From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from [140.186.70.92] (port=40640 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1P0MXa-0001aV-3O for qemu-devel@nongnu.org; Mon, 27 Sep 2010 18:51:23 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.69) (envelope-from ) id 1P0MXY-0004AJ-A1 for qemu-devel@nongnu.org; Mon, 27 Sep 2010 18:51:22 -0400 Received: from adelie.canonical.com ([91.189.90.139]:41015) by eggs.gnu.org with esmtp (Exim 4.69) (envelope-from ) id 1P0MXX-0004A6-PV for qemu-devel@nongnu.org; Mon, 27 Sep 2010 18:51:20 -0400 Received: from loganberry.canonical.com ([91.189.90.37]) by adelie.canonical.com with esmtp (Exim 4.69 #1 (Debian)) id 1P0MXU-0003QC-Q9 for ; Mon, 27 Sep 2010 23:51:17 +0100 Received: from loganberry.canonical.com (localhost [127.0.0.1]) by loganberry.canonical.com (Postfix) with ESMTP id 6C08C2E81A2 for ; Mon, 27 Sep 2010 22:51:00 +0000 (UTC) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Date: Mon, 27 Sep 2010 22:45:01 -0000 From: Moshroum Sender: bounces@canonical.com References: <20100926200911.20945.84209.malonedeb@palladium.canonical.com> Message-Id: <20100927224501.20945.68266.malone@palladium.canonical.com> Errors-To: bounces@canonical.com Subject: [Qemu-devel] [Bug 648356] Re: VirtFS possible memory leak in 9p virtio mapped Reply-To: Bug 648356 <648356@bugs.launchpad.net> List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Updated to v2.6.36.6 with https://patchwork.kernel.org/patch/127401/ and it still has the problem. It increases the memory usage not as fast, but it still quite a lot. I also tried to mount it using -oversion=3D9p2000.L /sys/kernel/debug/kmemleak says on unmount: unreferenced object 0xf791a870 (size 192): comm "swapper", pid 1, jiffies 4294892433 (age 784.692s) hex dump (first 32 bytes): 00 00 00 e0 00 00 00 00 ff ff bf fe 00 00 00 00 ................ 00 b9 9d f7 00 02 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk backtrace: [] kmemleak_alloc+0x70/0x160 [] __kmalloc+0x254/0x440 [] pci_acpi_scan_root+0x260/0x3b3 [] acpi_pci_root_add+0x295/0x4b7 [] acpi_device_probe+0x72/0x277 [] driver_probe_device+0x135/0x410 [] __driver_attach+0x11f/0x130 [] bus_for_each_dev+0x92/0x110 [] driver_attach+0x27/0x40 [] bus_add_driver+0x1bd/0x4e0 [] driver_register+0xcb/0x290 [] acpi_bus_register_driver+0x55/0x65 [] acpi_pci_root_init+0x47/0x72 [] do_one_initcall+0x3e/0x2c0 [] kernel_init+0x1a6/0x305 [] kernel_thread_helper+0x6/0x14 unreferenced object 0xf79db900 (size 16): comm "swapper", pid 1, jiffies 4294892433 (age 784.692s) hex dump (first 16 bytes): 50 43 49 20 42 75 73 20 30 30 30 30 3a 30 30 00 PCI Bus 0000:00. backtrace: [] kmemleak_alloc+0x70/0x160 [] __kmalloc+0x254/0x440 [] kvasprintf+0x68/0xd0 [] kasprintf+0x2d/0x50 [] pci_acpi_scan_root+0x2a6/0x3b3 [] acpi_pci_root_add+0x295/0x4b7 [] acpi_device_probe+0x72/0x277 [] driver_probe_device+0x135/0x410 [] __driver_attach+0x11f/0x130 [] bus_for_each_dev+0x92/0x110 [] driver_attach+0x27/0x40 [] bus_add_driver+0x1bd/0x4e0 [] driver_register+0xcb/0x290 [] acpi_bus_register_driver+0x55/0x65 [] acpi_pci_root_init+0x47/0x72 [] do_one_initcall+0x3e/0x2c0 unreferenced object 0xf6a12c60 (size 96): comm "mount", pid 1191, jiffies 4294893979 (age 778.536s) hex dump (first 32 bytes): 01 00 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 28 65 11 c2 80 e8 b8 c1 8d 2c 78 c1 00 00 00 00 (e.......,x..... backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] p9_idpool_create+0x59/0xf0 [] p9_client_create+0xe2/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6bb6cc0 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.536s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6bb6d80 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.616s) hex dump (first 32 bytes): 00 00 00 00 c0 6c bb f6 00 00 00 00 00 00 00 00 .....l.