All of lore.kernel.org
 help / color / mirror / Atom feed
From: dong  <bauers@126.com>
To: Andrew Morton <akpm@linux-foundation.org>
Cc: Vladimir Davydov <vdavydov.dev@gmail.com>,
	Michal Hocko <mhocko@kernel.org>,
	Johannes Weiner <hannes@cmpxchg.org>,
	bugzilla-daemon@bugzilla.kernel.org, linux-mm@kvack.org
Subject: Re:Re: [Bug 201699] New: kmemleak in memcg_create_kmem_cache
Date: Fri, 16 Nov 2018 10:23:03 +0800 (CST)	[thread overview]
Message-ID: <54b6f6e9.2897.1671a542cb7.Coremail.bauers@126.com> (raw)
In-Reply-To: <20181115130646.6de1029eb1f3b8d7276c3543@linux-foundation.org>

[-- Attachment #1: Type: text/plain, Size: 8831 bytes --]

When I straced systemd, I found the weird system call ‘kcmp’.  Is that can explain something? 





% time     seconds  usecs/call     calls    errors syscall
------ ----------- ----------- --------- --------- ----------------
 29.06    0.000077          19         4           close
 16.98    0.000045          23         2           read
 15.47    0.000041          21         2           open
 10.94    0.000029          15         2           recvmsg
  9.43    0.000025           6         4           epoll_wait
  9.06    0.000024           6         4           epoll_ctl
  6.42    0.000017           0        54           kcmp
  2.26    0.000006           2         4           clock_gettime
  0.38    0.000001           1         2           fstat
------ ----------- ----------- --------- --------- ----------------
100.00    0.000265                    78           total


