Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1288316ybi; Fri, 14 Jun 2019 11:54:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqwG+iXQbaNhvrxlctcHrYY86fJIjGsVvYGw7oL83YuqPvWaQ31doWImRemSj8/pMLmrbZf+ X-Received: by 2002:a62:e308:: with SMTP id g8mr17330975pfh.162.1560538457096; Fri, 14 Jun 2019 11:54:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560538457; cv=none; d=google.com; s=arc-20160816; b=KQhjSEZ0+WJkevB6+WQBpAzSgCeLspqVPZwAKiSE60I7grzoZTFSZyjlTcNaDhY9jQ bsi7DOwD1TaJ277S/arHjACb0MfVEXKyEEpMmbpJzSeH3XS3QlhumnK36++DLtpmzLS6 Rn7Ey1RRZAc8X1PsPpaSr5ljME8cvgsi9A+p7zcjqQvx0uhNcfN+ezDQoLozLpXAeKLi iwV+SIqUw94/B8nf6APAkXRMzPs0um1JVZuO00ZvWaFq7+SXa6aal+NnbXR6npZwNJGj RDieGMZQK37PTW+EsWhskcaA3t28OvISdHEzwHRaxoh8R02hQ2hwUiAW+jSOBMxMvLvI zo0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=v4i0nhzzGbing+B4QMUVxm+oBw3DVgnwQJYDd8Wn0LA=; b=NHkUmjTMUgqCy3Y9segV0I6glUdr3/E/DeinclkGJW5byzXrrFPD55Vz4HHvlz7RfI HtnDccUQb0OF10RHBKmQQ5lJS6nYejv/b+RFQkJwhTGEmPTnZg4Cr25tFS49Vi2SAdsi O5lHMc2MtdomwYuq37Qz4Q9rFMDUynUDmrXCnzbJYHXVXbdRRQIbo+owFPnUu70JM5ki oY1s9SAeiGeAi54jMoPzbwWJcgPe777wa12eF8j3hRz5QthhZ5caay4Ek5q7keKr2FZP 3LNTQ4rdAtZigVQmDRTCe4kaeS+SlCMEsM8O5N5EsTWWI1aDztjhyNK3sv4P2Go2dyjQ +xuw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=lgAedjDk; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 33si2841087plv.153.2019.06.14.11.53.51; Fri, 14 Jun 2019 11:54:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=lgAedjDk; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725889AbfFNSwn (ORCPT + 99 others); Fri, 14 Jun 2019 14:52:43 -0400 Received: from wout2-smtp.messagingengine.com ([64.147.123.25]:34591 "EHLO wout2-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725809AbfFNSwm (ORCPT ); Fri, 14 Jun 2019 14:52:42 -0400 Received: from compute3.internal (compute3.nyi.internal [10.202.2.43]) by mailout.west.internal (Postfix) with ESMTP id 92233559; Fri, 14 Jun 2019 14:52:41 -0400 (EDT) Received: from mailfrontend1 ([10.202.2.162]) by compute3.internal (MEProxy); Fri, 14 Jun 2019 14:52:41 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=v4i0nh zzGbing+B4QMUVxm+oBw3DVgnwQJYDd8Wn0LA=; b=lgAedjDkWNbXclk4p60e67 wY40HzMMzJqiVe64nFWY6OifpxFs14ICb+74WIluQkafo08wpmMT5inWdGxBQeJU zzP4X25aI1Uuy6tCQjdcpEpmZUpuBdDYdtTUc6pcwBhLV+UqDULIebxTs8JRz4Qz 1R4CWcooDwNaF5ZKovGeuEI/WKZKxNcpJrMQMjOlJtICADT5slvFp1+P1q0dpyRu ik8TPPgUNBx0azbHZPTAygLi/ZRSDFQFHUvNbdDr3xi6vs00dgk4O1vgyfiMI4tP 1949wiAN6q8/knGJ2wyfxxnPiMtu4XGhBwTJ2uf60SiTIQv/6ttosgG/8hpy3mcw == X-ME-Sender: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduuddrudeiuddgudefvdcutefuodetggdotefrod ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfgh necuuegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmd enucfjughrpeffhffvuffkfhggtggujggfsehttdertddtredvnecuhfhrohhmpefkugho ucfutghhihhmmhgvlhcuoehiughoshgthhesihguohhstghhrdhorhhgqeenucffohhmrg hinhepfhhrvggvuggvshhkthhophdrohhrghdpkhgvrhhnvghlrdhorhhgnecukfhppeej ledrudejkedrgeefrddvudeknecurfgrrhgrmhepmhgrihhlfhhrohhmpehiughoshgthh esihguohhstghhrdhorhhgnecuvehluhhsthgvrhfuihiivgeptd X-ME-Proxy: Received: from localhost (bzq-79-178-43-218.red.bezeqint.net [79.178.43.218]) by mail.messagingengine.com (Postfix) with ESMTPA id 0D8F78005A; Fri, 14 Jun 2019 14:52:39 -0400 (EDT) Date: Fri, 14 Jun 2019 21:52:37 +0300 From: Ido Schimmel To: Trond Myklebust Cc: Anna Schumaker , linux-nfs@vger.kernel.org Subject: Re: [PATCH 1/9] SUNRPC: Cache cred of process creating the rpc_client Message-ID: <20190614185237.GA550@splinter> References: <20190424214650.4658-1-trond.myklebust@hammerspace.com> <20190424214650.4658-2-trond.myklebust@hammerspace.