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6bb6b40 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.616s) hex dump (first 32 bytes): 00 00 00 00 80 6d bb f6 00 00 00 00 00 00 00 00 .....m.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6bb6e40 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.616s) hex dump (first 32 bytes): 00 00 00 00 40 6b bb f6 00 00 00 00 00 00 00 00 ....@k.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6bb6f00 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.616s) hex dump (first 32 bytes): 00 00 00 00 40 6e bb f6 00 00 00 00 00 00 00 00 ....@n.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501000 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.688s) hex dump (first 32 bytes): 00 00 00 00 00 6f bb f6 00 00 00 00 00 00 00 00 .....o.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf65010c0 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.688s) hex dump (first 32 bytes): 00 00 00 00 00 10 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501180 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.688s) hex dump (first 32 bytes): 00 00 00 00 c0 10 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501240 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.688s) hex dump (first 32 bytes): 00 00 00 00 80 11 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501300 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.760s) hex dump (first 32 bytes): 00 00 00 00 40 12 50 f6 00 00 00 00 00 00 00 00 ....@.P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf65013c0 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.760s) hex dump (first 32 bytes): 00 00 00 00 00 13 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501480 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.760s) hex dump (first 32 bytes): 00 00 00 00 c0 13 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501540 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.760s) hex dump (first 32 bytes): 00 00 00 00 80 14 50 f6 00 00 00 00 00 00 00 00 ......P......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff unreferenced object 0xf6501600 (size 148): comm "mount", pid 1191, jiffies 4294893979 (age 778.828s) hex dump (first 32 bytes): 01 00 00 00 60 2c a1 f6 00 00 00 00 00 00 00 00 ....`,.......... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x70/0x160 [] kmem_cache_alloc+0x21b/0x340 [] idr_pre_get+0x8f/0xd0 [] p9_idpool_get+0x35/0xf0 [] p9_client_create+0x106/0x650 [] v9fs_session_init+0x35f/0x890 [] v9fs_get_sb+0xb1/0x440 [] vfs_kern_mount+0xaa/0x240 [] do_kern_mount+0x53/0x1c0 [] do_mount+0x88a/0x10f0 [] sys_mount+0xe2/0x170 [] sysenter_do_call+0x12/0x38 [] 0xffffffff -- = VirtFS possible memory leak in 9p virtio mapped https://bugs.launchpad.net/bugs/648356 You received this bug notification because you are a member of qemu- devel-ml, which is subscribed to QEMU. Status in QEMU: New Bug description: I use as client Debian squeeze i386 with a custom kernel: Linux (none) 2.6.35.5 #3 Thu Sep 23 18:36:02 UTC 2010 i686 GNU/Linux And as host Debian squeeze amd64 Linux asd 2.6.32-5-amd64 #1 SMP Fri Sep 17 21:50:19 UTC 2010 x86_64 GNU/Lin= ux kvm version is: kvm-88-5908-gdd67374 Started the client using: sudo /usr/local/kvm/bin/qemu-system-x86_64 -m 1024 -kernel linux-2.6.35.5.q= emu -drive file=3Droot.img,if=3Dvirtio -net nic,macaddr=3D02:ca:ff:ee:ba:be= ,model=3Dvirtio,vlan=3D1 -net tap,ifname=3Dtap1,vlan=3D1,script=3Dno -virtf= s local,path=3D/host,security_model=3Dmapped,mount_tag=3Dhost -nographic I've done following inside the guest: $ mount -t 9p -o trans=3Dvirtio host /mnt $ rm -f /mnt/test $ touch /mnt/test $ ls -l /mnt/test $ while true ;do ls -l /mnt/test > /dev/null; done Now I can see on my host system that the memory consumption starts at 90MB = and after a minute it raises to 130MB. The extra memory consumption stops = when I stop the while-loop. $ while true ;do ls -l /tmp > /dev/null; done Doesn't show that behaviour.