lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 15 Oct 2009 11:27:34 +0800 From: Peter Teoh <htmldeveloper@...il.com> To: LKML <linux-kernel@...r.kernel.org> Subject: kmemleak errors cat /sys/kernel/debug/kmemleak gave: unreferenced object 0xffff8800bd864000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 70 40 86 bd 00 88 ff ff ........p@...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 40 86 bd 00 88 ff ff e0 40 86 bd 00 88 ff ff .@.......@...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8640e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 40 86 bd 00 88 ff ff 50 41 86 bd 00 88 ff ff p@......PA...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 40 86 bd 00 88 ff ff c0 41 86 bd 00 88 ff ff .@.......A...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8641c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 41 86 bd 00 88 ff ff 30 42 86 bd 00 88 ff ff PA......0B...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 41 86 bd 00 88 ff ff a0 42 86 bd 00 88 ff ff .A.......B...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8642a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 42 86 bd 00 88 ff ff 10 43 86 bd 00 88 ff ff 0B.......C...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 42 86 bd 00 88 ff ff 80 43 86 bd 00 88 ff ff .B.......C...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 43 86 bd 00 88 ff ff f0 43 86 bd 00 88 ff ff .C.......C...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8643f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 43 86 bd 00 88 ff ff 60 44 86 bd 00 88 ff ff .C......`D...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 43 86 bd 00 88 ff ff d0 44 86 bd 00 88 ff ff .C.......D...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8644d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 44 86 bd 00 88 ff ff 40 45 86 bd 00 88 ff ff `D......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 44 86 bd 00 88 ff ff b0 45 86 bd 00 88 ff ff .D.......E...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8645b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 45 86 bd 00 88 ff ff 20 46 86 bd 00 88 ff ff @E...... F...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 45 86 bd 00 88 ff ff 90 46 86 bd 00 88 ff ff .E.......F...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 46 86 bd 00 88 ff ff 00 47 86 bd 00 88 ff ff F.......G...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 46 86 bd 00 88 ff ff 70 47 86 bd 00 88 ff ff .F......pG...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 47 86 bd 00 88 ff ff e0 47 86 bd 00 88 ff ff .G.......G...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8647e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 47 86 bd 00 88 ff ff 50 48 86 bd 00 88 ff ff pG......PH...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 47 86 bd 00 88 ff ff c0 48 86 bd 00 88 ff ff .G.......H...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8648c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 48 86 bd 00 88 ff ff 30 49 86 bd 00 88 ff ff PH......0I...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 48 86 bd 00 88 ff ff a0 49 86 bd 00 88 ff ff .H.......I...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8649a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 49 86 bd 00 88 ff ff 10 4a 86 bd 00 88 ff ff 0I.......J...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864a10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 49 86 bd 00 88 ff ff 80 4a 86 bd 00 88 ff ff .I.......J...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864a80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 4a 86 bd 00 88 ff ff f0 4a 86 bd 00 88 ff ff .J.......J...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864af0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 4a 86 bd 00 88 ff ff 60 4b 86 bd 00 88 ff ff .J......`K...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864b60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 4a 86 bd 00 88 ff ff d0 4b 86 bd 00 88 ff ff .J.......K...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864bd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 4b 86 bd 00 88 ff ff 40 4c 86 bd 00 88 ff ff `K......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864c40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 4b 86 bd 00 88 ff ff b0 4c 86 bd 00 88 ff ff .K.......L...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864cb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 4c 86 bd 00 88 ff ff 20 4d 86 bd 00 88 ff ff @L...... M...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864d20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 4c 86 bd 00 88 ff ff 90 4d 86 bd 00 88 ff ff .L.......M...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864d90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 4d 86 bd 00 88 ff ff 00 4e 86 bd 00 88 ff ff M.......N...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864e00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 4d 86 bd 00 88 ff ff 70 4e 86 bd 00 88 ff ff .M......pN...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864e70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 4e 86 bd 00 88 ff ff e0 4e 86 bd 00 88 ff ff .N.......N...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864ee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 4e 86 bd 00 88 ff ff 50 4f 86 bd 00 88 ff ff pN......PO...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd864f50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 4e 86 bd 00 88 ff ff 00 50 86 bd 00 88 ff ff .N.......P...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 4f 86 bd 00 88 ff ff 70 50 86 bd 00 88 ff ff PO......pP...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 50 86 bd 00 88 ff ff e0 50 86 bd 00 88 ff ff .P.......P...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8650e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 50 86 bd 00 88 ff ff 50 51 86 bd 00 88 ff ff pP......PQ...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 50 86 bd 00 88 ff ff c0 51 86 bd 00 88 ff ff .P.......Q...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8651c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 51 86 bd 00 88 ff ff 30 52 86 bd 00 88 ff ff PQ......0R...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 51 86 bd 00 88 ff ff a0 52 86 bd 00 88 ff ff .Q.......R...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8652a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 52 86 bd 00 88 ff ff 10 53 86 bd 00 88 ff ff 0R.......S...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 52 86 bd 00 88 ff ff 80 53 86 bd 00 88 ff ff .R.......S...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 53 86 bd 00 88 ff ff f0 53 86 bd 00 88 ff ff .S.......S...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8653f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 53 86 bd 00 88 ff ff 60 54 86 bd 00 88 ff ff .S......`T...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 53 86 bd 00 88 ff ff d0 54 86 bd 00 88 ff ff .S.......T...