nr_writeback memory leak in kernel 4.15.0-137+

Bug #1926081 reported by Andrew Taylor
18
This bug affects 3 people
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
In Progress
Undecided
Unassigned
Bionic
In Progress
Medium
Tim Gardner

Bug Description

SRU Justification

[Impact]

Ubuntu 18.04.5 4.15.0 LTS kernels at version 4.15.0-137 and above contain a memory leak due to the inclusion of patch from the upstream kernel, but not the fix for that patch which was released later.

Bad patch in bionic:linux 2c17fa778db85644458b52a7df8eacc402cbc1ef mm: memcontrol: fix excessive complexity in memory.stat reporting

This issue manifests itself as an increasing amount of memory used by the writeback queue, which never returns to zero. This can been seen either as the value of `nr_writeback` in /proc/vmstat, or the value of `Writeback` in /proc/meminfo.

Ordinarily these values should be at or around zero, but on our servers we observe the `nr_writeback` value increasing to over 8 million, (32GB of memory), at which point it isn't long before the system IO slows to a crawl (tens of Kb/s). Our servers have 256GB of memory, and are performing many CI related activities - this issue appears to be related to concurrent writing to disk, and can be demonstrated with a simple testcase (see later).

On our heavily used systems this memory leak can result in an unstable server after 2-3 days, requiring a reboot to fix it.

After much investigation the issue appears to be because the patch "mm: memcontrol: fix excessive complexity in memory.stat reporting" was brought in to the 4.15.0-137 Ubuntu kernel (see https://launchpad.net/ubuntu/+source/linux/4.15.0-137.141) as part of " Bionic update: upstream stable patchset 2021-01-25 (LP: #1913214)", however in the mainline kernel there was a follow up patch because this initial patch introduced concurrency issues. The patch "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats" is required, and should be brought into the Ubuntu packaged kernel to fix the issues reported.

The required patch is here: https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe and was committed a few weeks after the original (broken) patch: https://github.com/torvalds/linux/commit/a983b5ebee57209c99f68c8327072f25e0e6e3da

I have checked the release notes for Ubuntu versions -137 to -143, and none include this second patch that should fix the issue. (I checked https://people.canonical.com/~kernel/info/kernel-version-map.html for all the kernel versions, and then visited each changelog page in turn, e.g. https://launchpad.net/ubuntu/+source/linux/4.15.0-143.147 looking for "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats").

We do not observe this on the 5.4.0 kernel (supported HWE kernel on 18.05.5), which includes this second patch. That kernel may also include other patches, so we do not know if any other fixes are also required, but the one we have linked above seems to definitely be needed, and seems to match our symptoms.

[Test Plan]

Testcase:

The following is enough to permanently increase the value of `nr_writeback` on our systems (by about 2000 during most executions):

```
date
grep nr_writeback /proc/vmstat
mkdir -p /docker/testfiles/{1..5}

seq -w 1 100000 | xargs -n1 -I% sh -c 'dd if=/dev/urandom of=/docker/testfiles/1/file.% bs=4k count=10 status=none' &
seq -w 1 100000 | xargs -n1 -I% sh -c 'dd if=/dev/urandom of=/docker/testfiles/2/file.% bs=4k count=10 status=none' &
seq -w 1 100000 | xargs -n1 -I% sh -c 'dd if=/dev/urandom of=/docker/testfiles/3/file.% bs=4k count=10 status=none' &
seq -w 1 100000 | xargs -n1 -I% sh -c 'dd if=/dev/urandom of=/docker/testfiles/4/file.% bs=4k count=10 status=none' &
seq -w 1 100000 | xargs -n1 -I% sh -c 'dd if=/dev/urandom of=/docker/testfiles/5/file.% bs=4k count=10 status=none' &

wait $(jobs -p)
grep nr_writeback /proc/vmstat
date
```

Subsequent iterations of the test raise it further, and on a system doing a lot of writing from a lot of different processes, it can rise quickly.

System details:

lsb_release -rd
Description: Ubuntu 18.04.5 LTS
Release: 18.04

Affected kernel: 4.15.0-137 onwards (current latest version tried was 4.15.0-142)

e.g.

apt-cache policy linux-image-4.15.0-141-generic
linux-image-4.15.0-141-generic:
  Installed: 4.15.0-141.145
  Candidate: 4.15.0-141.145
  Version table:
 *** 4.15.0-141.145 500
        500 http://mirrors.service.networklayer.com/ubuntu bionic-updates/main amd64 Packages
        500 http://mirrors.service.networklayer.com/ubuntu bionic-security/main amd64 Packages
        100 /var/lib/dpkg/status

According to https://wiki.ubuntu.com/KernelTeam/KernelTeamBugPolicies I should include additional information from the server, but at this stage we have upgraded all our affected systems to 5.4.0, and therefore the kernel versions do not match those with this issue.

