[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Qemu-devel] [Bug 648356] Re: VirtFS possible memory leak in 9p virtio m
From: |
Moshroum |
Subject: |
[Qemu-devel] [Bug 648356] Re: VirtFS possible memory leak in 9p virtio mapped |
Date: |
Mon, 27 Sep 2010 22:45:01 -0000 |
Updated to v2.6.36.6 with https://patchwork.kernel.org/patch/127401/ and
it still has the problem. It increases the memory usage not as fast, but
it still quite a lot.
I also tried to mount it using -oversion=9p2000.L
/sys/kernel/debug/kmemleak says on unmount:
unreferenced object 0xf791a870 (size 192):
comm "swapper", pid 1, jiffies 4294892433 (age 784.692s)
hex dump (first 32 bytes):
00 00 00 e0 00 00 00 00 ff ff bf fe 00 00 00 00 ................
00 b9 9d f7 00 02 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c1174ad4>] __kmalloc+0x254/0x440
[<c16210cf>] pci_acpi_scan_root+0x260/0x3b3
[<c161c98b>] acpi_pci_root_add+0x295/0x4b7
[<c1343dd7>] acpi_device_probe+0x72/0x277
[<c1404db5>] driver_probe_device+0x135/0x410
[<c14051af>] __driver_attach+0x11f/0x130
[<c14037a2>] bus_for_each_dev+0x92/0x110
[<c14049b7>] driver_attach+0x27/0x40
[<c1403ced>] bus_add_driver+0x1bd/0x4e0
[<c14056bb>] driver_register+0xcb/0x290
[<c1345129>] acpi_bus_register_driver+0x55/0x65
[<c196c96e>] acpi_pci_root_init+0x47/0x72
[<c100105e>] do_one_initcall+0x3e/0x2c0
[<c1940546>] kernel_init+0x1a6/0x305
[<c10049c2>] kernel_thread_helper+0x6/0x14
unreferenced object 0xf79db900 (size 16):
comm "swapper", pid 1, jiffies 4294892433 (age 784.692s)
hex dump (first 16 bytes):
50 43 49 20 42 75 73 20 30 30 30 30 3a 30 30 00 PCI Bus 0000:00.
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c1174ad4>] __kmalloc+0x254/0x440
[<c12efbb8>] kvasprintf+0x68/0xd0
[<c12efc4d>] kasprintf+0x2d/0x50
[<c1621115>] pci_acpi_scan_root+0x2a6/0x3b3
[<c161c98b>] acpi_pci_root_add+0x295/0x4b7
[<c1343dd7>] acpi_device_probe+0x72/0x277
[<c1404db5>] driver_probe_device+0x135/0x410
[<c14051af>] __driver_attach+0x11f/0x130
[<c14037a2>] bus_for_each_dev+0x92/0x110
[<c14049b7>] driver_attach+0x27/0x40
[<c1403ced>] bus_add_driver+0x1bd/0x4e0
[<c14056bb>] driver_register+0xcb/0x290
[<c1345129>] acpi_bus_register_driver+0x55/0x65
[<c196c96e>] acpi_pci_root_init+0x47/0x72
[<c100105e>] do_one_initcall+0x3e/0x2c0
unreferenced object 0xf6a12c60 (size 96):
comm "mount", pid 1191, jiffies 4294893979 (age 778.536s)
hex dump (first 32 bytes):
01 00 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N..........
28 65 11 c2 80 e8 b8 c1 8d 2c 78 c1 00 00 00 00 (e.......,x.....