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8654d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 54 86 bd 00 88 ff ff 40 55 86 bd 00 88 ff ff `T......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 54 86 bd 00 88 ff ff b0 55 86 bd 00 88 ff ff .T.......U...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8655b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 55 86 bd 00 88 ff ff 20 56 86 bd 00 88 ff ff @U...... V...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 55 86 bd 00 88 ff ff 90 56 86 bd 00 88 ff ff .U.......V...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 56 86 bd 00 88 ff ff 00 57 86 bd 00 88 ff ff V.......W...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 56 86 bd 00 88 ff ff 70 57 86 bd 00 88 ff ff .V......pW...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 57 86 bd 00 88 ff ff e0 57 86 bd 00 88 ff ff .W.......W...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8657e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 57 86 bd 00 88 ff ff 50 58 86 bd 00 88 ff ff pW......PX...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 57 86 bd 00 88 ff ff c0 58 86 bd 00 88 ff ff .W.......X...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8658c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 58 86 bd 00 88 ff ff 30 59 86 bd 00 88 ff ff PX......0Y...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 58 86 bd 00 88 ff ff a0 59 86 bd 00 88 ff ff .X.......Y...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8659a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 59 86 bd 00 88 ff ff 10 5a 86 bd 00 88 ff ff 0Y.......Z...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865a10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 59 86 bd 00 88 ff ff 80 5a 86 bd 00 88 ff ff .Y.......Z...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865a80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 5a 86 bd 00 88 ff ff f0 5a 86 bd 00 88 ff ff .Z.......Z...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865af0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 5a 86 bd 00 88 ff ff 60 5b 86 bd 00 88 ff ff .Z......`[...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865b60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 5a 86 bd 00 88 ff ff d0 5b 86 bd 00 88 ff ff .Z.......[...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865bd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 5b 86 bd 00 88 ff ff 40 5c 86 bd 00 88 ff ff `[......@\...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865c40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 5b 86 bd 00 88 ff ff b0 5c 86 bd 00 88 ff ff .[.......\...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865cb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 5c 86 bd 00 88 ff ff 20 5d 86 bd 00 88 ff ff @\...... ]...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865d20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 5c 86 bd 00 88 ff ff 90 5d 86 bd 00 88 ff ff .\.......]...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865d90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 5d 86 bd 00 88 ff ff 00 5e 86 bd 00 88 ff ff ].......^...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865e00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 5d 86 bd 00 88 ff ff 70 5e 86 bd 00 88 ff ff .]......p^...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865e70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 5e 86 bd 00 88 ff ff e0 5e 86 bd 00 88 ff ff .^.......^...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865ee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 5e 86 bd 00 88 ff ff 50 5f 86 bd 00 88 ff ff p^......P_...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd865f50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 5e 86 bd 00 88 ff ff 00 e0 86 bd 00 88 ff ff .^.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 5f 86 bd 00 88 ff ff 70 e0 86 bd 00 88 ff ff P_......p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 e0 86 bd 00 88 ff ff e0 e0 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e0e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 e0 86 bd 00 88 ff ff 50 e1 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 e0 86 bd 00 88 ff ff c0 e1 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e1c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 e1 86 bd 00 88 ff ff 30 e2 86 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 e1 86 bd 00 88 ff ff a0 e2 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e2a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 e2 86 bd 00 88 ff ff 10 e3 86 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 e2 86 bd 00 88 ff ff 80 e3 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 e3 86 bd 00 88 ff ff f0 e3 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e3f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 e3 86 bd 00 88 ff ff 60 e4 86 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 e3 86 bd 00 88 ff ff d0 e4 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e4d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 e4 86 bd 00 88 ff ff 40 e5 86 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 e4 86 bd 00 88 ff ff b0 e5 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e5b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 e5 86 bd 00 88 ff ff 20 e6 86 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 e5 86 bd 00 88 ff ff 90 e6 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 e6 86 bd 00 88 ff ff 00 e7 86 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 e6 86 bd 00 88 ff ff 70 e7 86 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 e7 86 bd 00 88 ff ff e0 e7 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e7e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 e7 86 bd 00 88 ff ff 50 e8 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 e7 86 bd 00 88 ff ff c0 e8 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e8c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 e8 86 bd 00 88 ff ff 30 e9 86 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 e8 86 bd 00 88 ff ff a0 e9 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86e9a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 e9 86 bd 00 88 ff ff 10 ea 86 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ea10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 e9 86 bd 00 88 ff ff 80 ea 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ea80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 ea 86 bd 00 88 ff ff f0 ea 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86eaf0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 ea 86 bd 00 88 ff ff 60 eb 86 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86eb60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 ea 86 bd 00 88 ff ff d0 eb 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ebd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 eb 86 bd 00 88 ff ff 