Date: Mon, 29 Apr 2019 19:48:01 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 237656] "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests Message-ID: <bug-237656-227@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237656 Bug ID: 237656 Summary: "Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory." seen when running sys/netipsec tests Product: Base System Version: CURRENT Hardware: Any OS: Any Status: New Severity: Affects Some People Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: ngie@FreeBSD.org I see multiple warnings from the UMA keg code when running the netipsec tun= nel tests about leaked UMA kegs. From https://ci.freebsd.org/job/FreeBSD-head-amd64-test/11014/consoleText : sys/netipsec/tunnel/aes_cbc_128_hmac_sha1:v4 -> lock order reversal: 1st 0xffffffff82096810 allprison (allprison) @ /usr/src/sys/kern/kern_jail.c:966 2nd 0xffffffff820c4830 vnet_sysinit_sxlock (vnet_sysinit_sxlock) @ /usr/src/sys/net/vnet.c:575 stack backtrace: #0 0xffffffff80c47773 at witness_debugger+0x73 #1 0xffffffff80c474bd at witness_checkorder+0xa7d #2 0xffffffff80be9008 at _sx_slock_int+0x68 #3 0xffffffff80d0f687 at vnet_alloc+0x117 #4 0xffffffff80ba40a1 at kern_jail_set+0x1bb1 #5 0xffffffff80ba5b00 at sys_jail_set+0x40 #6 0xffffffff810b2e16 at amd64_syscall+0x276 #7 0xffffffff8108b5fd at fast_syscall_common+0x101 Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.301s] sys/netipsec/tunnel/aes_cbc_128_hmac_sha1:v6 -> passed [0.278s] sys/netipsec/tunnel/aes_cbc_256_hmac_sha2_256:v4 -> aesni0: <AES-CBC,AES-XTS,AES-GCM,AES-ICM> on motherboard Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.275s] sys/netipsec/tunnel/aes_cbc_256_hmac_sha2_256:v6 -> passed [0.278s] sys/netipsec/tunnel/aes_gcm_128:v4 -> aesni0: detached Apr 29 18:27:50 kernel: nd6_dad_timer: called with non-tentative address fe80:3::20:9bff:fe26:1c0a(epair2a) Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.285s] sys/netipsec/tunnel/aes_gcm_128:v6 -> passed [0.278s] sys/netipsec/tunnel/aes_gcm_256:v4 -> Freed UMA keg (rtentry) was not emp= ty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.287s] sys/netipsec/tunnel/aes_gcm_256:v6 -> passed [0.280s] sys/netipsec/tunnel/aesni_aes_cbc_128_hmac_sha1:v4 -> aesni0: <AES-CBC,AES-XTS,AES-GCM,AES-ICM> on motherboard Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.291s] sys/netipsec/tunnel/aesni_aes_cbc_128_hmac_sha1:v6 -> passed [0.292s] sys/netipsec/tunnel/aesni_aes_cbc_256_hmac_sha2_256:v4 -> aesni0: detached Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.296s] sys/netipsec/tunnel/aesni_aes_cbc_256_hmac_sha2_256:v6 -> passed [0.257s] sys/netipsec/tunnel/aesni_aes_gcm_128:v4 -> aesni0: <AES-CBC,AES-XTS,AES-GCM,AES-ICM> on motherboard Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.256s] sys/netipsec/tunnel/aesni_aes_gcm_128:v6 -> passed [0.254s] sys/netipsec/tunnel/aesni_aes_gcm_256:v4 -> Freed UMA keg (rtentry) was n= ot empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.262s] sys/netipsec/tunnel/aesni_aes_gcm_256:v6 -> passed [0.291s] sys/netipsec/tunnel/empty:v4 -> Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. Freed UMA keg (rtentry) was not empty (18 items). Lost 1 pages of memory. passed [0.285s] sys/netipsec/tunnel/empty:v6 -> passed [0.282s] Suggested repro: * Boot a WITNESS enabled kernel with IPSEC support. * Run `sudo kyua test -k /usr/tests/sys/netipsec/tunnel/Kyuafile`. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-237656-227>