Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp903673imd; Thu, 1 Nov 2018 07:21:41 -0700 (PDT) X-Google-Smtp-Source: AJdET5f7SXltiayyWh1IYkKONQp36rVx3j0bjwtvdmwaU5Q0sWYzZg3iacJ922ZJLRK2GKikA1ya X-Received: by 2002:a17:902:da8:: with SMTP id 37-v6mr7947333plv.12.1541082101651; Thu, 01 Nov 2018 07:21:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541082101; cv=none; d=google.com; s=arc-20160816; b=tk+wmudJzNkSqBTYxCBMKy/6QSNtcG+DqQpd4vei9Zt9b0RS1dQc2WQLj+9x8inUai 6/RzFHPSoISOCBvTPCO5ZtoIROG01ZntyWbanQCBbVuerIX7/+SgbTYTt+U/favXIqAY sqy1QOR8cAr8YawPNHZqWerYcD/dpr5VT1IwY9uZ2no+ImDvea3zAMOQ8D403CMsz6oZ boVuq7RwvF0NkjurNL5HSlDDu+ripe5yUGqm8IbU4jPq18Y4dmtQbeXcUVlkb2NCor3B tOQAs5vodw01u49t9HbLwsRrcnged5Z2v+SIG6iJN88onGfI8pQbW9xMBZdJqOThz0Y/ QyZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :references:subject:cc:to:mime-version:user-agent:from:date :message-id; bh=UNPdV3L9xnwqgBkQjQjuhdRnlICG5325BCQiZG19XyE=; b=dmQGReDHUAkgtITv7E2uAbcyn4bKmfVYvi4xDfGskBXlYRbbqNjg7MgmpVJnOxfO93 4JvAhmTEMGC+8UWFS2K4ZYAJQkTQhYouT98yTKEfT32VT8Rj90/2ghlexbOHRskamzUk /MYjxvoMuOjNTixSofCVqB/E9nR7/D0lSeQb+va1friBFC2zwKhm2qUOAqwJx36151fD E9JdovGEP5C1h8lO7y4+WB6JzbO0Kz2FlNRPonqpxyal/R80lN5TBiqBvLNcy2gI0XSO ILJLUVWVQ6YyQbUAPklBktMSJL310neOmjy2LKgRUbjmxJFFOXGQHqahsq1LN+6bvz+i Y/+w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c5-v6si29003113pgq.226.2018.11.01.07.21.25; Thu, 01 Nov 2018 07:21:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728675AbeKAXVg (ORCPT + 99 others); Thu, 1 Nov 2018 19:21:36 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:51371 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728198AbeKAXVg (ORCPT ); Thu, 1 Nov 2018 19:21:36 -0400 Received: from DGGEMS413-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id AA8F11A011683; Thu, 1 Nov 2018 22:18:17 +0800 (CST) Received: from [127.0.0.1] (10.177.29.68) by DGGEMS413-HUB.china.huawei.com (10.3.19.213) with Microsoft SMTP Server id 14.3.408.0; Thu, 1 Nov 2018 22:18:17 +0800 Message-ID: <5BDB0B28.6010106@huawei.com> Date: Thu, 1 Nov 2018 22:18:16 +0800 From: zhong jiang User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:12.0) Gecko/20120428 Thunderbird/12.0.1 MIME-Version: 1.0 To: Benjamin Coddington CC: , , , , LKML , Subject: Re: [Qestion] Lots of memory leaks when mounting and unmounting nfs client to server continuously. References: <5BD85266.6000301@huawei.com> <1DEE371C-69EB-4D92-8F78-535AA5203007@redhat.com> <5BD86392.7070200@huawei.com> <8975EA60-7C42-426A-ADA3-DEE0E2CEE964@redhat.com> In-Reply-To: <8975EA60-7C42-426A-ADA3-DEE0E2CEE964@redhat.com> Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.29.68] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/10/30 22:03, Benjamin Coddington wrote: > On 30 Oct 2018, at 9:58, zhong jiang wrote: > >> On 2018/10/30 21:06, Benjamin Coddington wrote: >>> Hi zhong jiang, >>> >>> Try asking in linux-nfs.. but I'll also note that 3.10-stable may be >>> missing a number of fixes to leaks in the NFS GSS code. >>> >>> I can see a more than a few fixes to memory leaks with: git log >>> --grep=leak --oneline net/sunrpc/auth_gss/ >>> >> Thanks for your reply. I has tested some of them in the upsteam as you >> have said. but It fails to solve the issue completely. > What have you tested? It is hard to help without specifics. Hi, Benjamin I have tested all of the the following patches in the latest mainline. git log --grep=leak --oneline net/sunrpc/auth_gss/ Unfortunately, None of the patches works. Could you give some clues? Thanks, zhong jiang