We likely have other servers used in other services that are not as heavily loaded that have not been as affected by this issue - and therefore and I may be able to get the equivalent diagnostics from there after confirming that they demonstrate the same issue with my testcase

Workaround:

After several weeks narrowing this down, our only option was to upgrade our servers to the 5.4 kernel, which is included as the HWE kernel in 18.04.5:

apt update && apt install --install-recommends -y linux-generic-hwe-18.04

We have now upgraded most of our heavily used systems where this is a major issue to the 5.4.0 kernel, which seemed to be our only option. We have a lot of other colleagues where this is not a possibility for them, and it seems to be affecting them to varying degrees depending on the nature of their workloads.
---
ProblemType: Bug
AlsaDevices:
 total 0
 crw-rw---- 1 root audio 116, 1 Apr 27 04:12 seq
 crw-rw---- 1 root audio 116, 33 Apr 27 04:12 timer
AplayDevices: Error: [Errno 2] No such file or directory: 'aplay': 'aplay'
ApportVersion: 2.20.9-0ubuntu7.23
Architecture: amd64
ArecordDevices: Error: [Errno 2] No such file or directory: 'arecord': 'arecord'
AudioDevicesInUse: Error: command ['fuser', '-v', '/dev/snd/seq', '/dev/snd/timer'] failed with exit code 1:
DistroRelease: Ubuntu 18.04
HibernationDevice: RESUME=UUID=e38970cc-bdc9-406f-9f41-e8b02cfa48d7
IwConfig: Error: [Errno 2] No such file or directory: 'iwconfig': 'iwconfig'
MachineType: Supermicro PIO-848B-TRF4T-ST031
Package: linux (not installed)
PciMultimedia:

ProcFB: 0 astdrmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-4.15.0-141-generic root=UUID=102d359f-6a99-403b-ac57-ff2a5fc1246a ro
ProcVersionSignature: Ubuntu 4.15.0-141.145-generic 4.15.18
RelatedPackageVersions:
 linux-restricted-modules-4.15.0-141-generic N/A
 linux-backports-modules-4.15.0-141-generic N/A
 linux-firmware 1.173.20
RfKill: Error: [Errno 2] No such file or directory: 'rfkill': 'rfkill'
Tags: bionic
Uname: Linux 4.15.0-141-generic x86_64
UnreportableReason: This report is about a package that is not installed.
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups:

WifiSyslog:

_MarkForUpload: False
dmi.bios.date: 10/18/2016
dmi.bios.vendor: American Megatrends Inc.
dmi.bios.version: 2.1
dmi.board.asset.tag: IBM SoftLayer
dmi.board.name: X10QBi
dmi.board.vendor: Supermicro
dmi.board.version: 1.01A
dmi.chassis.asset.tag: IBM SoftLayer
dmi.chassis.type: 1
dmi.chassis.vendor: Supermicro
dmi.chassis.version: To Be Filled By O.E.M.
dmi.modalias: dmi:bvnAmericanMegatrendsInc.:bvr2.1:bd10/18/2016:svnSupermicro:pnPIO-848B-TRF4T-ST031:pvr123456789:rvnSupermicro:rnX10QBi:rvr1.01A:cvnSupermicro:ct1:cvrToBeFilledByO.E.M.:
dmi.product.family: SMC X10
dmi.product.name: PIO-848B-TRF4T-ST031
dmi.product.version: 123456789
dmi.sys.vendor: Supermicro

[Where problems could occur]

Memory leakage could continue. The new spinlocks could cause some performance degradation.

[Other Info]

These patches have been accepted to v4.14.y

Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 1926081

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
tags: added: bionic
Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

I did not initially run the `apport-collect` command as the servers on which I observed this bug have been upgraded to use the 5.4.0 kernel to mitigate the issue (as mentioned in the initial report), therefore the kernel related information may be misleading.

I will endeavour to find a server that is exhibiting this issue that remains on an impacted kernel, however I cannot do so today, and given that I have identified a required upstream patch I believe some progress can be made with this bug without this information.

If an `apport-collect` command on a server that has been upgraded to the newer kernel is still useful, please let me know and I can see if I can generate the information there.
I will attempt to find a server that has not been upgraded, replicate the issue, and then will upload the required logs from that server.

Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Revision history for this message
Guilherme G. Piccoli (gpiccoli) wrote :

Hi Andrew, thanks a lot for the very thorough bug report! This far better than apport logs, you basically explained everything that is going on plus what is need to fix it, much appreciated!

