Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754792Ab0LAVjE (ORCPT ); Wed, 1 Dec 2010 16:39:04 -0500 Received: from smtp1.linux-foundation.org ([140.211.169.13]:39051 "EHLO smtp1.linux-foundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751335Ab0LAVjB (ORCPT ); Wed, 1 Dec 2010 16:39:01 -0500 Date: Wed, 1 Dec 2010 13:38:31 -0800 From: Andrew Morton To: Hugh Dickins Cc: Trond Myklebust , Linus Torvalds , Nick Piggin , Nick Bowler , Linux Kernel Mailing List , linux-nfs@vger.kernel.org, Rik van Riel , Christoph Hellwig , Al Viro Subject: Re: [PATCH v2 3/3] NFS: Fix a memory leak in nfs_readdir Message-Id: <20101201133831.ea6ba10a.akpm@linux-foundation.org> In-Reply-To: References: <1291217804-11257-1-git-send-email-Trond.Myklebust@netapp.com> <1291217804-11257-2-git-send-email-Trond.Myklebust@netapp.com> <20101201150428.GA2879@elliptictech.com> <1291217804-11257-3-git-send-email-Trond.Myklebust@netapp.com> <1291217804-11257-4-git-send-email-Trond.Myklebust@netapp.com> <1291229669.6609.24.camel@heimdal.trondhjem.org> <1291234251.6609.39.camel@heimdal.trondhjem.org> <20101201123341.d12ef362.akpm@linux-foundation.org> X-Mailer: Sylpheed 3.0.2 (GTK+ 2.20.1; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2641 Lines: 55 On Wed, 1 Dec 2010 13:15:07 -0800 (PST) Hugh Dickins wrote: > On Wed, 1 Dec 2010, Hugh Dickins wrote: > > On Wed, 1 Dec 2010, Andrew Morton wrote: > > > On Wed, 01 Dec 2010 15:10:50 -0500 > > > Trond Myklebust wrote: > > > > > > > --- a/include/linux/fs.h > > > > +++ b/include/linux/fs.h > > > > @@ -602,6 +602,7 @@ struct address_space_operations { > > > > sector_t (*bmap)(struct address_space *, sector_t); > > > > void (*invalidatepage) (struct page *, unsigned long); > > > > int (*releasepage) (struct page *, gfp_t); > > > > + void (*freepage)(struct page *); > > > > ssize_t (*direct_IO)(int, struct kiocb *, const struct iovec *iov, > > > > loff_t offset, unsigned long nr_segs); > > > > int (*get_xip_mem)(struct address_space *, pgoff_t, int, > > > > > > It would be good to think about and then clearly spell out exactly what > > > state the page is in here. It is locked, and I assume clean and not > > > under writeback. What about its refcount, freezedness status and > > > eligibility for lookups? > > > > > > And as Hugh pointed out, some callees might needs the address_space* > > > although we can perhaps defer that until such a callee turns up. > > > If/when that happens we might have a problem though: if this locked > > > page is no longer attached to the address_space then what now pins the > > > address_space, protecting it from inode reclaim? > > > > That's an excellent point and trumps mine: it would be actively wrong > > to provide the struct address_space *mapping arg I was asking for. > > (Bet someone then tries stashing it away via page->private though.) > > Hmm, thinking further along the same lines: can we even guarantee that > the filesystem module is still loaded at that point? i.e. might > mapping->freepage now be pointing off into the garbage heap? I don't see anything on the VFS side which would prevent a module unload. Or, more realistically, a concurrent unmount, freeing of the superblock and everything associated with it. All we have here is a page*. Probably on most call paths we'll be OK - if a process is in the middle of a file truncate, holdin a file* ref which holds an inode ref then nobody will be unmounting that fs and hence nobody will be unloading that module. However on the random_code->alloc_page->vmscan->releasepage path, none of that applies. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/