Guys we fix these problems using a kernel >= 3.8
With Ubuntu 12.04.4 we are using Kernel 3.8 and 3.11 from Canonical official 
repository with out any issue. With 3.5 and stock 3.2 we had a lot trouble.

Regards,
Federico
Il giorno 27/feb/2014, alle ore 13:01, Sander Klein <[email protected]> ha 
scritto:

> Hi,
> 
> I can confirm that using grsec kernel with haproxy can sometimes be a bit 
> tricky.
> 
> For instance, 3.2.54 with grsec crashes with me after ~8 hours while 3.2.55 
> and 3.2.52 with grsec do not. Kernels with grsec just need more testing 
> because their stability can vary.
> 
> Greets,
> 
> Sander
> 
> 
> On 27.02.2014 11:29, Cedric Maion wrote:
>> I agree that it does indeed look like a kernel issue (in the intel eth
>> driver?), however 1.5 is doing something new that triggers this.
>> Any idea of a significant 1.4 -> 1.5 change that can affect what is
>> happening in the kernel?
>> This kernel is indeed not the stock Ubuntu kernel, but the default one
>> provided by the hosting company (OVH in that case)... I would really
>> like not having to recompile the kernel and play too much with the
>> production environment (sadly this issue never popped in my dev & lab
>> environments).
>> So any haproxy related idea would be very welcome...!
>> On Thu, Feb 27, 2014 at 11:06:38AM +0100, Lukas Tribus wrote:
>>> Hi,
>>> > Just upgraded a production node from 1.4.18 to 1.5-dev22.
>>> > Ran fine for a couple of minutes then crashed with the following kernel
>>> > messages:
>>> >
>>> > WARNING: at mm/page_alloc.c:2107 __alloc_pages_nodemask+0x1fd/0x790()
>>> > Hardware name: X9SRE/X9SRE-3F/X9SRi/X9SRi-3F
>>> > Pid: 23190, comm: haproxy Not tainted 3.2.13-grsec-xxxx-grs-ipv6-64 #1
>>> > Call Trace:
>>> > [<ffffffff810f1ded>] ? __alloc_pages_nodemask+0x1fd/0x790
>>> > [<ffffffff81089f3b>] warn_slowpath_common+0x7b/0xc0
>>> > [<ffffffff81089f95>] warn_slowpath_null+0x15/0x20
>>> > [<ffffffff810f1ded>] __alloc_pages_nodemask+0x1fd/0x790
>>> Thats definitely a kernel issue.
>>> Are you building your own kernel? That doesn't look like the default
>>> Ubuntu kernel.
>>> I would suggest to upgrade your kernel to 3.2.55 (of course use an
>>> updated grsec patch as well). If that doesn't fix the issue, try
>>> vanilla 3.2.55 (no grsec).
>>> If the issue persists, report it upstream (either to lkml/netdev or
>>> grsec, depending whether the vanilla 3.2.55 has the issue or not).
>>> Regards,
>>> Lukas
> 


Reply via email to