Based on upstream tree, I see the following 2 commits that carry Fixes tag to the offender you pointed:

e27be240df53 ("mm: memcg: make sure memory.events is uptodate when waking pollers")
c3cc39118c36 ("mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats")

Did you manage to test with both commits? They don't appear to be present in linux-stable, which is unfortunate, especially since the offender *is* present in v4.14.y.
I'll try to cook a kernel with both fixes and submit them to the ML.

Cheers,

Guilherme

Changed in linux (Ubuntu):
status: Confirmed → In Progress
Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : CRDA.txt

apport information

tags: added: apport-collected
description: updated
Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : CurrentDmesg.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : Lspci.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : Lsusb.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : ProcCpuinfoMinimal.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : ProcEnviron.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : ProcInterrupts.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : ProcModules.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote : UdevDb.txt

apport information

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Guilherme, thank you for your kind words :)

I have been trying to reproduce this bug on several other systems that I have access to in our cloud account, but I have been unable to reproduce it on a VM (either with SAN or local SSD storage). The main set of servers where this has been seen by us are bare-metal servers with a RAID card backed by SSDs - it's possible that a combination of the resources available on the machine (CPU, RAM, disk IO) cause this bug to be more reproducible with my basic testcase.

I have taken a server out of production and rebooted it into the 4.15 kernel (4.15.0-141-generic) where the issue is able to be seen.

I confirmed my testcase still reproduces the issue here, and it does - nr_writeback is currently stuck at 2641 after one iteration.

I have supplied the apport collected information from that server, which is now attached to this issue.

This is my first bug report on Launchpad, so I am as yet unfamiliar with the process of testing the potential patches I need. Are you suggesting that I follow the process to rebuild the kernel (https://wiki.ubuntu.com/Kernel/BuildYourOwnKernel) including the patches you have mentioned?

Assuming that is the correct course of action I'll attempt to follow the instructions and do that, and report back.

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

So, good news.

I pulled in the ubuntu kernel sources and applied the main patch I had previously identified (https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe). Looking at the other patch (https://github.com/torvalds/linux/commit/e27be240df53), that seems to be related to the accuracy of returned statistics which is not something that my testcase is going to show up.

I built a version of the 4.15.0-142 kernel with patch, and booted back into it, and with two iterations of my testcase my `nr_writeback` value has ended up on zero - which is excellent news. From previous runs it has never failed to leak, so this looks good to me. I will run it some more, but it is safe to say I am pretty happy at this point.

To that end, I believe that https://github.com/torvalds/linux/commit/c3cc39118c3610eb6ab4711bc624af7fc48a35fe "mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats" does indeed fix this issue and the symptoms I have reported above.

Revision history for this message
Tim Gardner (timg-tpi) wrote :
Revision history for this message
Guilherme G. Piccoli (gpiccoli) wrote :

That's awesome Andrew, thanks for being so proactive in the issue. For your first LP bug report, you're doing an amazing job!

Tim posted above a kernel with both fixes, if you can try it, that'd be good. And I want to apologize, I said a wrong information above - the fixes ARE in linux-stable upstream, I just missed them in a first look. My colleague Krzysztof pointed me that they reached stable in v4.14.229 - so eventually they'd reach Ubuntu kernels. But your LP hopefully speed-up things.
Cheers!

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Thank you both,

I'll give that kernel a go now.

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Good news on the custom -144 kernel you provided:

root@jenkins-lon02-02-general-swarm-node-03:~# uname -r
4.15.0-144-generic

root@jenkins-lon02-02-general-swarm-node-03:~# dpkg -l | grep 144
ii linux-image-unsigned-4.15.0-144-generic 4.15.0-144.148~LP1926081.1 amd64 Linux kernel image for version 4.15.0 on 64 bit x86 SMP
ii linux-modules-4.15.0-144-generic 4.15.0-144.148~LP1926081.1 amd64 Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP

root@jenkins-lon02-02-general-swarm-node-03:~# uptime
 08:53:37 up 48 min, 1 user, load average: 1.22, 3.54, 3.05

root@jenkins-lon02-02-general-swarm-node-03:~# grep "writeback" /proc/vmstat
nr_writeback 0
nr_writeback_temp 0

I've run through my testcase 3 times on this new kernel and I've not seen any permanent increase in the `nr_writeback` value, it always returns to zero, which is great.

So from my end, this looks really good - is there anything else you'd like me to do or test, or is this good enough to pull them in for the -144 update?

Revision history for this message
Tim Gardner (timg-tpi) wrote :

Andrew - thanks for the testing feedback. We'll get these patches included in the next SRU cycle.

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Awesome, thank you!

