lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANaxB-zOEPpZ4ohYkpb1-36OMsD+8VH6HP_6GP_suSe_AF150Q@mail.gmail.com>
Date:   Thu, 8 Jun 2017 13:49:38 -0700
From:   Andrei Vagin <avagin@...il.com>
To:     Kirill Tkhai <ktkhai@...tuozzo.com>,
        LKML <linux-kernel@...r.kernel.org>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>,
        Alexander Viro <viro@...iv.linux.org.uk>,
        "Eric W. Biederman" <ebiederm@...ssion.com>
Subject: Mount structures are leaked

Hello,

We found that mount structures are leaked on the upstream linux kernel:

[root@...m criu]# cat /proc/slabinfo | grep mnt
mnt_cache          36456  36456    384   42    4 : tunables    0    0
  0 : slabdata    868    868      0
[root@...m criu]#  python test/zdtm.py run  -t zdtm/static/env00
--iter 10 -f ns
=== Run 1/1 ================ zdtm/static/env00

========================= Run zdtm/static/env00 in ns ==========================
Start test
./env00 --pidfile=env00.pid --outfile=env00.out --envname=ENV_00_TEST
Run criu dump
Run criu restore
Run criu dump
....
Run criu restore
Send the 15 signal to  339
Wait for zdtm/static/env00(339) to die for 0.100000
Removing dump/zdtm/static/env00/31
========================= Test zdtm/static/env00 PASS ==========================
[root@...m criu]# cat /proc/slabinfo | grep mnt
mnt_cache          36834  36834    384   42    4 : tunables    0    0
  0 : slabdata    877    877      0

[root@...m linux]# git describe HEAD
v4.12-rc4-122-gb29794e

[root@...m ~]# uname -a
Linux zdtm.openvz.org 4.12.0-rc4+ #2 SMP Thu Jun 8 20:49:01 CEST 2017
x86_64 x86_64 x86_64 GNU/Linux

Thanks,
Andrei

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