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c160c4a9>] p9_idpool_create+0x59/0xf0
[<c160b4b2>] p9_client_create+0xe2/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6bb6cc0 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.536s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6bb6d80 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.616s)
hex dump (first 32 bytes):
00 00 00 00 c0 6c bb f6 00 00 00 00 00 00 00 00 .....l..........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6bb6b40 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.616s)
hex dump (first 32 bytes):
00 00 00 00 80 6d bb f6 00 00 00 00 00 00 00 00 .....m..........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6bb6e40 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.616s)
hex dump (first 32 bytes):
00 00 00 00 40 6b bb f6 00 00 00 00 00 00 00 00 address@hidden
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6bb6f00 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.616s)
hex dump (first 32 bytes):
00 00 00 00 40 6e bb f6 00 00 00 00 00 00 00 00 address@hidden
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501000 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.688s)
hex dump (first 32 bytes):
00 00 00 00 00 6f bb f6 00 00 00 00 00 00 00 00 .....o..........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf65010c0 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.688s)
hex dump (first 32 bytes):
00 00 00 00 00 10 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501180 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.688s)
hex dump (first 32 bytes):
00 00 00 00 c0 10 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501240 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.688s)
hex dump (first 32 bytes):
00 00 00 00 80 11 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501300 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.760s)
hex dump (first 32 bytes):
00 00 00 00 40 12 50 f6 00 00 00 00 00 00 00 00 address@hidden
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf65013c0 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.760s)
hex dump (first 32 bytes):
00 00 00 00 00 13 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501480 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.760s)
hex dump (first 32 bytes):
00 00 00 00 c0 13 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501540 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.760s)
hex dump (first 32 bytes):
00 00 00 00 80 14 50 f6 00 00 00 00 00 00 00 00 ......P.........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
unreferenced object 0xf6501600 (size 148):
comm "mount", pid 1191, jiffies 4294893979 (age 778.828s)
hex dump (first 32 bytes):
01 00 00 00 60 2c a1 f6 00 00 00 00 00 00 00 00 ....`,..........
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c1616140>] kmemleak_alloc+0x70/0x160
[<c117380b>] kmem_cache_alloc+0x21b/0x340
[<c12dc2af>] idr_pre_get+0x8f/0xd0
[<c160c345>] p9_idpool_get+0x35/0xf0
[<c160b4d6>] p9_client_create+0x106/0x650
[<c129b1df>] v9fs_session_init+0x35f/0x890
[<c1295a51>] v9fs_get_sb+0xb1/0x440
[<c118c60a>] vfs_kern_mount+0xaa/0x240
[<c118c833>] do_kern_mount+0x53/0x1c0
[<c11bb41a>] do_mount+0x88a/0x10f0
[<c11bbd62>] sys_mount+0xe2/0x170
[<c10043df>] sysenter_do_call+0x12/0x38
[<ffffffff>] 0xffffffff
--
VirtFS possible memory leak in 9p virtio mapped
https://bugs.launchpad.net/bugs/648356
You received this bug notification because you are a member of qemu-
devel-ml, which is subscribed to QEMU.
Status in QEMU: New
Bug description:
I use as client Debian squeeze i386 with a custom kernel:
Linux (none) 2.6.35.5 #3 Thu Sep 23 18:36:02 UTC 2010 i686 GNU/Linux
And as host Debian squeeze amd64
Linux asd 2.6.32-5-amd64 #1 SMP Fri Sep 17 21:50:19 UTC 2010 x86_64 GNU/Linux
kvm version is:
kvm-88-5908-gdd67374
Started the client using:
sudo /usr/local/kvm/bin/qemu-system-x86_64 -m 1024 -kernel linux-2.6.35.5.qemu
-drive file=root.img,if=virtio -net
nic,macaddr=02:ca:ff:ee:ba:be,model=virtio,vlan=1 -net
tap,ifname=tap1,vlan=1,script=no -virtfs
local,path=/host,security_model=mapped,mount_tag=host -nographic
I've done following inside the guest:
$ mount -t 9p -o trans=virtio host /mnt
$ rm -f /mnt/test
$ touch /mnt/test
$ ls -l /mnt/test
$ while true ;do ls -l /mnt/test > /dev/null; done
Now I can see on my host system that the memory consumption starts at 90MB and
after a minute it raises to 130MB. The extra memory consumption stops when I
stop the while-loop.
$ while true ;do ls -l /tmp > /dev/null; done
Doesn't show that behaviour.
- [Qemu-devel] [PATCH v2 00/19] Monitor: split HMP and QMP dispatch tables, Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 01/19] Monitor: Introduce search_dispatch_table(), Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 02/19] QMP: handle_qmp_command(): Move 'cmd' sanity check, Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 03/19] QMP: Don't use do_info(), Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 04/19] Monitor: Drop QMP bits from do_info(), Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 05/19] Monitor: Drop is_async_return(), Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 06/19] Monitor: Convert do_info() back to HMP, Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 07/19] Monitor: Introduce the qmp-commands.hx file, Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 09/19] QMP: Introduce command dispatch table, Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 08/19] QMP: Introduce qmp_find_cmd(), Luiz Capitulino, 2010/09/30
- [Qemu-devel] [PATCH 10/19] QMP: Introduce query commands dispatch table, Luiz Capitulino, 2010/09/30