40 ec 86 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ec40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 eb 86 bd 00 88 ff ff b0 ec 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ecb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 ec 86 bd 00 88 ff ff 20 ed 86 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ed20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 ec 86 bd 00 88 ff ff 90 ed 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ed90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 ed 86 bd 00 88 ff ff 00 ee 86 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ee00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 ed 86 bd 00 88 ff ff 70 ee 86 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ee70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 ee 86 bd 00 88 ff ff e0 ee 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86eee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 ee 86 bd 00 88 ff ff 50 ef 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ef50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 ee 86 bd 00 88 ff ff 00 f0 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 ef 86 bd 00 88 ff ff 70 f0 86 bd 00 88 ff ff P.......p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 f0 86 bd 00 88 ff ff e0 f0 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f0e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 f0 86 bd 00 88 ff ff 50 f1 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 f0 86 bd 00 88 ff ff c0 f1 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f1c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 f1 86 bd 00 88 ff ff 30 f2 86 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 f1 86 bd 00 88 ff ff a0 f2 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f2a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 f2 86 bd 00 88 ff ff 10 f3 86 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 f2 86 bd 00 88 ff ff 80 f3 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 f3 86 bd 00 88 ff ff f0 f3 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f3f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 f3 86 bd 00 88 ff ff 60 f4 86 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 f3 86 bd 00 88 ff ff d0 f4 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f4d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 f4 86 bd 00 88 ff ff 40 f5 86 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 f4 86 bd 00 88 ff ff b0 f5 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f5b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 f5 86 bd 00 88 ff ff 20 f6 86 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 f5 86 bd 00 88 ff ff 90 f6 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 f6 86 bd 00 88 ff ff 00 f7 86 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 f6 86 bd 00 88 ff ff 70 f7 86 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 f7 86 bd 00 88 ff ff e0 f7 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f7e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 f7 86 bd 00 88 ff ff 50 f8 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 f7 86 bd 00 88 ff ff c0 f8 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f8c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 f8 86 bd 00 88 ff ff 30 f9 86 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 f8 86 bd 00 88 ff ff a0 f9 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86f9a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 f9 86 bd 00 88 ff ff 10 fa 86 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fa10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 f9 86 bd 00 88 ff ff 80 fa 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fa80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 fa 86 bd 00 88 ff ff f0 fa 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86faf0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 fa 86 bd 00 88 ff ff 60 fb 86 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fb60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 fa 86 bd 00 88 ff ff d0 fb 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fbd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 fb 86 bd 00 88 ff ff 40 fc 86 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fc40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 fb 86 bd 00 88 ff ff b0 fc 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fcb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 fc 86 bd 00 88 ff ff 20 fd 86 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fd20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 fc 86 bd 00 88 ff ff 90 fd 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fd90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 fd 86 bd 00 88 ff ff 00 fe 86 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fe00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 fd 86 bd 00 88 ff ff 70 fe 86 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fe70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 fe 86 bd 00 88 ff ff e0 fe 86 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86fee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 fe 86 bd 00 88 ff ff 50 ff 86 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd86ff50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 fe 86 bd 00 88 ff ff 00 80 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 ff 86 bd 00 88 ff ff 70 80 87 bd 00 88 ff ff P.......p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 80 87 bd 00 88 ff ff e0 80 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8780e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 80 87 bd 00 88 ff ff 50 81 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 80 87 bd 00 88 ff ff c0 81 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8781c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 81 87 bd 00 88 ff ff 30 82 87 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 81 87 bd 00 88 ff ff a0 82 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8782a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 82 87 bd 00 88 ff ff 10 83 87 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 82 87 bd 00 88 ff ff 80 83 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 83 87 bd 00 88 ff ff f0 83 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8783f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 83 87 bd 00 88 ff ff 60 84 87 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 83 87 bd 00 88 ff ff d0 84 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8784d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 84 87 bd 00 88 ff ff 40 85 87 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 84 87 bd 00 88 ff ff b0 85 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8785b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 85 87 bd 00 88 ff ff 20 86 87 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 85 87 bd 00 88 ff ff 90 86 