Re: virNetClientPtr leak in remote driver

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



2011/8/1 Eric Blake <eblake@xxxxxxxxxx>:
> On 07/28/2011 12:07 PM, Matthias Bolte wrote:
>> 2011/7/27 Matthias Bolte <matthias.bolte@xxxxxxxxxxxxxx>:
>>> doRemoteClose doesn't free the virNetClientPtr and this creates a
>>> 260kb leak per remote connection. This happens because
>>> virNetClientFree doesn't remove the last ref, because virNetClientNew
>>> creates the virNetClientPtr with a refcount of 2.
>>>
>
>> The memory leak I saw was due to virsh calling
>> virEventRegisterDefaultImpl, but not calling virEventRunDefaultImpl.
>> Because the event loop is initialized, the call to
>> virNetSocketAddIOCallback in virNetClientNew succeeds. But virsh not
>> driving the event loop results in not removing callbacks that were
>> marked for deletion. Finally this leaks the virNetClientPtr using in
>> the remote driver. I used a virsh -c qemu:///system to test.
>>
>> I was able fix this by calling virEventRunDefaultImpl after
>> virConnectClose in virsh. But I don't think that this is the correct
>> general solution.
>
> Where do we stand with 0.9.4?  Is this something where we need the
> general fix before the release, or is just the virsh hack to call
> virEventRunDefaultImpl good enough for the release, or is this problem
> not severe enough and we can release as-is?

virsh is a bit special here as it registers/initializes the default
even loop but doesn't drive it properly. It only drives it for the
console command. That's the problem in virsh. This can be avoided by
calling virEventRunDefaultImpl after virConnectClose iff it's a remote
connection, in other cases virEventRunDefaultImpl might block.
Therefore, we shouldn't be calling it in general after a
virConnectClose in virsh.

If we assume that an application that registers an event loop will
drive it properly then this problem is not critical, as it doesn't
exist. Just virsh is a special case that leaks 260kb per closed remote
connection. When we assume that a typical virsh user uses a single
connection per virsh invocation then we can view this as a static
leak.

Therefore, I'd say we could just leave this as-is for 0.9.4, except
Dan would be back soon and the problem is easy to fix for him.

Another problem is the libvirtd crash that Wen discovered. That's more
serious, as a misbehaving client shouldn't be able to crash libvirtd.

https://www.redhat.com/archives/libvir-list/2011-August/msg00005.html

-- 
Matthias Bolte
http://photron.blogspot.com

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list



[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]