From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail143.messagelabs.com (mail143.messagelabs.com [216.82.254.35]) by kanga.kvack.org (Postfix) with SMTP id 0BEA06B01AD for ; Fri, 4 Jun 2010 04:28:10 -0400 (EDT) Received: by vws13 with SMTP id 13so1485036vws.14 for ; Fri, 04 Jun 2010 01:28:07 -0700 (PDT) MIME-Version: 1.0 Date: Fri, 4 Jun 2010 16:27:54 +0800 Message-ID: Subject: mmotm 2010-06-03-16-36 lots of suspected kmemleak From: Dave Young Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org To: Andrew Morton , Linux Kernel Mailing List , linux-mm@kvack.org List-ID: Hi, With mmotm 2010-06-03-16-36, I gots tuns of kmemleaks [ 667.904928] kmemleak: 3179 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1270.774766] kmemleak: 24037 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1873.679754] kmemleak: 2256 new suspected memory leaks (see /sys/kernel/debug/kmemleak) unreferenced object 0xdf8f9700 (size 128): comm "swapper", pid 1, jiffies 4294877413 (age 1491.496s) hex dump (first 32 bytes): 00 00 00 e0 ff ff bf fe 40 df 99 df 00 02 00 00 ........@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] pci_acpi_scan_root+0x135/0x1cc [] acpi_pci_root_add+0x159/0x261 [] acpi_device_probe+0x44/0xfa [] driver_probe_device+0x108/0x22b [] __driver_attach+0x47/0x63 [] bus_for_each_dev+0x3d/0x67 [] driver_attach+0x14/0x16 [] bus_add_driver+0xc4/0x20f [] driver_register+0x8b/0xeb [] acpi_bus_register_driver+0x3a/0x3d [] acpi_pci_root_init+0x1b/0x2a [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 unreferenced object 0xdf99df40 (size 16): comm "swapper", pid 1, jiffies 4294877413 (age 1491.496s) hex dump (first 16 bytes): 50 43 49 20 42 75 73 20 30 30 30 30 3a 30 30 00 PCI Bus 0000:00. backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kasprintf+0x11/0x13 [] pci_acpi_scan_root+0x151/0x1cc [] acpi_pci_root_add+0x159/0x261 [] acpi_device_probe+0x44/0xfa [] driver_probe_device+0x108/0x22b [] __driver_attach+0x47/0x63 [] bus_for_each_dev+0x3d/0x67 [] driver_attach+0x14/0x16 [] bus_add_driver+0xc4/0x20f [] driver_register+0x8b/0xeb [] acpi_bus_register_driver+0x3a/0x3d [] acpi_pci_root_init+0x1b/0x2a [] do_one_initcall+0x4c/0x13f unreferenced object 0xdfa7d800 (size 2048): comm "swapper", pid 1, jiffies 4294877624 (age 1490.796s) hex dump (first 32 bytes): 00 75 ff ff f4 ff ff ff f4 ff ff ff f4 ff ff ff .u.............. f4 ff ff ff c4 ff ff ff c4 ff ff ff f4 ff ff ff ................ backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kzalloc+0xb/0xd [] pcpu_mem_alloc+0x18/0x35 [] pcpu_extend_area_map+0x1c/0xaa [] pcpu_alloc+0x188/0x735 [] __alloc_percpu+0xa/0xf [] __percpu_counter_init+0x42/0x92 [] bdi_init+0x114/0x15f [] blk_alloc_queue_node+0x60/0x167 [] blk_alloc_queue+0xb/0xd [] loop_alloc+0x6c/0x149 [] loop_init+0x83/0x16c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 unreferenced object 0xdf24e9d8 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.670s) hex dump (first 8 bytes): 30 00 24 df 00 00 00 00 0.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdf24e9e8 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.670s) hex dump (first 8 bytes): 31 00 24 df 00 00 00 00 1.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdf24e9f8 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.673s) hex dump (first 8 bytes): 32 00 24 df 00 00 00 00 2.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdf24ea08 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.673s) hex dump (first 8 bytes): 33 00 24 df 00 00 00 00 3.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdf24ea18 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.673s) hex dump (first 8 bytes): 34 00 24 df 00 00 00 00 4.