> On Jun 23, 2019, at 3:32 AM, Ido Schimmel <idosch@xxxxxxxxxx> wrote: > > On Fri, Jun 21, 2019 at 05:58:48PM -0400, Chuck Lever wrote: >> For unrelated reasons I've enabled kmemleak in my client's kernel. >> While running xfstests, I get these reports on several of the tests. >> I've seen them on a few recent kernels as well. >> >> They do not look related to NFS. Anyone know where I should report >> this? > > Most likely fixed by: > https://patchwork.kernel.org/patch/11006849/ > > See this report: > https://lore.kernel.org/linux-nfs/20190614185237.GA550@splinter/#t Confirmed that this patch (now in v5.2-rc6) addresses the prepare_creds leak. Thanks, Ido. >> [cel@manet ~]$ cat src/xfstests/results/generic/013.kmemleak >> EXPERIMENTAL kmemleak reported some memory leaks! Due to the way kmemleak >> works, the leak might be from an earlier test, or something totally unrelated. >> unreferenced object 0xffff88886963c4c0 (size 168): >> comm "mount", pid 3471, jiffies 4296003082 (age 161.789s) >> hex dump (first 32 bytes): >> 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >> backtrace: >> [<00000000fd30522a>] kmem_cache_alloc+0xc4/0x1cb >> [<0000000008f8eac6>] prepare_creds+0x21/0xc7 >> [<000000006e9e3064>] prepare_exec_creds+0xb/0x3a >> [<000000001b408d7e>] __do_execve_file.isra.31+0x103/0x818 >> [<000000004096f0a3>] do_execve+0x25/0x29 >> [<0000000008a9aa1c>] __x64_sys_execve+0x26/0x2b >> [<00000000599d3d33>] do_syscall_64+0x5a/0x68 >> [<00000000005d29f3>] entry_SYSCALL_64_after_hwframe+0x49/0xbe >> unreferenced object 0xffff888867a4f708 (size 32): >> comm "mount", pid 3471, jiffies 4296003082 (age 161.789s) >> hex dump (first 32 bytes): >> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ >> backtrace: >> [<000000004c53b46c>] __kmalloc+0xfc/0x14a >> [<000000002ff13bd8>] lsm_cred_alloc.isra.5+0x24/0x32 >> [<000000009eb979ec>] security_prepare_creds+0x21/0x61 >> [<0000000086789f15>] prepare_creds+0xb3/0xc7 >> [<000000006e9e3064>] prepare_exec_creds+0xb/0x3a >> [<000000001b408d7e>] __do_execve_file.isra.31+0x103/0x818 >> [<000000004096f0a3>] do_execve+0x25/0x29 >> [<0000000008a9aa1c>] __x64_sys_execve+0x26/0x2b >> [<00000000599d3d33>] do_syscall_64+0x5a/0x68 >> [<00000000005d29f3>] entry_SYSCALL_64_after_hwframe+0x49/0xbe >> [cel@manet ~]$ >> >> -- >> Chuck Lever >> >> >> -- Chuck Lever