Tim Gardner (timg-tpi)
description: updated
Revision history for this message
Tim Gardner (timg-tpi) wrote :
Tim Gardner (timg-tpi)
Changed in linux (Ubuntu Bionic):
status: New → In Progress
importance: Undecided → Medium
Revision history for this message
Tim Gardner (timg-tpi) wrote :

Andrew - It was suggested that there are a couple more patches relevant to this issue:

mm: fix oom_kill event handling
mem_cgroup: make sure moving_account, move_lock_task and stat_cpu in the same cacheline
mm: memcg: make sure memory.events is uptodate when waking pollers
mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats

Please test the kernel at https://kernel.ubuntu.com/~rtg/LP%231926081/4.15.0-144.148~LP1926081.2/amd64/ to make sure it still solves your issue.

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Tim,

I'll cordon off the machine we've been using again and run some tests with this new kernel, hopefully I'll be able to do it today.

Revision history for this message
Andrew Taylor (andrewtaylor2) wrote :

Installed and booted into the newly supplied kernel:

root@jenkins-lon02-02-general-swarm-node-03:~# dpkg -l | grep linux | grep 144
ii linux-image-unsigned-4.15.0-144-generic 4.15.0-144.148~LP1926081.2 amd64 Linux kernel image for version 4.15.0 on 64 bit x86 SMP
ii linux-modules-4.15.0-144-generic 4.15.0-144.148~LP1926081.2 amd64 Linux kernel extra modules for version 4.15.0 on 64 bit x86 SMP

root@jenkins-lon02-02-general-swarm-node-03:~# uname -r
4.15.0-144-generic

root@jenkins-lon02-02-general-swarm-node-03:~# uptime
 08:06:22 up 19 min, 1 user, load average: 0.74, 0.31, 0.21

root@jenkins-lon02-02-general-swarm-node-03:~# ls -l /boot/
total 201933
-rw-r--r-- 1 root root 1537161 Jul 17 2018 abi-4.15.0-29-generic
-rw-r--r-- 1 root root 217414 Mar 24 12:47 config-4.15.0-141-generic
-rw-r--r-- 1 root root 217426 Apr 28 09:46 config-4.15.0-144-generic
-rw-r--r-- 1 root root 216807 Jul 17 2018 config-4.15.0-29-generic
-rw-r--r-- 1 root root 237757 Apr 12 17:02 config-5.4.0-72-generic
drwxr-xr-x 5 root root 1024 Apr 29 04:06 grub
-rw-r--r-- 1 root root 43066106 Apr 15 09:40 initrd.img-4.15.0-141-generic
-rw-r--r-- 1 root root 24589989 Apr 29 04:06 initrd.img-4.15.0-144-generic
-rw-r--r-- 1 root root 39975786 Apr 15 08:14 initrd.img-4.15.0-29-generic
-rw-r--r-- 1 root root 44490420 Apr 27 04:50 initrd.img-5.4.0-72-generic
drwx------ 2 root root 12288 Apr 15 07:55 lost+found
-rw-r--r-- 1 root root 0 Jul 17 2018 retpoline-4.15.0-29-generic
-rw------- 1 root root 4081420 Mar 24 12:47 System.map-4.15.0-141-generic
-rw------- 1 root root 4081469 Apr 28 09:46 System.map-4.15.0-144-generic
-rw------- 1 root root 4040379 Jul 17 2018 System.map-4.15.0-29-generic
-rw------- 1 root root 4585968 Apr 12 17:02 System.map-5.4.0-72-generic
-rw------- 1 root root 8445600 Mar 24 11:00 vmlinuz-4.15.0-141-generic
-rw------- 1 root root 8447776 Apr 28 09:46 vmlinuz-4.15.0-144-generic
-rw------- 1 root root 8257272 Jul 17 2018 vmlinuz-4.15.0-29-generic
-rw------- 1 root root 9445632 Apr 12 17:15 vmlinuz-5.4.0-72-generic

I've run my test through 5 times, and there has been no observed leak in the writeback queue/memory used, so everything still looks good from my side.

Revision history for this message
Tim Gardner (timg-tpi) wrote :

Andrew - thanks for the testing and results. I'll get these patches submitted for review.

Revision history for this message
Tim Gardner (timg-tpi) wrote :
Changed in linux (Ubuntu Bionic):
assignee: nobody → Tim Gardner (timg-tpi)
Revision history for this message
Stefan Bader (smb) wrote :

All 4 patches were already applied via "Bionic update: upstream stable patchset 2021-04-30" (bug #1926808):

e1e50ec65274 mm: memcontrol: fix NR_WRITEBACK leak in memcg and system stats
73b14d6718b0 mm: memcg: make sure memory.events is uptodate when waking pollers
03c3e163ebe9 mem_cgroup: make sure moving_account, move_lock_task and stat_cpu in the same cacheline
09939b6b2c01 mm: fix oom_kill event handling

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.