From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751707AbdFHUtm (ORCPT ); Thu, 8 Jun 2017 16:49:42 -0400 Received: from mail-lf0-f46.google.com ([209.85.215.46]:36530 "EHLO mail-lf0-f46.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751392AbdFHUtk (ORCPT ); Thu, 8 Jun 2017 16:49:40 -0400 MIME-Version: 1.0 From: Andrei Vagin Date: Thu, 8 Jun 2017 13:49:38 -0700 Message-ID: Subject: Mount structures are leaked To: Kirill Tkhai , LKML , linux-fsdevel , Alexander Viro , "Eric W. Biederman" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, We found that mount structures are leaked on the upstream linux kernel: [root@zdtm criu]# cat /proc/slabinfo | grep mnt mnt_cache 36456 36456 384 42 4 : tunables 0 0 0 : slabdata 868 868 0 [root@zdtm criu]# python test/zdtm.py run -t zdtm/static/env00 --iter 10 -f ns === Run 1/1 ================ zdtm/static/env00 ========================= Run zdtm/static/env00 in ns ========================== Start test ./env00 --pidfile=env00.pid --outfile=env00.out --envname=ENV_00_TEST Run criu dump Run criu restore Run criu dump .... Run criu restore Send the 15 signal to 339 Wait for zdtm/static/env00(339) to die for 0.100000 Removing dump/zdtm/static/env00/31 ========================= Test zdtm/static/env00 PASS ========================== [root@zdtm criu]# cat /proc/slabinfo | grep mnt mnt_cache 36834 36834 384 42 4 : tunables 0 0 0 : slabdata 877 877 0 [root@zdtm linux]# git describe HEAD v4.12-rc4-122-gb29794e [root@zdtm ~]# uname -a Linux zdtm.openvz.org 4.12.0-rc4+ #2 SMP Thu Jun 8 20:49:01 CEST 2017 x86_64 x86_64 x86_64 GNU/Linux Thanks, Andrei