[Bug 1975501] [NEW] bfq_deactivate_entity: NULL pointer dereference

2022-05-23 Thread Sergey Borodavkin
Public bug reported:

Hello. We meet a kernel panic with next trace:

bfq_insert+0x5c/0x70 [bfq]
__bfq_deactivate_entity+0xe7/0x1b0 [bfq]
bfq_deactivate_entity+0x5d/0xd0 [bfq]
bfq_del_bfqq_busy+0xac/0x150 [bfq]
__bfq_bfqq_expire+0x64/0xd0 [bfq]
bfq_bfqq_expire+0x331/0x930 [bfq]
? try_to_wake_up+0x235/0x5f0
? bfq_dispatch_request+0xf70/0xf70 [bfq]
bfq_idle_slice_timer+0x6d/0xc0 [bfq]
__hrtimer_run_queues+0x10f/0x280
hrtimer_interrupt+0xe7/0x230
smp_apic_timer_interrupt+0x6f/0x130
apic_timer_interrupt+0xf/0x20

After little research i found out that bug was reported by Fedora and openSUSE 
community earlier.
https://bugzilla.redhat.com/show_bug.cgi?id=2022819
https://bugzilla.opensuse.org/show_bug.cgi?id=1192714

And patch for this bug already exist
https://lore.kernel.org/all/20220401102325.17617-1-j...@suse.cz/

Since there are no similar reports in the Ubuntu community, I decided to make 
this report.
Full dmesg log in attachments.
Also have a crash dump file, can attach that file if it necessary. 



Environment:
  Distributor ID: Ubuntu
  Description: Ubuntu 18.04.6 LTS
  Release: 18.04
  Codename: bionic
  kernel: 5.4.0-110-generic #124~18.04.1-Ubuntu

** Affects: linux-hwe (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: bionic

** Attachment added: "dmesg_bfq_deactivate_entity"
   
https://bugs.launchpad.net/bugs/1975501/+attachment/5592301/+files/dmesg_bfq_deactivate_entity

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1975501

Title:
  bfq_deactivate_entity: NULL pointer dereference

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-hwe/+bug/1975501/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1949247] Re: kernel: BUG: unable to handle page fault for address (5.4.0-89)

2022-04-07 Thread Sergey Borodavkin
Met same problem with kernel version 5.4.0-81
I have kdump file for that bug, can attach that file if necessary.

