Actions
Bug #157
closedfix auth_x memory leak
% Done:
0%
Source:
Tags:
Backport:
Regression:
Severity:
Reviewed:
Affected Versions:
ceph-qa-suite:
Crash signature (v1):
Crash signature (v2):
Description
this is on ceph1, qa loopall.sh workload, unstable branch.
unreferenced object 0xffff88000648faa0 (size 192): comm "ceph-msgr/0", pid 2710, jiffies 4294914035 (age 8202.560s) hex dump (first 32 bytes): 01 24 10 00 00 00 00 00 00 04 00 00 00 01 43 00 .$............C. 00 00 00 00 00 00 70 00 00 00 cf fa bf 93 c8 16 ......p......... backtrace: [<ffffffff810af613>] create_object+0x190/0x292 [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2 [<ffffffff810a9091>] __kmalloc+0x195/0x1c2 [<ffffffffa00765d9>] ceph_buffer_new+0x4f/0xf5 [ceph] [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph] [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph] [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph] [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph] [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa [<ffffffff8104a66e>] kthread+0x7d/0x85 [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000648f818 (size 192): comm "ceph-msgr/0", pid 2710, jiffies 4294914042 (age 8239.932s) hex dump (first 32 bytes): 98 9c ac 0e 01 88 ff ff 04 00 00 00 00 00 00 00 ................ a6 13 89 c8 11 e9 88 12 20 00 00 00 9e 28 ad 58 ........ ....(.X backtrace: [<ffffffff810af613>] create_object+0x190/0x292 [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2 [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d [<ffffffffa008ab96>] ceph_x_create_authorizer+0x4d/0xbb [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph] [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph] [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph] [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa [<ffffffff8104a66e>] kthread+0x7d/0x85 [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800065209c8 (size 192): comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.892s) hex dump (first 32 bytes): b8 55 52 06 00 88 ff ff 04 00 00 00 00 00 00 00 .UR............. 05 64 7a 89 30 13 26 aa 20 00 00 00 05 39 4c 44 .dz.0.&. ....9LD backtrace: [<ffffffff810af613>] create_object+0x190/0x292 [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2 [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d [<ffffffffa008ab96>] ceph_x_create_authorizer+0x4d/0xbb [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph] [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph] [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph] [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa [<ffffffff8104a66e>] kthread+0x7d/0x85 [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800065255b8 (size 64): comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.892s) hex dump (first 32 bytes): 01 00 00 00 5a 5a 5a 5a f0 08 52 06 00 88 ff ff ....ZZZZ..R..... ae 00 00 00 00 00 00 00 b0 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff810af613>] create_object+0x190/0x292 [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2 [<ffffffff810a93cf>] kmem_cache_alloc+0x14f/0x17d [<ffffffffa00765ba>] ceph_buffer_new+0x30/0xf5 [ceph] [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph] [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph] [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph] [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph] [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa [<ffffffff8104a66e>] kthread+0x7d/0x85 [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800065208f0 (size 192): comm "ceph-msgr/0", pid 2710, jiffies 4294914052 (age 8239.896s) hex dump (first 32 bytes): 01 24 10 00 00 00 00 00 00 04 00 00 00 01 43 00 .$............C. 00 00 00 00 00 00 70 00 00 00 cf fa bf 93 c8 16 ......p......... backtrace: [<ffffffff810af613>] create_object+0x190/0x292 [<ffffffff8140efa9>] kmemleak_alloc+0x5b/0xa2 [<ffffffff810a9091>] __kmalloc+0x195/0x1c2 [<ffffffffa00765d9>] ceph_buffer_new+0x4f/0xf5 [ceph] [<ffffffffa0089a81>] ceph_x_build_authorizer+0xb5/0x2d9 [ceph] [<ffffffffa008abac>] ceph_x_create_authorizer+0x63/0xbb [ceph] [<ffffffffa007f9cd>] get_authorizer+0x9d/0xe9 [ceph] [<ffffffffa00724f0>] prepare_write_connect+0x191/0x24c [ceph] [<ffffffffa0074362>] try_write+0x146/0xff4 [ceph] [<ffffffffa0075d29>] con_work+0x135/0x6b2 [ceph] [<ffffffff8104787b>] worker_thread+0x1e8/0x2fa [<ffffffff8104a66e>] kthread+0x7d/0x85 [<ffffffff810037d4>] kernel_thread_helper+0x4/0x10 [<ffffffffffffffff>] 0xffffffffffffffff
Updated by Sage Weil almost 14 years ago
- Status changed from New to Resolved
fixed by 'ceph: fix leak of osd authorizer'. the osd_client put_osd() didn't clean up the ceph_authorizer.
Actions