lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 15 Jul 2016 15:04:48 +0200 (CEST)
From:	Thomas Voegtle <tv@...96.de>
To:	Sasha Levin <sasha.levin@...cle.com>
cc:	LKML <linux-kernel@...r.kernel.org>,
	stable <stable@...r.kernel.org>, lwn@....net
Subject: Re: Linux 4.1.28

On Fri, 15 Jul 2016, Sasha Levin wrote:

> On 07/15/2016 07:38 AM, Thomas Voegtle wrote:
>> On Wed, 13 Jul 2016, Sasha Levin wrote:
>>
>>> I'm announcing the release of the 4.1.28 kernel.
>>
>> I have a serious memleak with 4.1.28 (like 20mb/s)
>> I stripped down my kernel config and started a bisect, which came to:
>>
>> # first bad commit: [c5ad33184354260be6d05de57e46a5498692f6d6] mm/swap.c:
>> flush lru pvecs on compound page arrival
>> =>
>> commit c5ad33184354260be6d05de57e46a5498692f6d6
>> Author: Lukasz Odzioba <lukasz.odzioba@...el.com>
>> Date:   Fri Jun 24 14:50:01 2016 -0700
>>
>>     mm/swap.c: flush lru pvecs on compound page arrival
>>
>>
>> Reverting this on top 4.1.28 helps. Config attached.
>
> Yup, this was reported and a fix is already queued for 4.1.29.

And that one?
Happens while trying to start a firewall script with iptables-restore.


[  180.071999] NMI watchdog: BUG: soft lockup - CPU#1 stuck for 22s! 
[iptables-restor:2338]
[  180.072000] Modules linked in: xt_CT xt_addrtype xt_set iptable_raw 
iptable_mangle iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 
iptable_filter ip_tables nf_conntrack_netbios_ns nf_conntrack_broadcast 
nf_nat_tftp nf_conntrack_tftp nf_nat_pptp nf_nat_proto_gre 
nf_conntrack_pptp nf_conntrack_proto_gre nf_nat_irc nf_conntrack_irc 
nf_nat_sip nf_conntrack_sip nf_nat_ftp nf_nat nf_conntrack_ftp 
nfnetlink_log nfsd lockd grace nfs_acl rpcsec_gss_krb5 auth_rpcgss sunrpc 
oid_registry nf_conntrack_netlink nf_conntrack autofs4 msr xfrm_user ipv6 
dummy ip_set_hash_netiface ip_set_list_set ip_set_hash_net ip_set 
vhost_net macvtap macvlan vhost tun capi kernelcapi ipmi_devintf 
ipmi_msghandler sg st snd_hda_codec_realtek snd_hda_codec_generic 
snd_hda_intel snd_hda_controller snd_hda_codec snd_hda_core
[  180.072000]  i915 snd_pcm coretemp snd_timer kvm_intel snd_hwdep 
drm_kms_helper snd kvm soundcore drm e1000e acpi_cpufreq firewire_ohci 
video processor e100 i2c_i801 i2c_algo_bit tpm_tis ptp i2c_core intel_agp 
intel_gtt firewire_core agpgart ppdev thermal_sys parport_pc tpm lpc_ich 
evdev microcode 8250_fintek parport button hwmon mfd_core pps_core mii
[  180.072000] CPU: 1 PID: 2338 Comm: iptables-restor Not tainted 
4.1.28-cx #1
[  180.072000] Hardware name:                  /DG33BU, BIOS 
DPP3510J.86A.0572.2009.0715.2346 07/15/2009
[  180.072000] task: ffff8800df0a60d0 ti: ffff8800c6d50000 task.ti: 
ffff8800c6d50000
[  180.072000] RIP: 0010:[<ffffffffc05bdac6>]  [<ffffffffc05bdac6>] 
translate_table+0x3a6/0x6bd [ip_tables]
[  180.072000] RSP: 0018:ffff8800c6d53c98  EFLAGS: 00000283
[  180.072000] RAX: 0000000000000e38 RBX: ffff88021bfd4b18 RCX: 
ffff8801f34e9988
[  180.072000] RDX: 0000000000000000 RSI: ffff8801f34ea908 RDI: 
ffff8800df14ae38
[  180.072000] RBP: ffff8800c6d53d88 R08: 0000000000000001 R09: 
0000000000000009
[  180.072000] R10: ffff8801f34e9988 R11: 0000000000000000 R12: 
0000000100000000
[  180.072000] R13: ffff88021bfd3b50 R14: ffff88021bfd4b00 R15: 
ffff8800c6d53ce0
[  180.072000] FS:  00007f31ba21a700(0000) GS:ffff88021bc80000(0000) 
knlGS:0000000000000000
[  180.072000] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  180.072000] CR2: 00000000015e1b28 CR3: 00000000ca20e000 CR4: 
00000000000406e0
[  180.072000] Stack:
[  180.072000]  ffff8800c6d53d08 ffff8801f34e9988 ffff880200000001 
0000000000000009
[  180.072000]  0000000000000000 0000000000000000 ffff8800df14a108 
ffffffff81ce2c40
[  180.072000]  ffff8800c6d53dcc ffff8800c6d53de0 0000000900000003 
0000000000000000
[  180.072000] Call Trace:
[  180.072000]  [<ffffffff8111a923>] ? __kmalloc_node+0x26/0x2d
[  180.072000]  [<ffffffff81667495>] ? cpumask_next+0x1b/0x1d
[  180.072000]  [<ffffffff81668ec3>] ? xt_alloc_table_info+0xc2/0xdf
[  180.072000]  [<ffffffffc05be6c3>] do_ipt_set_ctl+0xfd/0x193 [ip_tables]
[  180.072000]  [<ffffffff81665181>] nf_sockopt+0x64/0x7e
[  180.072000]  [<ffffffff816651cc>] nf_setsockopt+0x1c/0x20
[  180.072000]  [<ffffffff81674dd1>] ip_setsockopt+0x6e/0x8e
[  180.072000]  [<ffffffff8168fe47>] raw_setsockopt+0x11/0x4c
[  180.072000]  [<ffffffff816296ab>] sock_common_setsockopt+0xf/0x11
[  180.072000]  [<ffffffff81628ab2>] SyS_setsockopt+0x85/0xa5
[  180.072000]  [<ffffffff816e7dee>] system_call_fastpath+0x12/0x71
[  180.072000] Code: 02 00 8b 46 20 75 3b 89 c6 83 ee 00 78 34 8b 33 48 63 
f8 48 8d 4e 90 48 39 cf 0f 87 df 02 00 00 4c 01 ef 4c 89 d1 4c 01 d6 eb 0d 
<48> 39 f9 74 22 44 0f b7 59 5a 4c 01 d9 48 39 f1 72 ee e9 bd 02

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