Hi,
While using kmemleak to check for memory leaks in a wireless driver, I noticed
the following stack traceback for a leak in btusb:
<ffffffff8160257e>] __alloc_skb+0x7e/0x2b0
[<ffffffffa06029d6>] btusb_recv_intr+0x136/0x180 [btusb]
[<ffffffffa0602ad8>] btusb_intr_complete+0xb8/0x150 [btusb]
[<ffffffff8156ccb2>] __usb_hcd_giveback_urb+0x72/0x120
To eliminate a false positive, I unloaded the driver and got the following for
the virtual address:
[<ffffffff8160257e>] __alloc_skb+0x7e/0x2b0
[<ffffffffa06029d6>] 0xffffffffa06029d6
[<ffffffffa0602ad8>] 0xffffffffa0602ad8
[<ffffffff8156ccb2>] __usb_hcd_giveback_urb+0x72/0x120
The source is from wireless-drivers-next.git with pulls from bluetooth-next.git
and Torvalds mainline git repo that were done on May 25. The source includes
commit 04b8c8143d46453a443ac32bfcd76ec952605765 with the subject "Bluetooth:
btusb: fix Realtek suspend/resume".
The Bluetooth device in use is made by Intel with USB ID 8087:07dc.
Thanks,
Larry
--
To unsubscribe from this list: send the line "unsubscribe linux-bluetooth" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html