989] ? ns_capable_
kernel: [76409.377215] ? ns_capable+
kernel: [76409.411543] rtnetlink_
kernel: [76409.445368] ? __kmalloc_
kernel: [76409.480369] ? __alloc_
kernel: [76409.512880] ? rtnl_newlink+
kernel: [76409.544854] netlink_
kernel: [76409.576628] rtnetlink_
kernel: [76409.608717] netlink_
kernel: [76409.640348] netlink_
kernel: [76409.671522] ? aa_sock_
kernel: [76409.702695] sock_sendmsg+
kernel: [76409.733084] ___sys_
kernel: [76409.763826] ? mem_cgroup_
kernel: [76409.796237] ? lru_cache_
kernel: [76409.830626] ? handle_
kernel: [76409.863080] ? __dentry_
kernel: [76409.894984] __sys_sendmsg+
kernel: [76409.926068] SyS_sendmsg+
kernel: [76409.956873] entry_SYSCALL_
kernel: [76409.989499] RIP: 0033:0x7f3d95799237
kernel: [76410.020795] RSP: 002b:00007ffd54
kernel: [76410.087104] RAX: ffffffffffffffda RBX: 00007ffd5452aec0 RCX: 00007f3d95799237
kernel: [76410.127078] RDX: 0000000000000000 RSI: 00007ffd54522e00 RDI: 0000000000000003
kernel: [76410.167215] RBP: 00007ffd54522e00 R08: 0000000000000001 R09: fefefeff77686d74
kernel: [76410.207897] R10: 00007ffd5452c7c0 R11: 0000000000000246 R12: 00007ffd54522e40
kernel: [76410.248850] R13: 00005612b473a020 R14: 00007ffd5452aec0 R15: 0000000000000000
kernel: [76410.290185] Code: 10 f6 c2 01 0f 84 d3 00 00 00 48 83 e2 fc 0f 84 1e ff ff ff 48 89 c1 48 89 d0 48 8b 50 08 48 39 ca 0f 85 71 ff ff ff 48 8b 50 10 <f6> 02 01 75 3a 48 8b 7a 08 48 89 c1 48 83 c9 01 48 89 78 10 48
kernel: [76410.416172] RIP: rb_erase+
kernel: [76410.458747] CR2: 0000000000000000
kernel: [76410.498095] ---[ end trace 8d9a539d70087300 ]---
other traces
kernel: general protection fault: 0000 [#1] SMP
kernel: Modules linked in: act_mirred act_gact act_tunnel_key cls_flower sch_ingress vport_vxlan vxlan ip6_udp_tunnel udp_tunnel vfio_pci vfio_iommu_type1 vfio_virqfd vfio mlx5_ib ib_core nfsv3 rpcsec_gss_kr
kernel: lpc_ich dcdbas intel_rapl_perf ipmi_devintf shpchp ipmi_msghandler mac_hid acpi_power_meter nfsd configfs auth_rpcgss nfs_acl lockd grace sunrpc ip_tables x_tables autofs4 btrfs raid10 raid456 async
kernel: CPU: 19 PID: 1902 Comm: ovs-vswitchd Not tainted 4.10.8+ #13
kernel: Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.3.4 11/08/2016
kernel: task: ffff8d28f135ad00 task.stack: ffffadb848858000
kernel: RIP: 0010:kmem_
kernel: RSP: 0018:ffffadb848
kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00000000000028da
kernel: RDX: 00000000000028d9 RSI: 00000000014000c0 RDI: 000000000001c5c0
kernel: RBP: ffffadb84885bde0 R08: ffff8d311f25c5c0 R09: ffff8d291f407980
kernel: R10: ffff006400000000 R11: ffff8d28f56c5280 R12: 00000000014000c0
kernel: R13: ffffffff9218255b R14: 00007ffce91a4c70 R15: ffff8d291f407980
kernel: FS: 00007fda8441594
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 0000564f3e7bc224 CR3: 0000000830bfc000 CR4: 00000000003426e0
kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
kernel: Call Trace:
kernel: ? kmem_cache_
kernel: sock_alloc_
kernel: alloc_inode+
kernel: new_inode_
kernel: sock_alloc+
kernel: SYSC_accept4+
kernel: ? ____fput+0xe/0x10
kernel: ? task_work_
kernel: SyS_accept+
