Project

General

Profile

Actions

Bug #157

closed

fix auth_x memory leak

Added by Sage Weil almost 14 years ago. Updated over 13 years ago.

Status:
Resolved
Priority:
Normal
Assignee:
-
Category:
-
Target version:
% Done:

0%

Source:
Tags:
Backport:
Regression:
Severity:
Reviewed:
Affected Versions:
ceph-qa-suite:
Crash signature (v1):
Crash signature (v2):

Description

this is on ceph1, qa loopall.sh workload, unstable branch.

unreferenced object 0xffff88000648faa0 (size 192):
  comm "ceph-msgr/0", pid 2710, jiffies 4294914035 (age 8202.560s)
  hex dump (first 32 bytes):
    01 24 10 00 00 00 00 00 00 04 00 00 00 01 43 00  .$............C.
    00 00 00 00 00 00 70 00 00 00 cf fa bf 93 c8 16  ......p.........
  backtrace:
    [<ffffffff810af613>] create_object+0x190/0x292
    [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2
    [<ffffffff810a9091>] __kmalloc+0x195/0x1c2
    [<ffffffffa00765d9>] ceph_buffer_new+0x4f/0xf5 [ceph]
    [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph]
    [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph]
    [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph]
    [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph]
    [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa
    [<ffffffff8104a66e>] kthread+0x7d/0x85
    [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000648f818 (size 192):
  comm "ceph-msgr/0", pid 2710, jiffies 4294914042 (age 8239.932s)
  hex dump (first 32 bytes):
    98 9c ac 0e 01 88 ff ff 04 00 00 00 00 00 00 00  ................
    a6 13 89 c8 11 e9 88 12 20 00 00 00 9e 28 ad 58  ........ ....(.X
  backtrace:
    [<ffffffff810af613>] create_object+0x190/0x292
    [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2
    [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d
    [<ffffffffa008ab96>] ceph_x_create_authorizer+0x4d/0xbb [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph]
    [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph]
    [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph]
    [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa
    [<ffffffff8104a66e>] kthread+0x7d/0x85
    [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800065209c8 (size 192):
  comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.892s)
  hex dump (first 32 bytes):
    b8 55 52 06 00 88 ff ff 04 00 00 00 00 00 00 00  .UR.............
    05 64 7a 89 30 13 26 aa 20 00 00 00 05 39 4c 44  .dz.0.&. ....9LD
  backtrace:
    [<ffffffff810af613>] create_object+0x190/0x292
    [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2
    [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d
    [<ffffffffa008ab96>] ceph_x_create_authorizer+0x4d/0xbb [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph]
    [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph]
    [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph]
    [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa
    [<ffffffff8104a66e>] kthread+0x7d/0x85
    [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800065255b8 (size 64):
  comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.892s)
  hex dump (first 32 bytes):
    01 00 00 00 5a 5a 5a 5a f0 08 52 06 00 88 ff ff  ....ZZZZ..R.....
    ae 00 00 00 00 00 00 00 b0 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff810af613>] create_object+0x190/0x292
    [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2
    [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d
    [<ffffffffa00765ba>] ceph_buffer_new+0x30/0xf5 [ceph]
    [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph]
    [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph]
    [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph]
    [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph]
    [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa
    [<ffffffff8104a66e>] kthread+0x7d/0x85
    [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800065208f0 (size 192):
  comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.896s)
  hex dump (first 32 bytes):
    01 24 10 00 00 00 00 00 00 04 00 00 00 01 43 00  .$............C.
    00 00 00 00 00 00 70 00 00 00 cf fa bf 93 c8 16  ......p.........
  backtrace:
    [<ffffffff810af613>] create_object+0x190/0x292
    [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2
    [<ffffffff810a9091>] __kmalloc+0x195/0x1c2
    [<ffffffffa00765d9>] ceph_buffer_new+0x4f/0xf5 [ceph]
    [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph]
    [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph]
    [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph]
    [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph]
    [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph]
    [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph]
    [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa
    [<ffffffff8104a66e>] kthread+0x7d/0x85
    [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10
    [<ffffffffffffffff>] 0xffffffffffffffff
Actions #1

Updated by Sage Weil almost 14 years ago

  • Status changed from New to Resolved

fixed by 'ceph: fix leak of osd authorizer'. the osd_client put_osd() didn't clean up the ceph_authorizer.

Actions

Also available in: Atom PDF