From: Pravin B Shelar Date: Thu, 14 Jan 2016 00:42:10 +0000 (-0800) Subject: datapath: STT: Fix nf-hook softlockup. X-Git-Url: http://git.cascardo.eti.br/?p=cascardo%2Fovs.git;a=commitdiff_plain;h=3b6565cd7439152daf353c856447e5f32f038d39 datapath: STT: Fix nf-hook softlockup. nf-hook is not unregistered on STT device delete, But when second time it was created it nf-hook is again registered. which causes following softlockup. Following patch fixes it by registering nf-hook only on very first stt device. ---8<--- BUG: soft lockup - CPU#1 stuck for 22s! [ovs-vswitchd:11293] RIP: 0010:[] [] nf_ip_hook+0xf8/0x180 [openvswitch] Stack: [] ? ip_rcv_finish+0x350/0x350 [] nf_iterate+0x9a/0xb0 [] ? ip_rcv_finish+0x350/0x350 [] nf_hook_slow+0x7c/0x120 [] ? ip_rcv_finish+0x350/0x350 [] ip_local_deliver+0x73/0x80 [] ip_rcv_finish+0x7d/0x350 [] ip_rcv+0x298/0x3d0 [] __netif_receive_skb_core+0x696/0x880 [] __netif_receive_skb+0x18/0x60 [] process_backlog+0xae/0x180 [] net_rx_action+0x152/0x270 [] __do_softirq+0xec/0x300 [] do_softirq_own_stack+0x1c/0x30 Fixes: fee43fa2 ("datapath: Fix deadlock on STT device destroy.") Signed-off-by: Pravin B Shelar Tested-by: Joe Stringer --- diff --git a/datapath/linux/compat/stt.c b/datapath/linux/compat/stt.c index 98d6d5b3c..527dfeeec 100644 --- a/datapath/linux/compat/stt.c +++ b/datapath/linux/compat/stt.c @@ -153,6 +153,9 @@ struct stt_net { struct list_head stt_list; struct list_head stt_up_list; /* Devices which are in IFF_UP state. */ int n_tunnels; +#ifdef HAVE_NF_REGISTER_NET_HOOK + bool nf_hook_reg_done; +#endif }; static int stt_net_id; @@ -1553,12 +1556,23 @@ static int stt_start(struct net *net) * rtnl-lock, which results in dead lock in stt-dev-create. Therefore * use this new API. */ + + if (sn->nf_hook_reg_done) + goto out; + err = nf_register_net_hook(net, &nf_hook_ops); + if (!err) + sn->nf_hook_reg_done = true; #else + /* Register STT only on very first STT device addition. */ + if (!list_empty(&nf_hook_ops.list)) + goto out; + err = nf_register_hook(&nf_hook_ops); #endif if (err) goto dec_n_tunnel; +out: sn->n_tunnels++; return 0; @@ -1854,6 +1868,9 @@ static int stt_init_net(struct net *net) INIT_LIST_HEAD(&sn->stt_list); INIT_LIST_HEAD(&sn->stt_up_list); +#ifdef HAVE_NF_REGISTER_NET_HOOK + sn->nf_hook_reg_done = false; +#endif return 0; } @@ -1868,7 +1885,7 @@ static void stt_exit_net(struct net *net) /* Ideally this should be done from stt_stop(), But on some kernels * nf-unreg operation needs RTNL-lock, which can cause deallock. * So it is done from here. */ - if (!list_empty(&nf_hook_ops.list)) + if (sn->nf_hook_reg_done) nf_unregister_net_hook(net, &nf_hook_ops); #endif