From: Russell King - ARM Linux <linux@arm.linux.org.uk>
To: Catalin Marinas <catalin.marinas@arm.com>
Cc: NeilBrown <neilb@suse.de>,
linux-raid@vger.kernel.org, linux-mm@kvack.org,
David Rientjes <rientjes@google.com>,
Maxime Bizon <mbizon@freebox.fr>,
Linus Torvalds <torvalds@linux-foundation.org>,
linux-arm-kernel@lists.infradead.org
Subject: Re: Recent 3.x kernels: Memory leak causing OOMs
Date: Mon, 17 Mar 2014 19:33:16 +0000 [thread overview]
Message-ID: <20140317193316.GF21483@n2100.arm.linux.org.uk> (raw)
In-Reply-To: <20140317181813.GA24144@arm.com>
On Mon, Mar 17, 2014 at 06:18:13PM +0000, Catalin Marinas wrote:
> On Mon, Mar 17, 2014 at 06:07:48PM +1100, NeilBrown wrote:
> > On Sat, 15 Mar 2014 10:19:52 +0000 Russell King - ARM Linux
> > <linux@arm.linux.org.uk> wrote:
> > > unreferenced object 0xc3c3f880 (size 256):
> > > comm "md2_resync", pid 4680, jiffies 638245 (age 8615.570s)
> > > hex dump (first 32 bytes):
> > > 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 f0 ................
> > > 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ................
> > > backtrace:
> > > [<c008d4f0>] __save_stack_trace+0x34/0x40
> > > [<c008d5f0>] create_object+0xf4/0x214
> > > [<c02da114>] kmemleak_alloc+0x3c/0x6c
> > > [<c008c0d4>] __kmalloc+0xd0/0x124
> > > [<c00bb124>] bio_alloc_bioset+0x4c/0x1a4
> > > [<c021206c>] r1buf_pool_alloc+0x40/0x148
> > > [<c0061160>] mempool_alloc+0x54/0xfc
> > > [<c0211938>] sync_request+0x168/0x85c
> > > [<c021addc>] md_do_sync+0x75c/0xbc0
> > > [<c021b594>] md_thread+0x138/0x154
> > > [<c0037b48>] kthread+0xb0/0xbc
> > > [<c0013190>] ret_from_fork+0x14/0x24
> > > [<ffffffff>] 0xffffffff
> > >
> > > with 3077 of these in the debug file. 3075 are for "md2_resync" and
> > > two are for "md4_resync".
> > >
> > > /proc/slabinfo shows for this bucket:
> > > kmalloc-256 3237 3450 256 15 1 : tunables 120 60 0 : slabdata 230 230 0
> > >
> > > but this would only account for about 800kB of memory usage, which itself
> > > is insignificant - so this is not the whole story.
> > >
> > > It seems that this is the culpret for the allocations:
> > > for (j = pi->raid_disks ; j-- ; ) {
> > > bio = bio_kmalloc(gfp_flags, RESYNC_PAGES);
> > >
> > > Since RESYNC_PAGES will be 64K/4K=16, each struct bio_vec is 12 bytes
> > > (12 * 16 = 192) plus the size of struct bio, which would fall into this
> > > bucket.
> > >
> > > I don't see anything obvious - it looks like it isn't every raid check
> > > which loses bios. Not quite sure what to make of this right now.
> >
> > I can't see anything obvious either.
> >
> > The bios allocated there are stored in a r1_bio and those pointers are never
> > changed.
> > If the r1_bio wasn't freed then when the data-check finished, mempool_destroy
> > would complain that the pool wasn't completely freed.
> > And when the r1_bio is freed, all the bios are put as well.
>
> It could be a false positive, there are areas that kmemleak doesn't scan
> like page allocations and the pointer reference graph it tries to build
> would fail.
>
> What's interesting to see is the first few leaks reported as they are
> always reported in the order of allocation. In this case, the
> bio_kmalloc() returned pointer is stored in r1_bio. Is the r1_bio
> reported as a leak as well?
