View Issue Details

IDProjectCategoryView StatusLast Update
0017363administrationmirrorspublic2020-05-15 08:47
Reportertiantao 
PriorityhighSeveritycrashReproducibilityrandom
Status newResolutionopen 
Product Version 
Target VersionFixed in Version 
Summary0017363: kernel hang
DescriptionWhen the stress test is, the system hangs.Our analysis has nothing to do with HNS.Has anyone had a similar problem?
the kernel version as below
Linux version 4.14.0-115.el7a.0.1.aarch64 (mockbuild@aarch64-01.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-36) (GCC)) #1 SMP Sun Nov 25 20:54:21 UTC 2018

[18832.249295] nr_pdflush_threads exported in /proc is scheduled for removal
[4853451.274579] rtc-efi rtc-efi: can't read time
[11735174.844811] hrtimer: interrupt took 82220 ns
[13814732.596217] IPv4: Attempt to release TCP socket in state 10 ffff802fc65b5800
[13835444.249464] Unable to handle kernel paging request at virtual address 00058d7b
[13835444.249610] Mem abort info:
[13835444.249664] Exception class = DABT (current EL), IL = 32 bits
[13835444.249767] SET = 0, FnV = 0
[13835444.249823] EA = 0, S1PTW = 0
[13835444.249880] Data abort info:
[13835444.249936] ISV = 0, ISS = 0x00000005
[13835444.250004] CM = 0, WnR = 0
[13835444.250063] user pgtable: 64k pages, 48-bit VAs, pgd = ffff80afc5840400
[13835444.250177] [0000000000058d7b] *pgd=0000000000000000, *pud=0000000000000000
[13835444.250302] Internal error: Oops: 96000005 [#1] SMP
[13835444.250389] Modules linked in: binfmt_misc sctp_diag sctp tcp_diag udp_diag inet_diag unix_diag bonding dm_mirror dm_region_hash dm_log dm_mod vfat fat ipmi_ssif sr_mod crc32_ce cdrom ghash_ce sha2_ce sha256_arm64 sha1_ce ses enclosure sg ipmi_si ipmi_devintf ipmi_msghandler sbsa_gwdt ip_tables xfs libcrc32c usb_storage marvell hibmc_drm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops ttm hisi_sas_v2_hw hisi_sas_main drm libsas hns_dsaf i2c_designware_platform hns_enet_drv i2c_designware_core megaraid_sas scsi_transport_sas ehci_platform hns_mdio hnae
[13835444.251439] CPU: 39 PID: 16425 Comm: cm_agent Kdump: loaded Not tainted 4.14.0-115.el7a.0.1.aarch64 #1
[13835444.251661] Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.60 05/10/2019
[13835444.251783] task: ffff8090e9834100 task.stack: ffff000032040000
[13835444.251926] PC is at __inet_lookup_listener+0xac/0x214
[13835444.252056] LR is at tcp_v4_rcv+0x6dc/0xbb8
[13835444.252166] pc : [<ffff00000877b31c>] lr : [<ffff00000879a3ac>] pstate: 00000005
[13835444.252292] sp : ffff000009dcf930
[13835444.252355] x29: ffff000009dcf930 x28: ffff000008f05a00
[13835444.257770] x27: 0000000000000000 x26: ffff000008d50018
[13835444.263187] x25: 0000000000007eba x24: 000000000e553647
[13835444.268468] x23: 0000000000000028 x22: 00000000000062f8
[13835444.273738] x21: 0000000012553647 x20: 00000000ffffffff
[13835444.278955] x19: 0000000000058d4b x18: ffff809ff7e4a720
[13835444.284255] x17: 0000000000000000 x16: 0000000000000000
[13835444.289535] x15: 0000000000000007 x14: 504c0a080204b405
[13835444.294568] x13: 0000000000000001 x12: 0000000000000001
[13835444.299712] x11: 0000000000000000 x10: 00000000000062f8
[13835444.304804] x9 : 0000000012553647 x8 : 000000000e553647
[13835444.309781] x7 : 00000000000062f8 x6 : 0000000012553647
[13835444.314579] x5 : 0000000000007eba x4 : 0000000000000000
[13835444.319329] x3 : 0000000000000000 x2 : 0000000000000000
[13835444.323869] x1 : 0000000000000000 x0 : 0000000000000000
[13835444.328383] Process cm_agent (pid: 16425, stack limit = 0xffff000032040000)
[13835444.333037] Call trace:
[13835444.337833] Exception stack(0xffff000009dcf7f0 to 0xffff000009dcf930)
[13835444.342576] f7e0: 0000000000000000 0000000000000000
[13835444.347489] f800: 0000000000000000 0000000000000000 0000000000000000 0000000000007eba
[13835444.352326] f820: 0000000012553647 00000000000062f8 000000000e553647 0000000012553647
[13835444.357149] f840: 00000000000062f8 0000000000000000 0000000000000001 0000000000000001
[13835444.361907] f860: 504c0a080204b405 0000000000000007 0000000000000000 0000000000000000
[13835444.366525] f880: ffff809ff7e4a720 0000000000058d4b 00000000ffffffff 0000000012553647
[13835444.371009] f8a0: 00000000000062f8 0000000000000028 000000000e553647 0000000000007eba
[13835444.375242] f8c0: ffff000008d50018 0000000000000000 ffff000008f05a00 ffff000009dcf930
