/* * Copyright (c) 2011 Bryan Schumaker * * Uses debugfs to create fault injection points for client testing */ #include #include #include #include #include #include #include #include "state.h" #include "netns.h" struct nfsd_fault_inject_op { char *file; u64 (*get)(void); u64 (*set_val)(u64); u64 (*set_clnt)(struct sockaddr_storage *, size_t); }; static struct dentry *debug_dir; static ssize_t fault_inject_read(struct file *file, char __user *buf, size_t len, loff_t *ppos) { static u64 val; char read_buf[25]; size_t size; loff_t pos = *ppos; struct nfsd_fault_inject_op *op = file_inode(file)->i_private; if (!pos) val = op->get(); size = scnprintf(read_buf, sizeof(read_buf), "%llu\n", val); return simple_read_from_buffer(buf, len, ppos, read_buf, size); } static ssize_t fault_inject_write(struct file *file, const char __user *buf, size_t len, loff_t *ppos) { char write_buf[INET6_ADDRSTRLEN]; size_t size = min(sizeof(write_buf) - 1, len); struct net *net = current->nsproxy->net_ns; struct sockaddr_storage sa; struct nfsd_fault_inject_op *op = file_inode(file)->i_private; u64 val; char *nl; if (copy_from_user(write_buf, buf, size)) return -EFAULT; write_buf[size] = '\0'; /* Deal with any embedded newlines in the string */ nl = strchr(write_buf, '\n'); if (nl) { size = nl - write_buf; *nl = '\0'; } size = rpc_pton(net, write_buf, size, (struct sockaddr *)&sa, sizeof(sa)); if (size > 0) { val = op->set_clnt(&sa, size); if (val) pr_info("NFSD [%s]: Client %s had %llu state object(s)\n", op->file, write_buf, val); } else { val = simple_strtoll(write_buf, NULL, 0); if (val == 0) pr_info("NFSD Fault Injection: %s (all)", op->file); else pr_info("NFSD Fault Injection: %s (n = %llu)", op->file, val); val = op->set_val(val); pr_info("NFSD: %s: found %llu", op->file, val); } return len; /* on success, claim we got the whole input */ } static const struct file_operations fops_nfsd = { .owner = THIS_MODULE, .read = fault_inject_read, .write = fault_inject_write, }; void nfsd_fault_inject_cleanup(void) { debugfs_remove_recursive(debug_dir); } static struct nfsd_fault_inject_op inject_ops[] = { { .file = "forget_clients", .get = nfsd_inject_print_clients, .set_val = nfsd_inject_forget_clients, .set_clnt = nfsd_inject_forget_client, }, { .file = "forget_locks", .get = nfsd_inject_print_locks, .set_val = nfsd_inject_forget_locks, .set_clnt = nfsd_inject_forget_client_locks, }, { .file = "forget_openowners", .get = nfsd_inject_print_openowners, .set_val = nfsd_inject_forget_openowners, .set_clnt = nfsd_inject_forget_client_openowners, }, { .file = "forget_delegations", .get = nfsd_inject_print_delegations, .set_val = nfsd_inject_forget_delegations, .set_clnt = nfsd_inject_forget_client_delegations, }, { .file = "recall_delegations", .get = nfsd_inject_print_delegations, .set_val = nfsd_inject_recall_delegations, .set_clnt = nfsd_inject_recall_client_delegations, }, }; #define NUM_INJECT_OPS (sizeof(inject_ops)/sizeof(struct nfsd_fault_inject_op)) int nfsd_fault_inject_init(void) { unsigned int i; struct nfsd_fault_inject_op *op; umode_t mode = S_IFREG | S_IRUSR | S_IWUSR; debug_dir = debugfs_create_dir("nfsd", NULL); if (!debug_dir) goto fail; for (i = 0; i < NUM_INJECT_OPS; i++) { op = &inject_ops[i]; if (!debugfs_create_file(op->file, mode, debug_dir, op, &fops_nfsd)) goto fail; } return 0; fail: nfsd_fault_inject_cleanup(); return -ENOMEM; } tion>space:mode:
authorKinglong Mee <kinglongmee@gmail.com>2017-01-20 16:48:39 +0800
committerTrond Myklebust <trond.myklebust@primarydata.com>2017-01-24 15:29:24 -0500
commitc929ea0b910355e1876c64431f3d5802f95b3d75 (patch)
tree94339f18c2be5b9308b9f44ac8b450fe58bcc645 /net/can
parenta430607b2ef7c3be090f88c71cfcb1b3988aa7c0 (diff)
SUNRPC: cleanup ida information when removing sunrpc module
After removing sunrpc module, I get many kmemleak information as, unreferenced object 0xffff88003316b1e0 (size 544): comm "gssproxy", pid 2148, jiffies 4294794465 (age 4200.081s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffffb0cfb58a>] kmemleak_alloc+0x4a/0xa0 [<ffffffffb03507fe>] kmem_cache_alloc+0x15e/0x1f0 [<ffffffffb0639baa>] ida_pre_get+0xaa/0x150 [<ffffffffb0639cfd>] ida_simple_get+0xad/0x180 [<ffffffffc06054fb>] nlmsvc_lookup_host+0x4ab/0x7f0 [lockd] [<ffffffffc0605e1d>] lockd+0x4d/0x270 [lockd] [<ffffffffc06061e5>] param_set_timeout+0x55/0x100 [lockd] [<ffffffffc06cba24>] svc_defer+0x114/0x3f0 [sunrpc] [<ffffffffc06cbbe7>] svc_defer+0x2d7/0x3f0 [sunrpc] [<ffffffffc06c71da>] rpc_show_info+0x8a/0x110 [sunrpc] [<ffffffffb044a33f>] proc_reg_write+0x7f/0xc0 [<ffffffffb038e41f>] __vfs_write+0xdf/0x3c0 [<ffffffffb0390f1f>] vfs_write+0xef/0x240 [<ffffffffb0392fbd>] SyS_write+0xad/0x130 [<ffffffffb0d06c37>] entry_SYSCALL_64_fastpath+0x1a/0xa9 [<ffffffffffffffff>] 0xffffffffffffffff I found, the ida information (dynamic memory) isn't cleanup. Signed-off-by: Kinglong Mee <kinglongmee@gmail.com> Fixes: 2f048db4680a ("SUNRPC: Add an identifier for struct rpc_clnt") Cc: stable@vger.kernel.org # v3.12+ Signed-off-by: Trond Myklebust <trond.myklebust@primarydata.com>
Diffstat (limited to 'net/can')