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdf24ea28 (size 8): comm "swapper", pid 1, jiffies 4294878263 (age 1488.673s) hex dump (first 8 bytes): 35 00 24 df 00 00 00 00 5.$..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] __kmalloc+0x147/0x16b [] kvasprintf+0x28/0x45 [] kobject_set_name_vargs+0x21/0x50 [] kobject_add_varg+0x18/0x41 [] kobject_add+0x43/0x49 [] add_sysfs_fw_map_entry+0x56/0x6f [] memmap_init+0x12/0x2c [] do_one_initcall+0x4c/0x13f [] kernel_init+0x132/0x1b3 [] kernel_thread_helper+0x6/0x10 [] 0xffffffff unreferenced object 0xdec4e0c0 (size 44): comm "init", pid 1, jiffies 4294878357 (age 1488.363s) hex dump (first 32 bytes): 02 02 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 30 e0 c4 de ........<}c.0... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_fork+0x31/0x88 [] dup_mm+0x1d3/0x38f [] copy_process+0x8ce/0xf39 [] do_fork+0x118/0x295 [] sys_clone+0x1f/0x24 [] ptregs_clone+0x15/0x24 [] 0xffffffff unreferenced object 0xdec4e240 (size 44): comm "init", pid 768, jiffies 4294878359 (age 1488.356s) hex dump (first 32 bytes): fc fc 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 40 e2 c4 de ........<}c.@... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_prepare+0x72/0x12e [] handle_mm_fault+0x153/0x60d [] __get_user_pages+0x1c7/0x2c6 [] get_user_pages+0x39/0x41 [] get_arg_page+0x33/0x83 [] copy_strings+0xc8/0x165 [] copy_strings_kernel+0x1c/0x2b [] do_execve+0x14d/0x257 [] sys_execve+0x2b/0x53 [] ptregs_execve+0x12/0x18 [] 0xffffffff unreferenced object 0xdec4e210 (size 44): comm "rc.S", pid 768, jiffies 4294878359 (age 1488.356s) hex dump (first 32 bytes): eb eb 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 10 e2 c4 de ........<}c..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_prepare+0x72/0x12e [] __do_fault+0x73/0x307 [] handle_mm_fault+0x29c/0x60d [] do_page_fault+0x2ee/0x304 [] error_code+0x6b/0x70 [] load_elf_binary+0x6d7/0x111c [] search_binary_handler+0x9e/0x20c [] load_script+0x177/0x188 [] search_binary_handler+0x9e/0x20c [] do_execve+0x1a7/0x257 [] sys_execve+0x2b/0x53 [] ptregs_execve+0x12/0x18 [] 0xffffffff unreferenced object 0xdec4e1e0 (size 44): comm "rc.S", pid 768, jiffies 4294878360 (age 1488.353s) hex dump (first 32 bytes): e5 e5 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 e0 e1 c4 de ........<}c..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_prepare+0x72/0x12e [] __do_fault+0x73/0x307 [] handle_mm_fault+0x29c/0x60d [] do_page_fault+0x2ee/0x304 [] error_code+0x6b/0x70 [] load_elf_binary+0x996/0x111c [] search_binary_handler+0x9e/0x20c [] load_script+0x177/0x188 [] search_binary_handler+0x9e/0x20c [] do_execve+0x1a7/0x257 [] sys_execve+0x2b/0x53 [] ptregs_execve+0x12/0x18 [] 0xffffffff unreferenced object 0xdec4e1b0 (size 44): comm "rc.S", pid 768, jiffies 4294878360 (age 1488.356s) hex dump (first 32 bytes): fe fe 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 b0 e1 c4 de ........<}c..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_prepare+0x72/0x12e [] handle_mm_fault+0x153/0x60d [] do_page_fault+0x2ee/0x304 [] error_code+0x6b/0x70 [] 0xffffffff unreferenced object 0xdec4e180 (size 44): comm "rc.S", pid 768, jiffies 4294878360 (age 1488.356s) hex dump (first 32 bytes): fe fe 00 00 ad 4e ad de ff ff ff ff ff ff ff ff .....N.......... 98 c2 d8 c1 00 00 00 00 3c 7d 63 c1 80 e1 c4 de ........<}c..... backtrace: [] kmemleak_alloc+0x4a/0x83 [] kmem_cache_alloc+0xde/0x12a [] anon_vma_prepare+0x72/0x12e [] __do_fault+0x73/0x307 [] handle_mm_fault+0x29c/0x60d [] do_page_fault+0x2ee/0x304 [] error_code+0x6b/0x70 [] 0xffffffff [snip similar vma issue .....] -- Regards dave -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org