[13835444.379471] f8e0: ffff00000879a3ac ffff000009dcf930 ffff00000877b31c 0000000000000005
[13835444.383560] f900: ffff809a55a7d690 0000000000007eba 0000ffffffffffff ffff0000098cce00
[13835444.387528] f920: ffff000009dcf930 ffff00000877b31c
[13835444.391291] [<ffff00000877b31c>] __inet_lookup_listener+0xac/0x214
[13835444.395066] [<ffff00000879a3ac>] tcp_v4_rcv+0x6dc/0xbb8
[13835444.398723] [<ffff000008771d70>] ip_local_deliver_finish+0x10c/0x254
[13835444.402364] [<ffff000008772498>] ip_local_deliver+0xf4/0x100
[13835444.405972] [<ffff0000087720c4>] ip_rcv_finish+0x20c/0x3a8
[13835444.409479] [<ffff000008772784>] ip_rcv+0x2e0/0x3cc
[13835444.412877] [<ffff00000871bb98>] __netif_receive_skb_core+0x320/0xa84
[13835444.416258] [<ffff00000871eccc>] __netif_receive_skb+0x34/0x7c
[13835444.419641] [<ffff000008722470>] netif_receive_skb_internal+0x78/0x118
[13835444.423065] [<ffff00000872317c>] napi_gro_receive+0xcc/0x148
[13835444.426555] [<ffff000000e31120>] hns_nic_rx_up_pro+0x38/0x44 [hns_enet_drv]
[13835444.430111] [<ffff000000e32928>] hns_nic_rx_poll_one+0x258/0x5a0 [hns_enet_drv]
[13835444.433757] [<ffff000000e31184>] hns_nic_common_poll+0x58/0xc4 [hns_enet_drv]
[13835444.437532] [<ffff000008722b34>] net_rx_action+0x314/0x470
[13835444.441190] [<ffff000008081a9c>] __do_softirq+0x11c/0x2f0
[13835444.444937] [<ffff0000080db6ac>] irq_exit+0x120/0x150
[13835444.448670] [<ffff000008140b08>] __handle_domain_irq+0x78/0xc4
[13835444.452532] [<ffff000008081868>] gic_handle_irq+0xa0/0x1b8
[13835444.456369] Exception stack(0xffff00003204fbd0 to 0xffff00003204fd10)
[13835444.460428] fbc0: 0000fffff09a9778 0000000000000000
[13835444.464525] fbe0: 0000fffff09a9778 0000ffffffffffff 0000ffffffffffff ffff8092d273fff8
[13835444.468875] fc00: ffff8092d273fff8 0000000000000001 000000000000000c ffff000008d71cef
[13835444.473372] fc20: 0000000000000008 ffff809ffbffec80 00000000000001f8 0000000000000008
[13835444.477691] fc40: 0000000400000003 ffffffffffffffed 0000000000000000 0000000000000000
[13835444.481958] fc60: 0000000000000013 0000fffff09a9470 ffff80911d9fa000 ffff000008db3000
[13835444.486230] fc80: ffff809fc71f5800 ffff809f9b74dc00 0000000000000000 0000ffff7fff77a0
[13835444.490360] fca0: 0000000000000000 0000000000000000 ffff000009601000 ffff00003204fd10
[13835444.494553] fcc0: ffff0000082b98cc ffff00003204fd10 ffff0000082b8638 0000000040000005
[13835444.498786] fce0: ffff00003204fd00 ffff0000082b99f0 0000ffffffffffff ffff0000082b9a98
[13835444.503269] fd00: ffff00003204fd10 ffff0000082b8638
[13835444.507572] [<ffff0000080830b0>] el1_irq+0xb0/0x140
[13835444.511867] [<ffff0000082b8638>] get_user_arg_ptr+0x70/0x88
[13835444.516147] [<ffff0000082b98cc>] copy_strings+0x80/0x2f0
[13835444.520415] [<ffff0000082bab98>] do_execveat_common+0x438/0x64c
[13835444.524712] [<ffff0000082bade4>] do_execve+0x38/0x44
[13835444.528932] [<ffff0000082bafe0>] SyS_execve+0x34/0x44
[13835444.533042] Exception stack(0xffff00003204fec0 to 0xffff000032050000)
[13835444.537371] fec0: 0000ffffa3198a80 0000ffff7fff77a0 0000fffff09a9470 0000000000000008
[13835444.541667] fee0: 0000000000000000 0000ffff7fffc1e8 0000000000000002 0000000000000002
[13835444.545931] ff00: 00000000000000dd 0000ffff7fffa9f8 0000aaaab14a7000 0000000000000fff
[13835444.550209] ff20: 0000aaaab14a6fab ffffffffffffffff 0000000000000013 ffffffffffffffed
[13835444.554538] ff40: 0000ffffa3360090 0000ffffa30a21b8 0000000000000013 0000000000000000
[13835444.558903] ff60: 0000ffff7fff77a0 0000ffffa31e22c0 0000ffff7fff7bd8 0000ffff7fff77c0
[13835444.563239] ff80: 0000000000000001 0000ffff7fff7780 0000ffffa2870080 0000000000000000
[13835444.567624] ffa0: 0000aaaab14d5000 0000ffff7fff7950 0000ffffa30a204c 0000ffff7fff7720
[13835444.572012] ffc0: 0000ffffa310ad48 0000000000000000 0000ffffa3198a80 00000000000000dd
[13835444.576321] ffe0: 0000000000000000 0000000000000000 0000000000000000 0000000000000000
[13835444.580652] [<ffff00000808392c>] __sys_trace_return+0x0/0x4
[13835444.584966] Code: 2a0303e1 f9403673 b4000353 d101a273 (f9401a63)
[13835444.589415] SMP: stopping secondary CPUs
[13835444.596176] Starting crashdump kernel...
[13835444.600510] Bye!
TagsNo tags attached.

Activities

There are no notes attached to this issue.

Issue History

Date Modified Username Field Change
2020-05-15 08:47 tiantao New Issue