# lsb_release -rd
Description:Ubuntu 18.04.6 LTS
Release:18.04


dmesg log

BUG: unable to handle page fault for address: 003e3898 
#PF: supervisor write access in kernel mode 
#PF: error_code(0x0002) - not-present page 
PGD 0 P4D 0  
Oops: 0002 [#1] SMP NOPTI 
CPU: 12 PID: 17994 Comm: libvirtd Kdump: loaded Tainted: G   OE 
5.4.0-81-generic #91~18.04.1-Ubuntu 
Hardware name: Supermicro Super Server/X11DDW-L, BIOS 3.3 02/21/2020 
RIP: 0010:native_queued_spin_lock_slowpath+0x192/0x1f0 
Code: 8b 02 48 85 c0 74 f6 48 89 c6 eb e5 c1 ee 12 83 e0 03 83 ee 01 48 c1 e0 
05 48 63 f6 48 05 c0 ba 02 00 48 03 04 f5 20 29 64 af <48> 89 10 8b 42 08 85 c0 
75 09 f3 90 8b 42 08 85 c0 74 f7 48 8b 02 
RSP: 0018:b11c23af3b88 EFLAGS: 00010202 
RAX: 003e3898 RBX: ac60 RCX: 0034 
RDX: 9ca100d2bac0 RSI: 3f68 RDI: 9ca0f70c52b0 
RBP: b11c23af3b88 R08: 0034 R09: 00031160 
R10: 9ca1bffd5000 R11:  R12: 9ca0f70c52b0 
R13: 0010 R14: b11c23af3cf0 R15: 9cd0f4401a00 
FS:  7f939957e700() GS:9ca100d0() knlGS: 
CS:  0010 DS:  ES:  CR0: 80050033 
CR2: 003e3898 CR3: 005de5282002 CR4: 007626e0 
DR0:  DR1:  DR2:  
DR3:  DR6: fffe0ff0 DR7: 0400 
PKRU: 5554 
Call Trace: 
 _raw_spin_lock+0x1f/0x30 
 __swap_duplicate+0x5a/0x1a0 
 swap_duplicate+0x1a/0x40 
 copy_page_range+0x938/0xdb0 
 dup_mm+0x3f5/0x5c0 
 copy_process+0x1b20/0x1b40 
 _do_fork+0x76/0x370 
 ? handle_mm_fault+0xcb/0x210 
 __x64_sys_clone+0x84/0xb0 
 do_syscall_64+0x57/0x190 
 entry_SYSCALL_64_after_hwframe+0x44/0xa9 
RIP: 0033:0x7f93a724f8ec 
Code: c5 45 85 f6 0f 85 b4 01 00 00 64 4c 8b 04 25 10 00 00 00 31 d2 4d 8d 90 
d0 02 00 00 31 f6 bf 11 00 20 01 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 0f 87 
f0 00 00 00 85 c0 41 89 c4 0f 85 fd 00 00 
RSP: 002b:7f939957d340 EFLAGS: 0246 ORIG_RAX: 0038 
RAX: ffda RBX: 7f939957d340 RCX: 7f93a724f8ec 
RDX:  RSI:  RDI: 01200011 
RBP: 7f939957d430 R08: 7f939957e700 R09:  
R10: 7f939957e9d0 R11: 0246 R12:  
R13: 0020 R14: 0001 R15: 7f939957d680

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1949247

Title:
  kernel: BUG: unable to handle page fault for address (5.4.0-89)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1949247/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952193] Re: NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2022-01-10 Thread Sergey Borodavkin
** Description changed:

  Hello.
  
  We meet a randomly host kernel panics with same RIP and "BUG: kernel NULL 
pointer dereference".
- At current time affected kernel versions was from 5.4.0-53 to 5.4.0-84.
+ At current time affected kernel versions was from 5.4.0-53 to 5.4.0-87.
  For now i have a dmesg log and crash file, but no clue where what to do next.
  
  
  
  Environment:
-   Distributor ID: Ubuntu
-   Description:Ubuntu 18.04.6 LTS
-   Release:18.04
-   Codename:   bionic
- 
+   Distributor ID: Ubuntu
+   Description:Ubuntu 18.04.6 LTS
+   Release:18.04
+   Codename:   bionic
  
  Crash report
  
-   KERNEL: usr/lib/debug/boot/vmlinux-5.4.0-84-generic  
- DUMPFILE: dump.202111240900  [PARTIAL DUMP]
- CPUS: 24
- DATE: Wed Nov 24 09:00:22 2021
-   UPTIME: 15 days, 23:17:07
+   KERNEL: usr/lib/debug/boot/vmlinux-5.4.0-84-generic
+ DUMPFILE: dump.202111240900  [PARTIAL DUMP]
+ CPUS: 24
+ DATE: Wed Nov 24 09:00:22 2021
+   UPTIME: 15 days, 23:17:07
  LOAD AVERAGE: 46.41, 37.67, 30.39
-TASKS: 3071
- NODENAME: cmp20
-  RELEASE: 5.4.0-84-generic
-  VERSION: #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021
-  MACHINE: x86_64  (2299 Mhz)
-   MEMORY: 255.9 GB
-PANIC: "Oops:  [#1] SMP PTI" (check log for details)
-  PID: 2239917
-  COMMAND: "CPU 0/KVM"
- TASK: 9bbd9662  [THREAD_INFO: 9bbd9662]
-  CPU: 14
-STATE: TASK_RUNNING (PANIC)
+    TASKS: 3071
+ NODENAME: cmp20
+  RELEASE: 5.4.0-84-generic
+  VERSION: #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021
+  MACHINE: x86_64  (2299 Mhz)
+   MEMORY: 255.9 GB
+    PANIC: "Oops:  [#1] SMP PTI" (check log for details)
+  PID: 2239917
+  COMMAND: "CPU 0/KVM"
+ TASK: 9bbd9662  [THREAD_INFO: 9bbd9662]
+  CPU: 14
+    STATE: TASK_RUNNING (PANIC)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952193

