> Jan  8 18:30:59 srv11 kernel: [ 3878.272003] ------------[ cut here 
> ]------------
> Jan  8 18:30:59 srv11 kernel: [ 3878.295572] WARNING: at net/ipv4/tcp.c:1330 
> tcp_cleanup_rbuf+0x4d/0xfc()
> Jan  8 18:30:59 srv11 kernel: [ 3878.319107] Hardware name: System x3690 X5 
> -[7148Z68]-
> Jan  8 18:30:59 srv11 kernel: [ 3878.340686] cleanup rbuf bug: copied 
> 7B02E4F6 seq 7B01F558 rcvnxt 7B02E4F6
> Jan  8 18:30:59 srv11 kernel: [ 3878.363160] Modules linked in: 8021q garp 
> stp llc nls_utf8 nls_cp437 vfat fat acpi_cpufreq snd_pcm cdc_ether usbnet mii 
> coretemp kvm_intel kvm snd_timer snd crc32c_intel evdev joydev hid_generic 
> soundcore microcode snd_page_alloc serio_raw pcspkr mperf tpm_tis processor 
> ioatdma lpc_ich i2c_i801 tpm shpchp mfd_core tpm_bios pci_hotplug i2c_core 
> dca thermal_sys button ext4 mbcache jbd2 crc16 dm_mod sg sr_mod cdrom sd_mod 
> crc_t10dif ata_generic usbhid hid uhci_hcd ata_piix libata megaraid_sas 
> ehci_hcd bnx2 usbcore scsi_mod usb_common be2net
> Jan  8 18:30:59 srv11 kernel: [ 3878.513462] Pid: 30307, comm: haproxy 
> Tainted: G        W    3.7.1 #1
> Jan  8 18:30:59 srv11 kernel: [ 3878.540064] Call Trace:
> Jan  8 18:30:59 srv11 kernel: [ 3878.564947]  [<ffffffff8103ef70>] ? 
> warn_slowpath_common+0x78/0x8c
> Jan  8 18:30:59 srv11 kernel: [ 3878.591417]  [<ffffffff8103f023>] ? 
> warn_slowpath_fmt+0x45/0x4a
> Jan  8 18:30:59 srv11 kernel: [ 3878.617965]  [<ffffffff812d3e02>] ? 
> tcp_cleanup_rbuf+0x4d/0xfc
> Jan  8 18:30:59 srv11 kernel: [ 3878.645352]  [<ffffffff812d4034>] ? 
> tcp_read_sock+0x183/0x194
> Jan  8 18:30:59 srv11 kernel: [ 3878.670621]  [<ffffffff812d487d>] ? 
> tcp_sendpage+0x45b/0x45b
> Jan  8 18:30:59 srv11 kernel: [ 3878.696935]  [<ffffffff812d4118>] ? 
> tcp_splice_read+0xd3/0x223
> Jan  8 18:30:59 srv11 kernel: [ 3878.721845]  [<ffffffff8112d9ae>] ? 
> sys_splice+0x345/0x3bf
> Jan  8 18:30:59 srv11 kernel: [ 3878.746239]  [<ffffffff813651a9>] ? 
> system_call_fastpath+0x16/0x1b
> Jan  8 18:30:59 srv11 kernel: [ 3878.770749] ---[ end trace 91a60bafa2f9d85e 
> ]---


I recall we had a similar report on the ML back in September with a 3.5.0 
kernel (thread @[1]). Like the old report your one shows a tainted kernel as 
well. However both reports have the G and the W flag, that probably means the 
kernel is only "Tainted" because its not the first kernel warning since boot 
(first warning sets WARN_ON - the W flag; G means everything in your kernel is 
GPL or GPL compliant).

Can you confirm you are running a vanilla kernel from kernel.org? If my 
suspicion is correct, you should find the same kernel warning in the beginning 
of your dmesg, but without the "Tainted" sign. I suggest you post that kernel 
warning on the linux netdev mailing list, as Willy suggested in the older 
thread.


> After removing the option splice-response and option splice-request the cpu 
> load instantly dropped to a almost normal level.
> So i guess there are either in haproxy or in the kernel some splice issues.

In fact, this seems to be a kernel issue with TCP splicing.


> i´ll try to downgrade the kernel tomorrow to 3.7 or maybe lower.

I believe the regression is older than that. If you have the possibility, you 
could give 3.4.24 and 3.5.7 a try. If 3.4.24 works and 3.5.7 doesn't, then the 
regression has been introduced with the 3.5 kernel.


[1] http://permalink.gmane.org/gmane.comp.web.haproxy/9560



Regards,

Lukas


                                          

Reply via email to