kernel: entry_SYSCALL_
kernel: RIP: 0033:0x7fda8394f8ed
kernel: RSP: 002b:00007ffce9
kernel: RAX: ffffffffffffffda RBX: 000055e38935c6a0 RCX: 00007fda8394f8ed
kernel: RDX: 00007ffce91a4c6c RSI: 00007ffce91a4c70 RDI: 0000000000000069
kernel: RBP: 000055e3893800d0 R08: 0000000000000000 R09: 0000000000000001
kernel: R10: 000000000003516c R11: 0000000000000293 R12: 00007ffce91a4da0
kernel: R13: 00007ffce91a4c70 R14: 00007ffce91a4d40 R15: 000055e38937dc40
kernel: Code: 08 65 4c 03 05 f7 1d 3f 6e 49 83 78 10 00 4d 8b 10 0f 84 f0 00 00 00 4d 85 d2 0f 84 e7 00 00 00 49 63 41 20 48 8d 4a 01 49 8b 39 <49> 8b 1c 02 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 bb 49 63
kernel: general protection fault: 0000 [#1] SMP
kernel: Modules linked in: act_tunnel_key act_gact act_mirred cls_flower mlx5_ib mlx5_core mst_pciconf(OE) mst_pci(OE) ib_umad nfsv3 nfs fscache vfio_pci vfio_iommu_type1 vfio_virqfd vfio netconsole ib_core
kernel: stp llc ipmi_si intel_cstate joydev input_leds mei_me ipmi_devintf mei lpc_ich intel_rapl_perf shpchp dcdbas ipmi_msghandler mac_hid acpi_power_meter nfsd auth_rpcgss nfs_acl lockd grace sunrpc conf
kernel: CPU: 37 PID: 12495 Comm: modprobe Tainted: G OE 4.10.6+ #8
kernel: Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.3.4 11/08/2016
kernel: task: ffffa0b485b60000 task.stack: ffffb84c89260000
kernel: RIP: 0010:__
kernel: RSP: 0018:ffffb84c89
kernel: RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000018061
kernel: RDX: 0000000000018060 RSI: 0000000000000000 RDI: 000000000001c5c0
kernel: RBP: ffffb84c89263c18 R08: ffffa0b49f49c5c0 R09: ffffa0ac9f407980
kernel: R10: ffff006400000000 R11: 000000006f6e736f R12: 00000000014080c0
kernel: R13: 0000000000000040 R14: ffffffff8c6d0f3e R15: ffffa0ac9f407980
kernel: FS: 00007f4ef665070
kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
kernel: CR2: 000055cdb53d4228 CR3: 000000103ace8000 CR4: 00000000003426e0
kernel: DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
kernel: DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
kernel: Call Trace:
kernel: ? ext4fs_
kernel: ext4_htree_
kernel: htree_dirblock_
kernel: ? dput+0x34/0x250
kernel: ext4_htree_
kernel: ? kmem_cache_
kernel: ext4_readdir+
kernel: ? lru_cache_
kernel: iterate_
kernel: SyS_getdents+
kernel: ? fillonedir+
kernel: entry_SYSCALL_
kernel: RIP: 0033:0x7f4ef614331b
kernel: RSP: 002b:00007fffd3
kernel: RAX: ffffffffffffffda RBX: 00007f4ef643cb58 RCX: 00007f4ef614331b
kernel: RDX: 0000000000008000 RSI: 000055cdb53cc220 RDI: 0000000000000000
kernel: RBP: 00007f4ef643cb00 R08: 00007f4ef643cbb8 R09: 0000000000000000
kernel: R10: 000055cdb53cc1f0 R11: 0000000000000206 R12: 00007f4ef643cb58
kernel: R13: 0000000000008040 R14: 00007f4ef643cb58 R15: 000000000000270f
kernel: Code: 08 65 4c 03 05 c6 08 9f 73 49 83 78 10 00 4d 8b 10 0f 84 d5 00 00 00 4d 85 d2 0f 84 cc 00 00 00 49 63 41 20 48 8d 4a 01 49 8b 39 <49> 8b 1c 02 4c 89 d0 65 48 0f c7 0f 0f 94 c0 84 c0 74 bb 49 63
kernel: RIP: __kmalloc+
tags: | added: zesty |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1682418
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.