Uploaded image for project: 'Lustre'
  1. Lustre
  2. LU-19758

kmemleak: memory leaks

    XMLWordPrintable

Details

    • Bug
    • Resolution: Unresolved
    • Medium
    • None
    • None
    • None
    • 3
    • 9223372036854775807

    Description

      kmemleak sees:

        comm "mount.lustre", pid 50854, jiffies 4298460647
        hex dump (first 32 bytes):
          2f 66 73 2f 6c 75 73 74 72 65 2f 6d 64 73 2f 4d  /fs/lustre/mds/M
          44 53 00 00 00 00 00 00 00 00 00 00 00 00 00 00  DS..............
        backtrace (crc eaadbadd):
          [<ffffffff8a9131d2>] kmemleak_alloc+0x62/0xe0
          [<ffffffff8883afa3>] __kmalloc_noprof+0x513/0x710
          [<ffffffff8a888767>] kobject_get_path+0x37/0xc0
          [<ffffffffc2dfcb62>] ptlrpc_register_service+0x1872/0x2780 [ptlrpc]
          [<ffffffffc4a5a5ca>] mds_start_ptlrpc_service+0x24a/0x19f0 [mdt]
          [<ffffffffc4a5bf1f>] mds_device_alloc+0x19f/0x3a0 [mdt]
          [<ffffffffc2736dfc>] ldto_device_alloc+0x7c/0x300 [obdclass]
          [<ffffffffc2739f71>] obd_setup+0x3d1/0x780 [obdclass]
          [<ffffffffc273ba1b>] class_setup+0xbcb/0x1480 [obdclass]
          [<ffffffffc274eb99>] class_process_config+0x2be9/0x3490 [obdclass]
          [<ffffffffc276120c>] do_lcfg+0x4fc/0xa00 [obdclass]
          [<ffffffffc2761875>] lustre_start_simple+0x155/0x2b0 [obdclass]
          [<ffffffffc30e45d1>] server_start_targets+0xa71/0x1c70 [ptlrpc]
          [<ffffffffc30e634a>] server_fill_super+0xb6a/0xdd0 [ptlrpc]
          [<ffffffffc3e4398d>] lustre_fill_super+0x6ed/0x9e0 [lustre]
          [<ffffffff889c7cb5>] vfs_get_super+0xc5/0x1a0
      

      and

      unreferenced object 0xffff888104a18360 (size 8):
        comm "modprobe", pid 5131, jiffies 4295278615
        hex dump (first 8 bytes):
          17 43 7e ff 07 ff 51 3f                          .C~...Q?
        backtrace (crc ce58b197):
          [<ffffffff8a9131d2>] kmemleak_alloc+0x62/0xe0
          [<ffffffff8883b74e>] __kmalloc_node_noprof+0x59e/0x750
          [<ffffffff8a8746fd>] alloc_cpumask_var_node+0x5d/0xc0
          [<ffffffff87f050a5>] alloc_workqueue_attrs+0xb5/0x220
          [<ffffffffc1e8c696>] compat_alloc_workqueue_attrs+0x16/0x30 [libcfs]
          [<ffffffffc26f66e1>] cfs_cpt_bind_workqueue.constprop.0+0x31/0x240 [obdclass]
          [<ffffffffc2707006>] obd_zombie_impexp_init+0x66/0xd0 [obdclass]
          [<ffffffffc1df2e7d>] 0xffffffffc1df2e7d
          [<ffffffff87c04ca6>] do_one_initcall+0xa6/0x350
          [<ffffffff88135814>] do_init_module+0x264/0x860
          [<ffffffff8813920e>] load_module+0x104e/0x14d0
          [<ffffffff8813977f>] init_module_from_file+0xdf/0x160
          [<ffffffff88139c67>] idempotent_init_module+0x457/0x7d0
          [<ffffffff8813a05d>] __do_sys_finit_module+0x6d/0x120
          [<ffffffff8813a266>] __x64_sys_finit_module+0x76/0xc0
          [<ffffffff87c0e86d>] x64_sys_call+0x215d/0x4550
      

      ldiskfs (linux-6.12/ext4-prealloc.patch)

      unreferenced object 0xffff888111422000 (size 512):
        comm "mkfs.lustre", pid 4765, jiffies 4295222040
        hex dump (first 32 bytes):
          04 00 00 00 00 00 00 00 08 00 00 00 00 00 00 00  ................
          10 00 00 00 00 00 00 00 20 00 00 00 00 00 00 00  ........ .......
        backtrace (crc 52c9f62e):
          [<ffffffff8a9131d2>] kmemleak_alloc+0x62/0xe0
          [<ffffffff888327cf>] __kmalloc_cache_noprof+0x4af/0x5e0
          [<ffffffffc1fd99e1>] ldiskfs_mb_init+0xd61/0x1890 [ldiskfs]
          [<ffffffffc20a8d8d>] __ldiskfs_fill_super+0x205d/0x3860 [ldiskfs]
          [<ffffffffc20aa8cf>] ldiskfs_fill_super+0x32f/0x9d0 [ldiskfs]
          [<ffffffff889c78d5>] get_tree_bdev_flags+0x355/0x620
          [<ffffffff889c7bc4>] get_tree_bdev+0x14/0x30
          [<ffffffffc2080b59>] ldiskfs_get_tree+0x19/0x30 [ldiskfs]
          [<ffffffff889c20f9>] vfs_get_tree+0x89/0x3a0
          [<ffffffff88a5b234>] do_new_mount+0x244/0x390
          [<ffffffff88a5c05e>] path_mount+0x2fe/0x620
          [<ffffffff88a5c474>] do_mount+0xe4/0x110
          [<ffffffff88a5c84e>] __x64_sys_mount+0x15e/0x230
          [<ffffffff87c0ffb3>] x64_sys_call+0x38a3/0x4550
          [<ffffffff8a904a80>] do_syscall_64+0x60/0x180
          [<ffffffff8aa0012b>] entry_SYSCALL_64_after_hwframe+0x76/0x7e
      

      Attachments

        Activity

          People

            stancheff Shaun Tancheff
            stancheff Shaun Tancheff
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

            Dates

              Created:
              Updated: