[bug report] kmemleak observed after blktests block/001

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello

The kmemleak issue was easily triggered during blktests block/001 on
the latest linux-block/for-next,
please help check it and let me know if you need any info/test for it, thanks.


$ cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff888cc28666c0 (size 32):
  comm "modprobe", pid 11054, jiffies 4305180646
  hex dump (first 32 bytes):
    73 64 65 62 75 67 5f 71 75 65 75 65 64 5f 63 6d  sdebug_queued_cm
    64 00 a6 02 7d c0 f5 04 00 00 00 00 00 00 00 00  d...}...........
  backtrace (crc 6250ed84):
    [<ffffffffb378fa9b>] __kmalloc_node_track_caller_noprof+0x36b/0x440
    [<ffffffffb36513a6>] kstrdup+0x36/0x60
    [<ffffffffb5555d13>] kobject_set_name_vargs+0x43/0x120
    [<ffffffffb555639b>] kobject_init_and_add+0xdb/0x160
    [<ffffffffb378f6c4>] sysfs_slab_add+0x194/0x1f0
    [<ffffffffb3792286>] do_kmem_cache_create+0x256/0x2c0
    [<ffffffffb367436f>] __kmem_cache_create_args+0x20f/0x310
    [<ffffffffc36f45b8>] null_init+0x5a8/0xff0 [null_blk]
    [<ffffffffb2c03cec>] do_one_initcall+0x11c/0x5c0
    [<ffffffffb30da9e8>] do_init_module+0x238/0x790
    [<ffffffffb30de801>] init_module_from_file+0xd1/0x130
    [<ffffffffb30deaa0>] idempotent_init_module+0x230/0x770
    [<ffffffffb30df25e>] __x64_sys_finit_module+0xbe/0x130
    [<ffffffffb56bba12>] do_syscall_64+0x92/0x180
    [<ffffffffb580012f>] entry_SYSCALL_64_after_hwframe+0x76/0x7e
unreferenced object 0xffff888c82cf69c0 (size 32):
  comm "modprobe", pid 11104, jiffies 4305186132
  hex dump (first 32 bytes):
    73 64 65 62 75 67 5f 71 75 65 75 65 64 5f 63 6d  sdebug_queued_cm
    64 00 ef 42 3d 89 fa 04 40 68 1d 36 00 ea ff ff  d..B=...@h.6....
  backtrace (crc 46e1640c):
    [<ffffffffb378fa9b>] __kmalloc_node_track_caller_noprof+0x36b/0x440
    [<ffffffffb36513a6>] kstrdup+0x36/0x60
    [<ffffffffb5555d13>] kobject_set_name_vargs+0x43/0x120
    [<ffffffffb555639b>] kobject_init_and_add+0xdb/0x160
    [<ffffffffb378f6c4>] sysfs_slab_add+0x194/0x1f0
    [<ffffffffb3792286>] do_kmem_cache_create+0x256/0x2c0
    [<ffffffffb367436f>] __kmem_cache_create_args+0x20f/0x310
    [<ffffffffc36f65b8>] 0xffffffffc36f65b8
    [<ffffffffb2c03cec>] do_one_initcall+0x11c/0x5c0
    [<ffffffffb30da9e8>] do_init_module+0x238/0x790
    [<ffffffffb30de801>] init_module_from_file+0xd1/0x130
    [<ffffffffb30deaa0>] idempotent_init_module+0x230/0x770
    [<ffffffffb30df25e>] __x64_sys_finit_module+0xbe/0x130
    [<ffffffffb56bba12>] do_syscall_64+0x92/0x180
    [<ffffffffb580012f>] entry_SYSCALL_64_after_hwframe+0x76/0x7e
unreferenced object 0xffff888c49ee9700 (size 32):
  comm "modprobe", pid 12268, jiffies 4305219508
  hex dump (first 32 bytes):
    73 64 65 62 75 67 5f 71 75 65 75 65 64 5f 63 6d  sdebug_queued_cm
    64 00 ce 89 f6 a8 04 c4 00 00 00 00 00 00 00 00  d...............
  backtrace (crc 267cbe53):
    [<ffffffffb378fa9b>] __kmalloc_node_track_caller_noprof+0x36b/0x440
    [<ffffffffb36513a6>] kstrdup+0x36/0x60
    [<ffffffffb5555d13>] kobject_set_name_vargs+0x43/0x120
    [<ffffffffb555639b>] kobject_init_and_add+0xdb/0x160
    [<ffffffffb378f6c4>] sysfs_slab_add+0x194/0x1f0
    [<ffffffffb3792286>] do_kmem_cache_create+0x256/0x2c0
    [<ffffffffb367436f>] __kmem_cache_create_args+0x20f/0x310
    [<ffffffffc36f65b8>] 0xffffffffc36f65b8
    [<ffffffffb2c03cec>] do_one_initcall+0x11c/0x5c0
    [<ffffffffb30da9e8>] do_init_module+0x238/0x790
    [<ffffffffb30de801>] init_module_from_file+0xd1/0x130
    [<ffffffffb30deaa0>] idempotent_init_module+0x230/0x770
    [<ffffffffb30df25e>] __x64_sys_finit_module+0xbe/0x130
    [<ffffffffb56bba12>] do_syscall_64+0x92/0x180
    [<ffffffffb580012f>] entry_SYSCALL_64_after_hwframe+0x76/0x7e



--
Best Regards,
  Yi Zhang





[Index of Archives]     [Linux RAID]     [Linux SCSI]     [Linux ATA RAID]     [IDE]     [Linux Wireless]     [Linux Kernel]     [ATH6KL]     [Linux Bluetooth]     [Linux Netdev]     [Kernel Newbies]     [Security]     [Git]     [Netfilter]     [Bugtraq]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Device Mapper]

  Powered by Linux