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190424214650.4658-2-trond.myklebust@hammerspace.com> User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Apr 24, 2019 at 05:46:42PM -0400, Trond Myklebust wrote: > When converting kuids to AUTH_UNIX creds, etc we will want to use the > same user namespace as the process that created the rpc client. > > Signed-off-by: Trond Myklebust Hi, Since upgrading to v5.2-rc1 I started encountering these memory leaks [1]. Bisection using this reproducer [2] points to this patch. Attached the full bisection log [3]. Please let me know if more information is required. Thanks [1] unreferenced object 0xffffa35dfaea3000 (size 192): comm "mount", pid 428, jiffies 4294703475 (age 7.578s) hex dump (first 32 bytes): 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b43bed74>] prepare_exec_creds+0x6/0x40 [<00000000422eb980>] __do_execve_file.isra.56+0x124/0x930 [<00000000aa848639>] __x64_sys_execve+0x2f/0x40 [<000000008d5c43e1>] do_syscall_64+0x43/0xf0 [<0000000068b03b0e>] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [<000000001fab781f>] 0xffffffffffffffff [2] #!/bin/bash umount /mnt/share155 mount -t nfs :/images/share /mnt/share155 echo scan > /sys/kernel/debug/kmemleak cat /sys/kernel/debug/kmemleak [3] git bisect start # good: [e93c9c99a629c61837d5a7fc2120cd2b6c70dbdd] Linux 5.1 git bisect good e93c9c99a629c61837d5a7fc2120cd2b6c70dbdd # bad: [a188339ca5a396acc588e5851ed7e19f66b0ebd9] Linux 5.2-rc1 git bisect bad a188339ca5a396acc588e5851ed7e19f66b0ebd9 # good: [2646719a48c21ba0cae82a3f57382a9573fd8400] Merge tag 'kbuild-v5.2' of git://git.kernel.org/pub/scm/linux/kernel/git/masahiroy/linux-kbuild git bisect good 2646719a48c21ba0cae82a3f57382a9573fd8400 # bad: [b970afcfcabd63cd3832e95db096439c177c3592] Merge tag 'powerpc-5.2-1' of ssh://gitolite.kernel.org/pub/scm/linux/kernel/git/powerpc/linux git bisect bad b970afcfcabd63cd3832e95db096439c177c3592 # good: [eb85d03e01c3e9f3b0ba7282b2e3515a635decb2] Merge tag 'drm-misc-next-fixes-2019-05-08' of git://anongit.freedesktop.org/drm/drm-misc into drm-next git bisect good eb85d03e01c3e9f3b0ba7282b2e3515a635decb2 # good: [dce45af5c2e9e85f22578f2f8065f225f5d11764] Merge tag 'for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/rdma/rdma git bisect good dce45af5c2e9e85f22578f2f8065f225f5d11764 # bad: [8e4ff713ce313dcabbb60e6ede1ffc193e67631f] Merge tag 'rtc-5.2' of git://git.kernel.org/pub/scm/linux/kernel/git/abelloni/linux git bisect bad 8e4ff713ce313dcabbb60e6ede1ffc193e67631f # bad: [45182e4e1f8ac04708ca7508c51d9103f07d81ab] Merge branch 'i2c/for-5.2' of git://git.kernel.org/pub/scm/linux/kernel/git/wsa/linux git bisect bad 45182e4e1f8ac04708ca7508c51d9103f07d81ab # bad: [5940d1cf9f42f67e9cc3f7df9eda39f5888d6e9e] SUNRPC: Rebalance a kref in auth_gss.c git bisect bad 5940d1cf9f42f67e9cc3f7df9eda39f5888d6e9e # good: [23146500b32fbee7eaa57c5002fcd64e5d9b32ca] xprtrdma: Clean up rpcrdma_create_rep() and rpcrdma_destroy_rep() git bisect good 23146500b32fbee7eaa57c5002fcd64e5d9b32ca # good: [2cfd11f16f01c0ee8f83bb07027c9d2f43565473] xprtrdma: Remove stale comment git bisect good 2cfd11f16f01c0ee8f83bb07027c9d2f43565473 # bad: [b422df915cef80333d7a1732e6ed81f41db12b79] lockd: Store the lockd client credential in struct nlm_host git bisect bad b422df915cef80333d7a1732e6ed81f41db12b79 # bad: [ac83228a7101e655ba5a7fa61ae10b058ada15db] SUNRPC: Use namespace of listening daemon in the client AUTH_GSS upcall git bisect bad ac83228a7101e655ba5a7fa61ae10b058ada15db # bad: [1a58e8a0e5c1f188a80eb9e505bc77d78a31a4ec] NFS: Store the credential of the mount process in the nfs_server git bisect bad 1a58e8a0e5c1f188a80eb9e505bc77d78a31a4ec # bad: [79caa5fad47c69874f9efc4ac3128cc3f6d36f6e] SUNRPC: Cache cred of process creating the rpc_client git bisect bad 79caa5fad47c69874f9efc4ac3128cc3f6d36f6e # first bad commit: [79caa5fad47c69874f9efc4ac3128cc3f6d36f6e] SUNRPC: Cache cred of process creating the rpc_client