Sincerely

At 2018-11-16 05:06:46, "Andrew Morton" <akpm@linux-foundation.org> wrote:
>
>(switched to email.  Please respond via emailed reply-to-all, not via the
>bugzilla web interface).
>
>On Thu, 15 Nov 2018 06:31:19 +0000 bugzilla-daemon@bugzilla.kernel.org wrote:
>
>> https://bugzilla.kernel.org/show_bug.cgi?id=201699
>> 
>>             Bug ID: 201699
>>            Summary: kmemleak in memcg_create_kmem_cache
>>            Product: Memory Management
>>            Version: 2.5
>>     Kernel Version: 4.20.0-rc2(other version include 4.14.52 etc.)
>>           Hardware: Intel
>>                 OS: Linux
>>               Tree: Mainline
>>             Status: NEW
>>           Severity: high
>>           Priority: P1
>>          Component: Slab Allocator
>>           Assignee: akpm@linux-foundation.org
>>           Reporter: bauers@126.com
>>         Regression: No
>> 
>> On debian OS, when systemd restart a failed service periodically. It will cause
>> memory leak. When I enable kmemleak, the message comes up.
>> 
>> 
>> [ 4658.065578] kmemleak: Found object by alias at 0xffff9d84ba868808
>> [ 4658.065581] CPU: 8 PID: 5194 Comm: kworker/8:3 Not tainted 4.20.0-rc2.bm.1+
>> #1
>> [ 4658.065582] Hardware name: Dell Inc. PowerEdge C6320/082F9M, BIOS 2.1.5
>> 04/12/2016
>> [ 4658.065586] Workqueue: memcg_kmem_cache memcg_kmem_cache_create_func
>> [ 4658.065587] Call Trace:
>> [ 4658.065590]  dump_stack+0x5c/0x7b
>> [ 4658.065594]  lookup_object+0x5e/0x80
>> [ 4658.065596]  find_and_get_object+0x29/0x80
>> [ 4658.065598]  kmemleak_no_scan+0x31/0xc0
>> [ 4658.065600]  setup_kmem_cache_node+0x271/0x350
>> [ 4658.065602]  __do_tune_cpucache+0x18c/0x220
>> [ 4658.065603]  do_tune_cpucache+0x27/0xb0
>> [ 4658.065605]  enable_cpucache+0x80/0x110
>> [ 4658.065606]  __kmem_cache_create+0x217/0x3a0
>> [ 4658.065609]  ? kmem_cache_alloc+0x1aa/0x280
>> [ 4658.065612]  create_cache+0xd9/0x200
>> [ 4658.065614]  memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065616]  memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065619]  process_one_work+0x1d1/0x3d0
>> [ 4658.065621]  worker_thread+0x4f/0x3b0
>> [ 4658.065623]  ? rescuer_thread+0x360/0x360
>> [ 4658.065625]  kthread+0xf8/0x130
>> [ 4658.065627]  ? kthread_create_worker_on_cpu+0x70/0x70
>> [ 4658.065628]  ret_from_fork+0x35/0x40
>> [ 4658.065630] kmemleak: Object 0xffff9d84ba868800 (size 128):
>> [ 4658.065631] kmemleak:   comm "kworker/8:3", pid 5194, jiffies 4296056196
>> [ 4658.065631] kmemleak:   min_count = 1
>> [ 4658.065632] kmemleak:   count = 0
>> [ 4658.065632] kmemleak:   flags = 0x1
>> [ 4658.065633] kmemleak:   checksum = 0
>> [ 4658.065633] kmemleak:   backtrace:
>> [ 4658.065635]      __do_tune_cpucache+0x18c/0x220
>> [ 4658.065636]      do_tune_cpucache+0x27/0xb0
>> [ 4658.065637]      enable_cpucache+0x80/0x110
>> [ 4658.065638]      __kmem_cache_create+0x217/0x3a0
>> [ 4658.065640]      create_cache+0xd9/0x200
>> [ 4658.065641]      memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065642]      memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065644]      process_one_work+0x1d1/0x3d0
>> [ 4658.065646]      worker_thread+0x4f/0x3b0
>> [ 4658.065647]      kthread+0xf8/0x130
>> [ 4658.065648]      ret_from_fork+0x35/0x40
>> [ 4658.065649]      0xffffffffffffffff
>> [ 4658.065650] kmemleak: Not scanning unknown object at 0xffff9d84ba868808
>> [ 4658.065651] CPU: 8 PID: 5194 Comm: kworker/8:3 Not tainted 4.20.0-rc2.bm.1+
>> #1
>> [ 4658.065652] Hardware name: Dell Inc. PowerEdge C6320/082F9M, BIOS 2.1.5
>> 04/12/2016
>> [ 4658.065653] Workqueue: memcg_kmem_cache memcg_kmem_cache_create_func
>> [ 4658.065654] Call Trace:
>> [ 4658.065656]  dump_stack+0x5c/0x7b
>> [ 4658.065657]  kmemleak_no_scan+0xa0/0xc0
>> [ 4658.065659]  setup_kmem_cache_node+0x271/0x350
>> [ 4658.065660]  __do_tune_cpucache+0x18c/0x220
>> [ 4658.065662]  do_tune_cpucache+0x27/0xb0
>> [ 4658.065663]  enable_cpucache+0x80/0x110
>> [ 4658.065664]  __kmem_cache_create+0x217/0x3a0
>> [ 4658.065667]  ? kmem_cache_alloc+0x1aa/0x280
>> [ 4658.065668]  create_cache+0xd9/0x200
>> [ 4658.065670]  memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065671]  memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065673]  process_one_work+0x1d1/0x3d0
>> [ 4658.065675]  worker_thread+0x4f/0x3b0
>> [ 4658.065677]  ? rescuer_thread+0x360/0x360
>> [ 4658.065679]  kthread+0xf8/0x130
>> [ 4658.065681]  ? kthread_create_worker_on_cpu+0x70/0x70
>> [ 4658.065682]  ret_from_fork+0x35/0x40
>> [ 4658.065718] kmemleak: Found object by alias at 0xffff9d8cb36bd288
>> [ 4658.065720] CPU: 8 PID: 5194 Comm: kworker/8:3 Not tainted 4.20.0-rc2.bm.1+
>> #1
>> [ 4658.065721] Hardware name: Dell Inc. PowerEdge C6320/082F9M, BIOS 2.1.5
>> 04/12/2016
>> [ 4658.065722] Workqueue: memcg_kmem_cache memcg_kmem_cache_create_func
>> [ 4658.065722] Call Trace:
>> [ 4658.065724]  dump_stack+0x5c/0x7b
>> [ 4658.065726]  lookup_object+0x5e/0x80
>> [ 4658.065728]  find_and_get_object+0x29/0x80
>> [ 4658.065729]  kmemleak_no_scan+0x31/0xc0
>> [ 4658.065730]  setup_kmem_cache_node+0x271/0x350
>> [ 4658.065732]  __do_tune_cpucache+0x18c/0x220
>> [ 4658.065734]  do_tune_cpucache+0x27/0xb0
>> [ 4658.065735]  enable_cpucache+0x80/0x110
>> [ 4658.065737]  __kmem_cache_create+0x217/0x3a0
>> [ 4658.065739]  ? kmem_cache_alloc+0x1aa/0x280
>> [ 4658.065740]  create_cache+0xd9/0x200
>> [ 4658.065742]  memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065743]  memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065745]  process_one_work+0x1d1/0x3d0
>> [ 4658.065747]  worker_thread+0x4f/0x3b0
>> [ 4658.065750]  ? rescuer_thread+0x360/0x360
>> [ 4658.065751]  kthread+0xf8/0x130
>> [ 4658.065753]  ? kthread_create_worker_on_cpu+0x70/0x70
>> [ 4658.065754]  ret_from_fork+0x35/0x40
>> [ 4658.065755] kmemleak: Object 0xffff9d8cb36bd280 (size 128):
>> [ 4658.065756] kmemleak:   comm "kworker/8:3", pid 5194, jiffies 4296056196
>> [ 4658.065757] kmemleak:   min_count = 1
>> [ 4658.065757] kmemleak:   count = 0
>> [ 4658.065757] kmemleak:   flags = 0x1
>> [ 4658.065758] kmemleak:   checksum = 0
>> [ 4658.065758] kmemleak:   backtrace:
>> [ 4658.065759]      __do_tune_cpucache+0x18c/0x220
>> [ 4658.065760]      do_tune_cpucache+0x27/0xb0
>> [ 4658.065762]      enable_cpucache+0x80/0x110
>> [ 4658.065763]      __kmem_cache_create+0x217/0x3a0
>> [ 4658.065764]      create_cache+0xd9/0x200
>> [ 4658.065765]      memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065766]      memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065768]      process_one_work+0x1d1/0x3d0
>> [ 4658.065770]      worker_thread+0x4f/0x3b0
>> [ 4658.065771]      kthread+0xf8/0x130
>> [ 4658.065772]      ret_from_fork+0x35/0x40
>> [ 4658.065773]      0xffffffffffffffff
>> [ 4658.065774] kmemleak: Not scanning unknown object at 0xffff9d8cb36bd288
>> [ 4658.065775] CPU: 8 PID: 5194 Comm: kworker/8:3 Not tainted 4.20.0-rc2.bm.1+
>> #1
>> [ 4658.065775] Hardware name: Dell Inc. PowerEdge C6320/082F9M, BIOS 2.1.5
>> 04/12/2016
>> [ 4658.065776] Workqueue: memcg_kmem_cache memcg_kmem_cache_create_func
>> [ 4658.065777] Call Trace:
>> [ 4658.065779]  dump_stack+0x5c/0x7b
>> [ 4658.065780]  kmemleak_no_scan+0xa0/0xc0
>> [ 4658.065781]  setup_kmem_cache_node+0x271/0x350
>> [ 4658.065783]  __do_tune_cpucache+0x18c/0x220
>> [ 4658.065784]  do_tune_cpucache+0x27/0xb0
>> [ 4658.065785]  enable_cpucache+0x80/0x110
>> [ 4658.065787]  __kmem_cache_create+0x217/0x3a0
>> [ 4658.065789]  ? kmem_cache_alloc+0x1aa/0x280
>> [ 4658.065790]  create_cache+0xd9/0x200
>> [ 4658.065792]  memcg_create_kmem_cache+0xef/0x120
>> [ 4658.065793]  memcg_kmem_cache_create_func+0x1b/0x60
>> [ 4658.065795]  process_one_work+0x1d1/0x3d0
>> [ 4658.065797]  worker_thread+0x4f/0x3b0
>> [ 4658.065799]  ? rescuer_thread+0x360/0x360
>> [ 4658.065801]  kthread+0xf8/0x130
>> [ 4658.065802]  ? kthread_create_worker_on_cpu+0x70/0x70
>> [ 4658.065804]  ret_from_fork+0x35/0x40
>> 
>> -- 
>> You are receiving this mail because:
>> You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 11404 bytes --]

