Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp62087img; Sun, 17 Mar 2019 20:27:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqyO+0bI+eKo5QB7NZnIl8hEiZDw+BKZpEQlcv6RMX/b7Hz5OBKghFcxiXpH+AS8c5/Hpd59 X-Received: by 2002:a62:46cc:: with SMTP id o73mr17390179pfi.182.1552879652974; Sun, 17 Mar 2019 20:27:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552879652; cv=none; d=google.com; s=arc-20160816; b=oOeqpCB0knCbhuf9XhLX1yGlFLEwmsQJgrRTjQfrw/r+qXzZTtSOpO1HpXCMDVeut9 3i2BkhgtHw81SoNU4xw+jIMwWV6Vrt5WF2DHHEosLVcqpcwWRn5NtBS6Bq1wtlArb+cr ISNJeULPPm3kaDUTcXkJt5DeaFKYuG9akxXQVWTQeD8x5fVlOLYr2+2uNNLwkwjG7pB2 L/ZLCNHzXDdINUKT0+gu/qmyGXKteaqIaSa8i/ZvDmT9FG4ZrVwp7VR1f+O4U6lAcOGK ld7fhsUFJb2XwdnqblFOfRuVFsR8q2llfHhw+v9OArCUtyz1pdzdh1+StK60f5/jSPaM 7e/A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=pWreJHc2NYzyVo4TqtOSjg0yztt5GvwwXMC5xzBD3uo=; b=ma+G/XWHGncxCGeguPeWtd6XANTOKSPFKkv1qUrjedgFFYvSeUS728RNp1vN2QbHRT 2eR0o9D/O4RZfz4HBVrmGmNPrq/4Mf5MT2yYD/psyLfij2v576vRwL8arfIeH1QbzpfI GlOSE+Jw2E289r/s7qkRdnZ6QEX6EY0dGirDSJGfvZMqF417OgW8JMlLoa8k7bo5gGV8 /wmPA0SwbiX7XWyWtXKCVuk3GblHrvmhiTwKumqY4u+/iQjVpe74qly9N0e4RpuKkDGu JFhr/rlY3nq3sOsBr7SW+Mq/kBz2uoEa/Dyo18f/UQKuvF9bmMa5VvNSxCx0aLcI6Qq5 276w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eWON7Ab8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j2si1382739pgm.40.2019.03.17.20.27.17; Sun, 17 Mar 2019 20:27:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=eWON7Ab8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727823AbfCRD02 (ORCPT + 99 others); Sun, 17 Mar 2019 23:26:28 -0400 Received: from mail-qk1-f193.google.com ([209.85.222.193]:35735 "EHLO mail-qk1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727699AbfCRD02 (ORCPT ); Sun, 17 Mar 2019 23:26:28 -0400 Received: by mail-qk1-f193.google.com with SMTP id z13so8840603qki.2; Sun, 17 Mar 2019 20:26:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pWreJHc2NYzyVo4TqtOSjg0yztt5GvwwXMC5xzBD3uo=; b=eWON7Ab8XxYsxTpdI50uWhQ7Krrk/YTCbD/HCDux6fBwbTgVzHThD3+4UQLJJjJArW NkqZ2t+Q3185P5MSkJBZbUZ+5qQyv/WamOjDBxYAywHpruR6+6daAb1E+GKbTysN5iap IsEk8FpZSbb3PjezkCMJPYnC3mUqxY4agw31lrNZFTnJ9tW/L6JAUdL0c07+trMusqND rtWGPgN4bNRxBJwbf3BkbTGSfYKyVSWY80nTjA1UsxGYfLD9oynZq3IzWEtdwLfM6B9F r2JhiqRLcofbZw90Bixt+sgcSyOH3/UFQnXd/DBnGMKW4Gxc5fK3iAKVLskCgQmXhqBt eR1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pWreJHc2NYzyVo4TqtOSjg0yztt5GvwwXMC5xzBD3uo=; b=HAt7XEktDAycqDW43xW+d0TN9QOjLMDLb+wWBSRk7vLNs/ZQH9D5iAqa7gWNQssVCX wTEgyDdIPxlFHV6dt9R7GlqSHhLv1e0noRQPGf7Fitgsnq3rI2rShV2IVU4RQUJfi5rf E6odqTi3+QOcRiBIO2iC5Afe/BoGPbm+JoFooAZMd6lwdPt9DeU18b0/jNbhusP9AtWN Edx7JGZMPu0SEkpQfG9MrQ2mLLP0B3iISbNFQHbitt7y4wnoRftY3jWBckYfx7tzXHFP JUBq5LvVpKtPjDsPqyfS1habs9K6pm67llEipNze6rRMLOrYNIXDWR2fPYHD8oNvGZKT CH5A== X-Gm-Message-State: APjAAAWEOZiCPK1L2ne2r/dIQFqCgPoucRlcxdthpTJrNuHGlUchHxSX dcwzRZR47GaTcpwawpna9tqCdYAqIstkKNpsE5+Tzzcp2/Vk+g== X-Received: by 2002:a05:620a:1348:: with SMTP id c8mr11479013qkl.246.1552879586774; Sun, 17 Mar 2019 