Title:
  NULL pointer dereference at _mod_memcg_state+0x14/0xb0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta-hwe-5.4/+bug/1952193/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952193] Re: NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2021-11-24 Thread Sergey Borodavkin
Link to crash dump
https://drive.google.com/file/d/14FRxK0RKi7HFRYdkQRhyImnS7ZfNuVla/view

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952193

Title:
  NULL pointer dereference at _mod_memcg_state+0x14/0xb0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta-hwe-5.4/+bug/1952193/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1952193] [NEW] NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2021-11-24 Thread Sergey Borodavkin
Public bug reported:

Hello.

We meet a randomly host kernel panics with same RIP and "BUG: kernel NULL 
pointer dereference".
At current time affected kernel versions was from 5.4.0-53 to 5.4.0-84.
For now i have a dmesg log and crash file, but no clue where what to do next.



Environment:
  Distributor ID: Ubuntu
  Description:Ubuntu 18.04.6 LTS
  Release:18.04
  Codename:   bionic


Crash report

  KERNEL: usr/lib/debug/boot/vmlinux-5.4.0-84-generic  
DUMPFILE: dump.202111240900  [PARTIAL DUMP]
CPUS: 24
DATE: Wed Nov 24 09:00:22 2021
  UPTIME: 15 days, 23:17:07
LOAD AVERAGE: 46.41, 37.67, 30.39
   TASKS: 3071
NODENAME: cmp20
 RELEASE: 5.4.0-84-generic
 VERSION: #94~18.04.1-Ubuntu SMP Thu Aug 26 23:17:46 UTC 2021
 MACHINE: x86_64  (2299 Mhz)
  MEMORY: 255.9 GB
   PANIC: "Oops:  [#1] SMP PTI" (check log for details)
 PID: 2239917
 COMMAND: "CPU 0/KVM"
TASK: 9bbd9662  [THREAD_INFO: 9bbd9662]
 CPU: 14
   STATE: TASK_RUNNING (PANIC)

** Affects: linux-meta-hwe-5.4 (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: bionic

** Attachment added: "dmesg.202111240900"
   
https://bugs.launchpad.net/bugs/1952193/+attachment/5543242/+files/dmesg.202111240900

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1952193

Title:
  NULL pointer dereference at _mod_memcg_state+0x14/0xb0

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux-meta-hwe-5.4/+bug/1952193/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] Re: systemd pid 1 memory leak

2021-09-08 Thread Sergey Borodavkin
@brian-murray Hi. Tested that build, all seems fine, still no memory
leak.

# apt-cache policy systemd
systemd:
  Installed: 245.4-4ubuntu3.13
  Candidate: 245.4-4ubuntu3.13
  Version table:
 *** 245.4-4ubuntu3.13 500
500 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages
100 /var/lib/dpkg/status

Test was performed like i was describe at original post, i run chef-
client and it start checking for all .service and .timers units, and it
cause memory leak, after upgrade no mem leak.

** Tags removed: verification-needed verification-needed-focal
** Tags added: verification-done verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] Re: systemd pid 1 memory leak

2021-09-06 Thread Sergey Borodavkin
Yep, i checked on friday and no memory leak since then.

Version of package and source repository:

# apt-cache policy systemd
systemd:
  Installed: 245.4-4ubuntu3.12
  Candidate: 245.4-4ubuntu3.12
  Version table:
 *** 245.4-4ubuntu3.12 500
500 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages

Test was performed like i was describe at original post, i run chef-
client and it start checking for all .service and .timers units, and it
cause memory leak, after upgrade no mem leak.

