Re: Linux 4.1.28

From: Thomas Voegtle
Date: Fri Jul 15 2016 - 09:05:03 EST


On Fri, 15 Jul 2016, Sasha Levin wrote:

On 07/15/2016 07:38 AM, Thomas Voegtle wrote:
On Wed, 13 Jul 2016, Sasha Levin wrote:

I'm announcing the release of the 4.1.28 kernel.

I have a serious memleak with 4.1.28 (like 20mb/s)
I stripped down my kernel config and started a bisect, which came to:

# first bad commit: [c5ad33184354260be6d05de57e46a5498692f6d6] mm/swap.c:
flush lru pvecs on compound page arrival
=>
commit c5ad33184354260be6d05de57e46a5498692f6d6
Author: Lukasz Odzioba <lukasz.odzioba@xxxxxxxxx>
Date: Fri Jun 24 14:50:01 2016 -0700

mm/swap.c: flush lru pvecs on compound page arrival


Reverting this on top 4.1.28 helps. Config attached.

Yup, this was reported and a fix is already queued for 4.1.29.

And that one?
Happens while trying to start a firewall script with iptables-restore.


[ 180.071999] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [iptables-restor:2338]
[ 180.072000] Modules linked in: xt_CT xt_addrtype xt_set iptable_raw iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables nf_conntrack_netbios_ns nf_conntrack_broadcast nf_nat_tftp nf_conntrack_tftp nf_nat_pptp nf_nat_proto_gre nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_irc nf_conntrack_irc nf_nat_sip nf_conntrack_sip nf_nat_ftp nf_nat nf_conntrack_ftp nfnetlink_log nfsd lockd grace nfs_acl rpcsec_gss_krb5 auth_rpcgss sunrpc oid_registry nf_conntrack_netlink nf_conntrack autofs4 msr xfrm_user ipv6 dummy ip_set_hash_netiface ip_set_list_set ip_set_hash_net ip_set vhost_net macvtap macvlan vhost tun capi kernelcapi ipmi_devintf ipmi_msghandler sg st snd_hda_codec_realtek snd_hda_codec_generic snd_hda_intel snd_hda_controller snd_hda_codec snd_hda_core
[ 180.072000] i915 snd_pcm coretemp snd_timer kvm_intel snd_hwdep drm_kms_helper snd kvm soundcore drm e1000e acpi_cpufreq firewire_ohci video processor e100 i2c_i801 i2c_algo_bit tpm_tis ptp i2c_core intel_agp intel_gtt firewire_core agpgart ppdev thermal_sys parport_pc tpm lpc_ich evdev microcode 8250_fintek parport button hwmon mfd_core pps_core mii
[ 180.072000] CPU: 1 PID: 2338 Comm: iptables-restor Not tainted 4.1.28-cx #1
[ 180.072000] Hardware name: /DG33BU, BIOS DPP3510J.86A.0572.2009.0715.2346 07/15/2009
[ 180.072000] task: ffff8800df0a60d0 ti: ffff8800c6d50000 task.ti: ffff8800c6d50000
[ 180.072000] RIP: 0010:[<ffffffffc05bdac6>] [<ffffffffc05bdac6>] translate_table+0x3a6/0x6bd [ip_tables]
[ 180.072000] RSP: 0018:ffff8800c6d53c98 EFLAGS: 00000283
[ 180.072000] RAX: 0000000000000e38 RBX: ffff88021bfd4b18 RCX: ffff8801f34e9988
[ 180.072000] RDX: 0000000000000000 RSI: ffff8801f34ea908 RDI: ffff8800df14ae38
[ 180.072000] RBP: ffff8800c6d53d88 R08: 0000000000000001 R09: 0000000000000009
[ 180.072000] R10: ffff8801f34e9988 R11: 0000000000000000 R12: 0000000100000000
[ 180.072000] R13: ffff88021bfd3b50 R14: ffff88021bfd4b00 R15: ffff8800c6d53ce0
[ 180.072000] FS: 00007f31ba21a700(0000) GS:ffff88021bc80000(0000) knlGS:0000000000000000
[ 180.072000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 180.072000] CR2: 00000000015e1b28 CR3: 00000000ca20e000 CR4: 00000000000406e0
[ 180.072000] Stack:
[ 180.072000] ffff8800c6d53d08 ffff8801f34e9988 ffff880200000001 0000000000000009
[ 180.072000] 0000000000000000 0000000000000000 ffff8800df14a108 ffffffff81ce2c40
[ 180.072000] ffff8800c6d53dcc ffff8800c6d53de0 0000000900000003 0000000000000000
[ 180.072000] Call Trace:
[ 180.072000] [<ffffffff8111a923>] ? __kmalloc_node+0x26/0x2d
[ 180.072000] [<ffffffff81667495>] ? cpumask_next+0x1b/0x1d
[ 180.072000] [<ffffffff81668ec3>] ? xt_alloc_table_info+0xc2/0xdf
[ 180.072000] [<ffffffffc05be6c3>] do_ipt_set_ctl+0xfd/0x193 [ip_tables]
[ 180.072000] [<ffffffff81665181>] nf_sockopt+0x64/0x7e
[ 180.072000] [<ffffffff816651cc>] nf_setsockopt+0x1c/0x20
[ 180.072000] [<ffffffff81674dd1>] ip_setsockopt+0x6e/0x8e
[ 180.072000] [<ffffffff8168fe47>] raw_setsockopt+0x11/0x4c
[ 180.072000] [<ffffffff816296ab>] sock_common_setsockopt+0xf/0x11
[ 180.072000] [<ffffffff81628ab2>] SyS_setsockopt+0x85/0xa5
[ 180.072000] [<ffffffff816e7dee>] system_call_fastpath+0x12/0x71
[ 180.072000] Code: 02 00 8b 46 20 75 3b 89 c6 83 ee 00 78 34 8b 33 48 63 f8 48 8d 4e 90 48 39 cf 0f 87 df 02 00 00 4c 01 ef 4c 89 d1 4c 01 d6 eb 0d <48> 39 f9 74 22 44 0f b7 59 5a 4c 01 d9 48 39 f1 72 ee e9 bd 02