I'd assume that something else would likely have a different size.
All leaks are of 256 bytes. Also...
$ grep kmemleak_alloc kmemleak-20140315 -A2 |sort | uniq -c |less
3081 --
3082 [<c008c0d4>] __kmalloc+0xd0/0x124
3082 [<c00bb124>] bio_alloc_bioset+0x4c/0x1a4
3082 [<c02da114>] kmemleak_alloc+0x3c/0x6c
seems pretty conclusive that it's just one spot.
> The sync_request() function eventually gets rid of the r1_bio as it is a
> variable on the stack. But it is stored in a bio->bi_private variable
> and that's where I lost track of where pointers are referenced from.
>
> A simple way to check whether it's a false positive is to do a:
>
> echo dump=<unref obj addr> > /sys/kernel/debug/kmemleak
>
> If an object was reported as a leak but later on kmemleak doesn't know
> about it, it means that it was freed and hence a false positive (maybe I
> should add this as a warning in kmemleak if certain amount of leaked
> objects freeing is detected).
So doing that with the above leaked bio produces:
kmemleak: Object 0xc3c3f880 (size 256):
kmemleak: comm "md2_resync", pid 4680, jiffies 638245
kmemleak: min_count = 1
kmemleak: count = 0
kmemleak: flags = 0x3
kmemleak: checksum = 1042746691
kmemleak: backtrace:
[<c008d4f0>] __save_stack_trace+0x34/0x40
[<c008d5f0>] create_object+0xf4/0x214
[<c02da114>] kmemleak_alloc+0x3c/0x6c
[<c008c0d4>] __kmalloc+0xd0/0x124
[<c00bb124>] bio_alloc_bioset+0x4c/0x1a4
[<c021206c>] r1buf_pool_alloc+0x40/0x148
[<c0061160>] mempool_alloc+0x54/0xfc
[<c0211938>] sync_request+0x168/0x85c
[<c021addc>] md_do_sync+0x75c/0xbc0
[<c021b594>] md_thread+0x138/0x154
[<c0037b48>] kthread+0xb0/0xbc
[<c0013190>] ret_from_fork+0x14/0x24
[<ffffffff>] 0xffffffff
--
FTTC broadband for 0.8mile line: now at 9.7Mbps down 460kbps up... slowly
improving, and getting towards what was expected from it.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2014-03-17 19:33 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-02-16 20:05 Recent 3.x kernels: Memory leak causing OOMs Russell King - ARM Linux
2014-02-16 21:43 ` Theodore Ts'o
2014-02-17 18:34 ` Catalin Marinas
2014-02-16 22:17 ` David Rientjes
2014-02-16 22:50 ` Russell King - ARM Linux
2014-02-16 23:42 ` David Rientjes
2014-02-17 21:02 ` Maxime Bizon
2014-02-17 21:09 ` Russell King - ARM Linux
2014-03-15 10:19 ` Russell King - ARM Linux
2014-03-17 7:07 ` NeilBrown
2014-03-17 8:51 ` Russell King - ARM Linux
2014-03-17 18:18 ` Catalin Marinas
2014-03-17 19:33 ` Russell King - ARM Linux [this message]
2014-04-01 9:19 ` Russell King - ARM Linux
2014-04-01 11:38 ` Russell King - ARM Linux
2014-04-01 14:04 ` Russell King - ARM Linux
2014-04-02 23:28 ` NeilBrown
2014-04-01 15:58 ` Catalin Marinas
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140317193316.GF21483@n2100.arm.linux.org.uk \
--to=linux@arm.linux.org.uk \
--cc=catalin.marinas@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-mm@kvack.org \
--cc=linux-raid@vger.kernel.org \
--cc=mbizon@freebox.fr \
--cc=neilb@suse.de \
--cc=rientjes@google.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).