** Tags removed: verification-needed-focal
** Tags added: verification-done-focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] Re: systemd pid 1 memory leak

2021-08-20 Thread Sergey Borodavkin
Thanks for answering!
Yep, that build fixed leak for me.

# apt-cache policy systemd
systemd:
  Installed: 245.4-4ubuntu3.12~202108090622~ubuntu20.04.1

This build will be used for official systemd-245.4-4ubuntu3.12 package ?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] Re: systemd pid 1 memory leak

2021-08-18 Thread Sergey Borodavkin
Just checked again, bug still exist for latest systemd package on focal.

# apt-cache policy systemd
systemd:
  Installed: 245.4-4ubuntu3.11

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] Re: systemd pid 1 memory leak

2021-07-08 Thread Sergey Borodavkin
** Attachment added: "pmap_pid1_focal"
   
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+attachment/5509911/+files/pmap_pid1_focal

** Description changed:

  Hi everybody.
  
  We've meet a memory leak of pid1 process on the focal release.
  When we launch chef-client, several systemd .service and .timers are checked 
for state.
  Every time of this run pid1 increase VSZ/RSS on ~ 232 Kb, this don't happen 
on xenial and bionic releases.
  I straced pid1 when that leak happen and found brk call.
  On pmap view of pid 1 it's anon memory grow on the same address and all 
marked as dirty.
+ All that leak memory can be freed by calling systemctl daemon-reexec.
  
  Searching in systemd github repo i found this commit
  
https://github.com/systemd/systemd/commit/3fb2326f3ed87aa0b26078d307ebfb299e36286d
  - it may be related to this leak.
  
- 

+ 
  
  Environment:
-   Distributor ID: Ubuntu
-   Description:Ubuntu 20.04.2 LTS
-   Release:20.04
-   Codename:   focal
-   Uname:  5.4.0-77-generic #83-Ubuntu SMP Sat May 8 02:35:39 UTC 2021 
x86_64
+   Distributor ID: Ubuntu
+   Description:Ubuntu 20.04.2 LTS
+   Release:20.04
+   Codename:   focal
+   Uname:  5.4.0-77-generic #83-Ubuntu SMP Sat May 8 02:35:39 UTC 2021 
x86_64
  
  Package:
-   systemd:
- Installed: 245.4-4ubuntu3.7
+   systemd:
+ Installed: 245.4-4ubuntu3.7

** Tags added: pid1

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1935051] [NEW] systemd pid 1 memory leak

2021-07-08 Thread Sergey Borodavkin
Public bug reported:

Hi everybody.

We've meet a memory leak of pid1 process on the focal release.
When we launch chef-client, several systemd .service and .timers are checked 
for state.
Every time of this run pid1 increase VSZ/RSS on ~ 232 Kb, this don't happen on 
xenial and bionic releases.
I straced pid1 when that leak happen and found brk call.
On pmap view of pid 1 it's anon memory grow on the same address and all marked 
as dirty.
All that leak memory can be freed by calling systemctl daemon-reexec.

Searching in systemd github repo i found this commit
https://github.com/systemd/systemd/commit/3fb2326f3ed87aa0b26078d307ebfb299e36286d
- it may be related to this leak.



Environment:
  Distributor ID: Ubuntu
  Description:Ubuntu 20.04.2 LTS
  Release:20.04
  Codename:   focal
  Uname:  5.4.0-77-generic #83-Ubuntu SMP Sat May 8 02:35:39 UTC 2021 
x86_64

Package:
  systemd:
Installed: 245.4-4ubuntu3.7

** Affects: systemd (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: pid1 systemd

** Attachment added: "pid1 strace focal"
   
https://bugs.launchpad.net/bugs/1935051/+attachment/5509910/+files/pid1_strace_focal

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1935051

Title:
  systemd pid 1 memory leak

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs