You are not logged in.

#1 2017-03-31 21:11:46

Ochi
Member
Registered: 2010-04-06
Posts: 51

[SOLVED] Kernel warning when using nfs server with systemd v233

Hello,

(EDIT: @Mods: I have no idea why I haven't seen the [testing] subforum before, feel free to move this topic there, thanks.)

On my NAS, I'm using systemd 233 from testing because version 232 gives me trouble with a btrfs RAID 1 when used on multiple dm-crypt devices, but that is another issue. What I am observing with systemd 233 however is that as soon as I connect to the NAS via nfs (i.e. I mount a volume exported by the NAS on another machine), dmesg spits out the following warning on the NAS:

[  184.093866] ------------[ cut here ]------------
[  184.093893] WARNING: CPU: 0 PID: 0 at kernel/cgroup.c:492 cgroup_get+0x50/0x60
[  184.093897] Modules linked in: snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic iTCO_wdt iTCO_vendor_support mei_wdt mxm_wmi intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel i915 snd_hda_intel kvm irqbypass intel_cstate snd_hda_codec intel_rapl_perf snd_hda_core snd_hwdep snd_pcm snd_timer snd psmouse pcspkr hci_uart soundcore i2c_i801 i2c_smbus input_leds btbcm led_class btqca evdev mac_hid btintel drm_kms_helper battery bluetooth wmi video rfkill crc16 i2c_hid intel_lpss_acpi intel_lpss drm acpi_pad mei_me acpi_als kfifo_buf intel_gtt mei industrialio syscopyarea button sysfillrect sysimgblt tpm_tis tpm_tis_core fb_sys_fops tpm shpchp sch_fq_codel nfsd auth_rpcgss oid_registry nfs_acl lockd grace sunrpc ip_tables x_tables algif_skcipher af_alg dm_crypt dm_mod btrfs
[  184.093983]  xor raid6_pq sd_mod hid_generic usbhid hid serio_raw atkbd libps2 crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd ahci libahci igb i2c_algo_bit dca xhci_pci xhci_hcd usbcore e1000e ptp pps_core libata scsi_mod usb_common i8042 serio fjes
[  184.094028] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.9.17-1-lts #1
[  184.094030] Hardware name: To Be Filled By O.E.M. To Be Filled By O.E.M./C236 WSI, BIOS P1.00 10/21/2015
[  184.094034]  ffff880474403988 ffffffff812f8c1d 0000000000000000 0000000000000000
[  184.094040]  ffff8804744039c8 ffffffff8107cc0b 000001ec5598c0d0 ffff880455ac5800
[  184.094046]  ffff88045f5c87c0 ffff88045f5c87c0 ffff880460581900 0000000000000000
[  184.094052] Call Trace:
[  184.094054]  <IRQ> 
[  184.094062]  [<ffffffff812f8c1d>] dump_stack+0x63/0x86
[  184.094067]  [<ffffffff8107cc0b>] __warn+0xcb/0xf0
[  184.094072]  [<ffffffff8107cd3d>] warn_slowpath_null+0x1d/0x20
[  184.094075]  [<ffffffff8110f9e0>] cgroup_get+0x50/0x60
[  184.094081]  [<ffffffff81117a98>] cgroup_sk_alloc+0x68/0x70
[  184.094085]  [<ffffffff814cb1d0>] sk_clone_lock+0x2d0/0x380
[  184.094090]  [<ffffffff815318c4>] inet_csk_clone_lock+0x14/0xc0
[  184.094095]  [<ffffffff8154d2f3>] tcp_create_openreq_child+0x23/0x4b0
[  184.094099]  [<ffffffff8154b377>] tcp_v4_syn_recv_sock+0x47/0x2e0
[  184.094104]  [<ffffffff8154dae8>] tcp_check_req+0x368/0x500
[  184.094109]  [<ffffffff81549dd9>] ? tcp_v4_inbound_md5_hash+0x69/0x1b0
[  184.094113]  [<ffffffff8154c824>] tcp_v4_rcv+0x484/0xcd0
[  184.094119]  [<ffffffff81522082>] ? ip_route_input_noref+0xc72/0xf70
[  184.094123]  [<ffffffff814ccb68>] ? skb_free_head+0x28/0x30
[  184.094127]  [<ffffffff815254b4>] ip_local_deliver_finish+0x94/0x1e0
[  184.094130]  [<ffffffff81525b9a>] ip_local_deliver+0x5a/0xf0
[  184.094134]  [<ffffffff8155aeef>] ? arp_process+0x2af/0x730
[  184.094138]  [<ffffffff815257eb>] ip_rcv_finish+0x1eb/0x3f0
[  184.094141]  [<ffffffff81525ee3>] ip_rcv+0x2b3/0x3b0
[  184.094144]  [<ffffffff8155b4d6>] ? arp_rcv+0x146/0x1d0
[  184.094149]  [<ffffffff814e008a>] __netif_receive_skb_core+0x50a/0xa60
[  184.094154]  [<ffffffff8155233a>] ? tcp4_gro_receive+0x11a/0x1c0
[  184.094159]  [<ffffffff814e2ce8>] __netif_receive_skb+0x18/0x60
[  184.094164]  [<ffffffff814e2d70>] netif_receive_skb_internal+0x40/0xb0
[  184.094169]  [<ffffffff814e39f2>] napi_gro_receive+0xc2/0x120
[  184.094179]  [<ffffffffa01bbff8>] igb_poll+0x958/0xea0 [igb]
[  184.094185]  [<ffffffff814e4cae>] net_rx_action+0x22e/0x370
[  184.094189]  [<ffffffff815fc554>] __do_softirq+0x104/0x28c
[  184.094195]  [<ffffffff81082836>] irq_exit+0xb6/0xc0
[  184.094199]  [<ffffffff815fc2a4>] do_IRQ+0x54/0xd0
[  184.094205]  [<ffffffff815fa382>] common_interrupt+0x82/0x82
[  184.094207]  <EOI> 
[  184.094213]  [<ffffffff814adb34>] ? cpuidle_enter_state+0x134/0x2a0
[  184.094218]  [<ffffffff814adb0f>] ? cpuidle_enter_state+0x10f/0x2a0
[  184.094222]  [<ffffffff814adcd7>] cpuidle_enter+0x17/0x20
[  184.094228]  [<ffffffff810c1503>] call_cpuidle+0x23/0x40
[  184.094233]  [<ffffffff810c177b>] cpu_startup_entry+0x15b/0x240
[  184.094240]  [<ffffffff815ecad7>] rest_init+0x77/0x80
[  184.094244]  [<ffffffff81b27fd6>] start_kernel+0x43c/0x45d
[  184.094249]  [<ffffffff81b27120>] ? early_idt_handler_array+0x120/0x120
[  184.094253]  [<ffffffff81b272d6>] x86_64_start_reservations+0x2a/0x2c
[  184.094257]  [<ffffffff81b27424>] x86_64_start_kernel+0x14c/0x16f
[  184.094261] ---[ end trace 780a97db6e1414b1 ]---

This message is generated only once when connecting for the first time. I have tried with kernel 4.9.17-LTS, 4.9.20-LTS (testing) and 4.10.5 with similar results. When using systemd 232, I don't get this warning. Note that it also doesn't help to upgrade the whole system to testing instead of only systemd and its deps.

Can anyone confirm this issue?

Last edited by Ochi (2017-07-03 05:51:54)

Offline

#2 2017-07-03 05:51:21

Ochi
Member
Registered: 2010-04-06
Posts: 51

Re: [SOLVED] Kernel warning when using nfs server with systemd v233

In case anyone is interested or experiences this issue: After systemd v233 was no longer in testing, I re-evaluated the issue and still observed the aforementioned problem. It turns out that kernel 4.11.2 includes a change which seems to fix the issue for me (commit a5938c093: cgroup: fix spurious warnings on cgroup_is_dead() from cgroup_sk_alloc()). Noticeably, the linux-lts kernel still gives me the warning which is why I switched from lts to the regular kernel on my NAS.

Last edited by Ochi (2017-07-03 16:23:09)

Offline

#3 2017-07-08 21:08:44

risto3
Member
Registered: 2016-09-27
Posts: 36

Re: [SOLVED] Kernel warning when using nfs server with systemd v233

I just came across this same issue after upgrading everything but linux-lts (held back because of zfs).
$ uname -a
Linux smicro 4.9.30-1-lts #1 SMP Sun May 28 18:47:29 CEST 2017 x86_64 GNU/Linux
$ paclog-pkglist |grep systemd
libsystemd 233.75-3
systemd 233.75-3
systemd-sysvcompat 233.75-3

extrait dmesg:
[   30.039326] ------------[ cut here ]------------
[   30.039342] WARNING: CPU: 0 PID: 0 at kernel/cgroup.c:492 cgroup_get+0x50/0x60
[   30.039344] Modules linked in: cfg80211 rfkill ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 xt_hl ip6t_rt nf_conntrack_ipv6 nf_defrag_ipv6 ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_tcpudp xt_addrtype nls_iso8859_1 nls_cp437 nf_conntrack_ipv4 nf_defrag_ipv4 vfat fat xt_conntrack mgag200 ip6table_filter ttm ip6_tables drm_kms_helper nf_nat_tftp amd64_edac_mod nf_conntrack_tftp edac_mce_amd nf_conntrack_netbios_ns nf_conntrack_broadcast edac_core drm nf_nat_ftp nf_nat kvm_amd nf_conntrack_ftp nf_conntrack kvm evdev syscopyarea iptable_filter psmouse sysfillrect input_leds sysimgblt fb_sys_fops led_class mousedev irqbypass pcspkr k10temp mac_hid i2c_algo_bit sp5100_tco e1000e i2c_piix4 ptp pps_core shpchp fjes sch_fq_codel button acpi_cpufreq tpm_tis tpm_tis_core tpm zfs(PO) zunicode(PO)
[   30.039445]  zavl(PO) zcommon(PO) znvpair(PO) spl(O) ipmi_devintf nfsd auth_rpcgss oid_registry nfs_acl lockd grace sunrpc ipmi_si ipmi_msghandler ip_tables x_tables ext4 crc16 jbd2 fscrypto mbcache hid_generic usbhid hid sd_mod ohci_pci serio_raw atkbd libps2 ahci ehci_pci libahci ehci_hcd ohci_hcd libata usbcore scsi_mod usb_common i8042 serio
[   30.039503] CPU: 0 PID: 0 Comm: swapper/0 Tainted: P           O    4.9.30-1-lts #1
[   30.039506] Hardware name: Supermicro H8SGL/H8SGL, BIOS 3.5        11/25/2013
[   30.039510]  ffff880217c038d8 ffffffff812f897d 0000000000000000 0000000000000000
[   30.039518]  ffff880217c03918 ffffffff8107cc5b 000001ec8153bc0b ffff880211a88c00
[   30.039525]  ffff880215069740 ffff880215069740 ffff880215852f00 0000000000000000
[   30.039531] Call Trace:
[   30.039535]  <IRQ>
[   30.039545]  [<ffffffff812f897d>] dump_stack+0x63/0x86
[   30.039551]  [<ffffffff8107cc5b>] __warn+0xcb/0xf0
[   30.039557]  [<ffffffff8107cd8d>] warn_slowpath_null+0x1d/0x20
[   30.039562]  [<ffffffff81112230>] cgroup_get+0x50/0x60
[   30.039568]  [<ffffffff8111805a>] cgroup_sk_alloc+0x3a/0x90
[   30.039574]  [<ffffffff814cd12e>] sk_clone_lock+0x2ce/0x360
[   30.039580]  [<ffffffff81532ec4>] inet_csk_clone_lock+0x14/0xc0
[   30.039587]  [<ffffffff8154e813>] tcp_create_openreq_child+0x23/0x490
[   30.039592]  [<ffffffff8154c817>] tcp_v4_syn_recv_sock+0x47/0x2e0
[   30.039597]  [<ffffffff8154f13f>] tcp_check_req+0x35f/0x4e0
[   30.039602]  [<ffffffff8154b258>] ? tcp_v4_inbound_md5_hash+0x68/0x1b0
[   30.039607]  [<ffffffff8154dce4>] tcp_v4_rcv+0x474/0xd20
[   30.039618]  [<ffffffffa07ba40e>] ? ipv4_confirm+0xae/0xe0 [nf_conntrack_ipv4]
[   30.039623]  [<ffffffff8151faf5>] ? nf_iterate+0x55/0x60
[   30.039629]  [<ffffffff81526d1c>] ip_local_deliver_finish+0x5c/0x1f0
[   30.039633]  [<ffffffff8152746a>] ip_local_deliver+0x5a/0x100
[   30.039637]  [<ffffffff81526cc0>] ? inet_del_offload+0x40/0x40
[   30.039642]  [<ffffffff815270d7>] ip_rcv_finish+0x227/0x400
[   30.039646]  [<ffffffff81527768>] ip_rcv+0x258/0x3b0
[   30.039650]  [<ffffffff81526eb0>] ? ip_local_deliver_finish+0x1f0/0x1f0
[   30.039656]  [<ffffffff814e1ea1>] __netif_receive_skb_core+0x3a1/0xab0
[   30.039662]  [<ffffffff815537e3>] ? tcp4_gro_receive+0xf3/0x1d0
[   30.039668]  [<ffffffff814e4c48>] __netif_receive_skb+0x18/0x60
[   30.039674]  [<ffffffff814e4cd0>] netif_receive_skb_internal+0x40/0xb0
[   30.039679]  [<ffffffff814e597d>] napi_gro_receive+0xed/0x120
[   30.039696]  [<ffffffffa06e958a>] e1000_receive_skb+0x8a/0x130 [e1000e]
[   30.039702]  [<ffffffff814d6101>] ? __napi_alloc_skb+0xa1/0xf0
[   30.039714]  [<ffffffffa06e9ebc>] e1000_clean_rx_irq+0x13c/0x3d0 [e1000e]
[   30.039725]  [<ffffffffa06f129e>] e1000e_poll+0xae/0x2d0 [e1000e]
[   30.039731]  [<ffffffff810a7a95>] ? wake_up_process+0x15/0x20
[   30.039736]  [<ffffffff814e6ba5>] net_rx_action+0x115/0x380
[   30.039743]  [<ffffffff815fd6e7>] __do_softirq+0xd7/0x2d0
[   30.039749]  [<ffffffff810828a6>] irq_exit+0xb6/0xc0
[   30.039754]  [<ffffffff815fd495>] do_IRQ+0x85/0xd0
[   30.039758]  [<ffffffff815fb542>] common_interrupt+0x82/0x82
[   30.039760]  <EOI>
[   30.039768]  [<ffffffff815fa3d6>] ? native_safe_halt+0x6/0x10
[   30.039775]  [<ffffffff815fa110>] default_idle+0x20/0xe0
[   30.039781]  [<ffffffff81037c3f>] arch_cpu_idle+0xf/0x20
[   30.039786]  [<ffffffff815fa523>] default_idle_call+0x23/0x30
[   30.039792]  [<ffffffff810c1f51>] cpu_startup_entry+0x1d1/0x240
[   30.039797]  [<ffffffff815edea7>] rest_init+0x77/0x80
[   30.039802]  [<ffffffff81b28fb6>] start_kernel+0x43c/0x45d
[   30.039808]  [<ffffffff81b28120>] ? early_idt_handler_array+0x120/0x120
[   30.039813]  [<ffffffff81b282d1>] x86_64_start_reservations+0x2a/0x2c
[   30.039818]  [<ffffffff81b2840e>] x86_64_start_kernel+0x13b/0x15e
[   30.039821] ---[ end trace cf40000672d7d552 ]---

[added a bit later]
Forgot to mention that I confirm 4.11 kernel doesn't exhibit this...
so it would be nice to backport whatever fix it was to LTS..

Last edited by risto3 (2017-07-08 21:11:47)

Offline

#4 2017-07-26 12:55:00

bjo
Member
Registered: 2011-09-10
Posts: 80

Re: [SOLVED] Kernel warning when using nfs server with systemd v233

This issue still exists with 4.9.37, so it's still not fixed in LTS.

Offline

Board footer

Powered by FluxBB