Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp4759284imd; Tue, 30 Oct 2018 07:04:24 -0700 (PDT) X-Google-Smtp-Source: AJdET5eXFbX8jswTAqVJ0wg9Jz77cVPtHLP6kK3+g4XFUJu4kVAzxTfn2R2fDb2CMdLN1SuD0UXG X-Received: by 2002:a63:ef53:: with SMTP id c19-v6mr18218524pgk.386.1540908264418; Tue, 30 Oct 2018 07:04:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540908264; cv=none; d=google.com; s=arc-20160816; b=rIOGAOPXQCl/B8UKT3fhEAWiftYI1R3zXkq3OWS76ShydDssT6V9VbMfDylDZV2NNP CJUncbPCyOv2Khvi0nr9KvvbriYQJ4sNOPigiAl5cUSGKbhFFa7JIifLM1d9CM2RdY84 LCKQ/h2cbP+lkb9HuXXrYT8Ktid12w+kL73FOjN1/L+1zALesogB4r5jFET276BV2KBG Rt/Hn578O20gjP56NyKNFRGoamfERp0p02k/1QAotNsLw89kh6VzS0Ybo9s+exq2AidT 3Dl16pUJrO2+fryRktMJzRa1WU08EC83DN/sxAQBi8llzAhkDG12H5DUhmq4N0+DdX4S a80g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from; bh=0oAtLHbPQQWyywoFTstUg4lySj55JMcuvpIpJ4ZHXvg=; b=rEWcXmxYVfoNoHxr43ceedu2IUXo2YKOj7ZJUhb+s0GnsZIjXsaPqgA8vseAtG5FKx TWpeyljzBfBxIfM71hLvEJYSF2Hf4j0w6ptznLeGkeeO7I/+jjdEBr9L5wjJVLbWBg+B XklsJfGFXkhoIuTFsTYV6Z4wdf6+2guR6GNWC1gyBQP9G60fUqfBARFY9H7+V5T8HNdd 2QMrz8i7jR93UucyEzx6SeYM5g1xHb71Fz9xHfgaylai2qKJxs5Lr1DxkQIr47010vj8 Jf1v+yt47kTBF8JUiL7M/Hs6RBGQ+SyskJ2bf6zu5wfMN7+dhDoVsrUlMksPKY+QoVdP 1F6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s144-v6si12686212pfc.149.2018.10.30.07.04.08; Tue, 30 Oct 2018 07:04:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728190AbeJ3W5G (ORCPT + 99 others); Tue, 30 Oct 2018 18:57:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:35084 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728092AbeJ3W5F (ORCPT ); Tue, 30 Oct 2018 18:57:05 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 76FCE30023A2; Tue, 30 Oct 2018 14:03:29 +0000 (UTC) Received: from [172.16.176.1] (ovpn-121-196.rdu2.redhat.com [10.10.121.196]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 774445ED29; Tue, 30 Oct 2018 14:03:28 +0000 (UTC) From: "Benjamin Coddington" To: "zhong jiang" Cc: herbert@gondor.apana.org.au, trond.myklebust@hammerspace.com, bfields@redhat.com, linux-crypto@vger.kernel.org, LKML , linux-nfs@vger.kernel.org Subject: Re: [Qestion] Lots of memory leaks when mounting and unmounting nfs client to server continuously. Date: Tue, 30 Oct 2018 10:03:29 -0400 Message-ID: <8975EA60-7C42-426A-ADA3-DEE0E2CEE964@redhat.com> In-Reply-To: <5BD86392.7070200@huawei.com> References: <5BD85266.6000301@huawei.com> <1DEE371C-69EB-4D92-8F78-535AA5203007@redhat.com> <5BD86392.7070200@huawei.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.47]); Tue, 30 Oct 2018 14:03:29 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30 Oct 2018, at 9:58, zhong jiang wrote: > On 2018/10/30 21:06, Benjamin Coddington wrote: >> Hi zhong jiang, >> >> Try asking in linux-nfs.. but I'll also note that 3.10-stable may be >> missing a number of fixes to leaks in the NFS GSS code. >> >> I can see a more than a few fixes to memory leaks with: git log >> --grep=leak --oneline net/sunrpc/auth_gss/ >> > Thanks for your reply. I has tested some of them in the upsteam as you > have said. but It fails to solve the issue completely. What have you tested? It is hard to help without specifics.