  reply	other threads:[~2018-11-16  2:25 UTC|newest]

Thread overview: 23+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <bug-201699-27@https.bugzilla.kernel.org/>
2018-11-15 21:06 ` [Bug 201699] New: kmemleak in memcg_create_kmem_cache Andrew Morton
2018-11-16  2:23   ` dong [this message]
2018-11-16  3:04     ` dong
2018-11-16  3:37       ` dong
2018-11-16 17:50   ` Vladimir Davydov
2018-11-18  0:44     ` dong
2018-11-19  8:30       ` Vladimir Davydov
2018-11-19 10:24         ` Michal Hocko
2018-11-19 11:56         ` dong
2018-11-21  8:46           ` dong
2018-11-21  8:56             ` Vladimir Davydov
2018-11-21  9:06               ` dong
2018-11-21  9:10             ` Michal Hocko
2018-11-21  9:22               ` dong
2018-11-21  9:36                 ` 段熊春
2018-11-21 16:27                   ` Michal Hocko
2018-11-22  2:19                     ` 段熊春
2018-11-22  7:32                       ` Michal Hocko
2018-11-22  2:56                     ` 段熊春
2018-11-22  7:34                       ` Michal Hocko
2018-11-22  8:21                         ` 段熊春
2018-11-23  6:54                         ` 段熊春
2018-11-21  8:52           ` Re: " Vladimir Davydov

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=54b6f6e9.2897.1671a542cb7.Coremail.bauers@126.com \
    --to=bauers@126.com \
    --cc=akpm@linux-foundation.org \
    --cc=bugzilla-daemon@bugzilla.kernel.org \
    --cc=hannes@cmpxchg.org \
    --cc=linux-mm@kvack.org \
    --cc=mhocko@kernel.org \
    --cc=vdavydov.dev@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.