20:26:26 -0700 (PDT) MIME-Version: 1.0 References: <20190315111107.15154-1-lhenriques@suse.com> In-Reply-To: <20190315111107.15154-1-lhenriques@suse.com> From: "Yan, Zheng" Date: Mon, 18 Mar 2019 11:26:15 +0800 Message-ID: Subject: Re: [PATCH] ceph: Fix a memory leak in ci->i_head_snapc To: Luis Henriques Cc: "Yan, Zheng" , Sage Weil , Ilya Dryomov , ceph-devel , Linux Kernel Mailing List , stable@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 15, 2019 at 7:13 PM Luis Henriques wrote: > > I'm occasionally seeing a kmemleak warning in xfstest generic/013: > > unreferenced object 0xffff8881fccca940 (size 32): > comm "kworker/0:1", pid 12, jiffies 4295005883 (age 130.648s) > hex dump (first 32 bytes): > 01 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ > backtrace: > [<00000000d741a1ea>] build_snap_context+0x5b/0x2a0 > [<0000000021a00533>] rebuild_snap_realms+0x27/0x90 > [<00000000ac538600>] rebuild_snap_realms+0x42/0x90 > [<000000000e955fac>] ceph_update_snap_trace+0x2ee/0x610 > [<00000000a9550416>] ceph_handle_snap+0x317/0x5f3 > [<00000000fc287b83>] dispatch+0x362/0x176c > [<00000000a312c741>] ceph_con_workfn+0x9ce/0x2cf0 > [<000000004168e3a9>] process_one_work+0x1d4/0x400 > [<000000002188e9e7>] worker_thread+0x2d/0x3c0 > [<00000000b593e4b3>] kthread+0x112/0x130 > [<00000000a8587dca>] ret_from_fork+0x35/0x40 > [<00000000ba1c9c1d>] 0xffffffffffffffff > > It looks like it is possible that we miss a flush_ack from the MDS when, > for example, umounting the filesystem. In that case, we can simply drop > the reference to the ceph_snap_context obtained in ceph_queue_cap_snap(). > > Link: https://tracker.ceph.com/issues/38224 > Cc: stable@vger.kernel.org > Signed-off-by: Luis Henriques > --- > fs/ceph/caps.c | 7 +++++++ > 1 file changed, 7 insertions(+) > > diff --git a/fs/ceph/caps.c b/fs/ceph/caps.c > index 36a8dc699448..208f4dc6f574 100644 > --- a/fs/ceph/caps.c > +++ b/fs/ceph/caps.c > @@ -1054,6 +1054,7 @@ int ceph_is_any_caps(struct inode *inode) > static void drop_inode_snap_realm(struct ceph_inode_info *ci) > { > struct ceph_snap_realm *realm = ci->i_snap_realm; > + > spin_lock(&realm->inodes_with_caps_lock); > list_del_init(&ci->i_snap_realm_item); > ci->i_snap_realm_counter++; > @@ -1063,6 +1064,12 @@ static void drop_inode_snap_realm(struct ceph_inode_info *ci) > spin_unlock(&realm->inodes_with_caps_lock); > ceph_put_snap_realm(ceph_sb_to_client(ci->vfs_inode.i_sb)->mdsc, > realm); > + /* > + * ci->i_head_snapc should be NULL, but we may still be waiting for a > + * flush_ack from the MDS. In that case, we still hold a ref for the > + * ceph_snap_context and we need to drop it. > + */ > + ceph_put_snap_context(ci->i_head_snapc); > } > > /* This does not seem right. i_head_snapc is cleared when (ci->i_wrbuffer_ref_head == 0 && ci->i_dirty_caps == 0 && ci->i_flushing_caps == 0) . Nothing do with dropping ci->i_snap_realm. Did you see 'reconnect denied' during the test? If you did, the fix should be in iterate_session_caps()