Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3232539ybi; Mon, 29 Jul 2019 03:11:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqwPeoSyCwinGhdcLAhBtKICM7HkTJ08YGxOu4qqTRAUPz4PHwTsVikHZs0dMzNSfLv3Xdnr X-Received: by 2002:a65:614a:: with SMTP id o10mr101466409pgv.407.1564395072275; Mon, 29 Jul 2019 03:11:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564395072; cv=none; d=google.com; s=arc-20160816; b=kNxT7J/XH663bbRQM0plxEHV3t/sjV8s9UkVYmm/6U5b12CsrFrbFTO+BXvdZ9oEM9 JkC7SrEYhZTiNCoFhoICks2DJC6bTm/fu5GKTZ3ESqpLjxkPcgKSU12bNMQYuYEtJyUN ReHgWCHmuP+JygMPUZChE1UBo9FX0Pgs+XIsp67nDr04bO/oZB8IOqK8mt5xhpsDHMpx zGFz1IaA1K4ewmbI1LRAnpGPn1VDcCtJNcxCrLfs2gMAbgyXUb8zNHnoQ39PBs/tL2PP pPKBty1lkWyj3jkHowRMH1u5vllmsAPYKCYhguzT1cXqvM1Jmd4Aq2su9aVt8RoSiAb0 mgEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=KPoVpo5u287/epb59nwJPlx+dlWcoYlnFFT5GI57zmI=; b=u/aGsGDaRUEK4eGTrdWacLgTRUEt/j1JDFUGmp5VH364X6KjWF9A6Lyt2w5TcZYWxP NBpeb5fAupkFKAZ81yrrJhLxb04GrneWGyDVE9mKGAoPY/6mz7w7MonQaxcm4W+Gbude owEolRrKN5HlrXrlsVOVLHaZ5jwgXLhNQ1BSHJN0G9OKCXvImkMaEGiSAopL3X2Lggd/ 1Qy2GUCKCiAm04tceJkXERO7I1ESa5xJLT+B9roBhHlz+8t44CZVVXUyMGS4GbS2w7NU SvQeIaJ2EUcenuCHkG8iIoBYAucz7rRjI8QGLPEJqGxh/FtCDvgANXsfNmnIrVgFzHpw royA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 141si25939514pgh.166.2019.07.29.03.10.47; Mon, 29 Jul 2019 03:11:12 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-ext4-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728152AbfG2KJS (ORCPT + 99 others); Mon, 29 Jul 2019 06:09:18 -0400 Received: from mx2.suse.de ([195.135.220.15]:49272 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726358AbfG2KJS (ORCPT ); Mon, 29 Jul 2019 06:09:18 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 30933AF4E; Mon, 29 Jul 2019 10:09:17 +0000 (UTC) Received: by quack2.suse.cz (Postfix, from userid 1000) id D59F51E4379; Mon, 29 Jul 2019 12:09:14 +0200 (CEST) Date: Mon, 29 Jul 2019 12:09:14 +0200 From: Jan Kara To: Geoffrey Thomas Cc: 'Theodore Ts'o' , Thomas Walker , 'Jan Kara' , "'linux-ext4@vger.kernel.org'" , "'Darrick J. Wong'" Subject: Re: Phantom full ext4 root filesystems on 4.1 through 4.14 kernels Message-ID: <20190729100914.GB17833@quack2.suse.cz> References: <20190123195922.GA16927@twosigma.com> <20190626151754.GA2789@twosigma.com> <20190711092315.GA10473@quack2.suse.cz> <96c4e04f8d5146c49ee9f4478c161dcb@EXMBDFT10.ad.twosigma.com> <20190711171046.GA13966@mit.edu> <20190712191903.GP2772@twosigma.com> <20190712202827.GA16730@mit.edu> <7cc876ae264c495e9868717f33a63a77@EXMBDFT10.ad.twosigma.com> <865a6dad983e4dedb9836075c210a782@EXMBDFT11.ad.twosigma.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <865a6dad983e4dedb9836075c210a782@EXMBDFT11.ad.twosigma.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu 25-07-19 21:22:28, Geoffrey Thomas wrote: > On Friday, July 12, 2019 5:47 PM, Geoffrey Thomas wrote: > > On Friday, July 12, 2019 4:28 PM, Theodore Ts'o wrote: > > > Hmmm... what's gid 4? Is that a hint of where the inode might have come > > > from? > > > > Good call, gid 4 is `adm`. And now that we have an inode number we can see > > the file's contents, it's from /var/log/account. > > > > I bet that this is acct(2) holding onto a reference in some weird way > > (possibly involving logrotate?), which also explains why we couldn't find > > a userspace process holding onto the inode. We'll investigate a bit.... > > To close this out - yes, this was process accounting. Debian has a nightly cronjob which rotates the pacct logs, runs `invoke-rc.d acct restart` to reopen the file, and compresses the old log. Due to a stray policy-rc.d file from an old provisioning script, however, the restart was being skipped, and so we were unlinking and compressing the pacct file while the kernel still had it open. So it was the classic problem of an open file handle to a large deleted file, except that the open file handle was being held by the kernel. > > `accton off` solved our immediate problems and freed the space. I'm not totally sure why a failed umount had that effect, too, but I suppose it turned off process accounting. > > It's a little frustrating to me that the file opened by acct(2) doesn't show up to userspace (lsof doesn't seem to find it) - it'd be nice if it could show up in /proc/$some_kernel_thread/fd or somewhere, if possible. > > Thanks for the help - the e2image + fsck trick is great! Glad to hear you were able to solve the problem in the end :) Honza -- Jan Kara SUSE Labs, CR