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 86 87 bd 00 88 ff ff 00 87 87 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 86 87 bd 00 88 ff ff 70 87 87 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 87 87 bd 00 88 ff ff e0 87 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8787e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 87 87 bd 00 88 ff ff 50 88 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 87 87 bd 00 88 ff ff c0 88 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8788c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 88 87 bd 00 88 ff ff 30 89 87 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 88 87 bd 00 88 ff ff a0 89 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8789a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 89 87 bd 00 88 ff ff 10 8a 87 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878a10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 89 87 bd 00 88 ff ff 80 8a 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878a80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 8a 87 bd 00 88 ff ff f0 8a 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878af0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 8a 87 bd 00 88 ff ff 60 8b 87 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878b60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 8a 87 bd 00 88 ff ff d0 8b 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878bd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 8b 87 bd 00 88 ff ff 40 8c 87 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878c40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 8b 87 bd 00 88 ff ff b0 8c 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878cb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 8c 87 bd 00 88 ff ff 20 8d 87 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878d20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 8c 87 bd 00 88 ff ff 90 8d 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878d90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 8d 87 bd 00 88 ff ff 00 8e 87 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878e00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 8d 87 bd 00 88 ff ff 70 8e 87 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878e70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 8e 87 bd 00 88 ff ff e0 8e 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878ee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 8e 87 bd 00 88 ff ff 50 8f 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd878f50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 8e 87 bd 00 88 ff ff 00 90 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 8f 87 bd 00 88 ff ff 70 90 87 bd 00 88 ff ff P.......p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 90 87 bd 00 88 ff ff e0 90 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8790e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 90 87 bd 00 88 ff ff 50 91 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 90 87 bd 00 88 ff ff c0 91 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8791c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 91 87 bd 00 88 ff ff 30 92 87 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 91 87 bd 00 88 ff ff a0 92 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8792a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 92 87 bd 00 88 ff ff 10 93 87 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 92 87 bd 00 88 ff ff 80 93 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 93 87 bd 00 88 ff ff f0 93 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8793f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 93 87 bd 00 88 ff ff 60 94 87 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 93 87 bd 00 88 ff ff d0 94 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8794d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 94 87 bd 00 88 ff ff 40 95 87 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 94 87 bd 00 88 ff ff b0 95 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8795b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 95 87 bd 00 88 ff ff 20 96 87 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 95 87 bd 00 88 ff ff 90 96 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 96 87 bd 00 88 ff ff 00 97 87 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 96 87 bd 00 88 ff ff 70 97 87 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 97 87 bd 00 88 ff ff e0 97 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8797e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 97 87 bd 00 88 ff ff 50 98 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 97 87 bd 00 88 ff ff c0 98 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8798c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 98 87 bd 00 88 ff ff 30 99 87 bd 00 88 ff ff P.......0....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 98 87 bd 00 88 ff ff a0 99 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8799a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 99 87 bd 00 88 ff ff 10 9a 87 bd 00 88 ff ff 0............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879a10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 99 87 bd 00 88 ff ff 80 9a 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879a80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 9a 87 bd 00 88 ff ff f0 9a 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879af0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 9a 87 bd 00 88 ff ff 60 9b 87 bd 00 88 ff ff ........`....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879b60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 9a 87 bd 00 88 ff ff d0 9b 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879bd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 9b 87 bd 00 88 ff ff 40 9c 87 bd 00 88 ff ff `.......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879c40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 9b 87 bd 00 88 ff ff b0 9c 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879cb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 9c 87 bd 00 88 ff ff 20 9d 87 bd 00 88 ff ff @....... ....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879d20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 9c 87 bd 00 88 ff ff 90 9d 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879d90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 9d 87 bd 00 88 ff ff 00 9e 87 bd 00 88 ff ff ............... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879e00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 9d 87 bd 00 88 ff ff 70 9e 87 bd 00 88 ff ff ........p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879e70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 9e 87 bd 00 88 ff ff e0 9e 87 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879ee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 9e 87 bd 00 88 ff ff 50 9f 87 bd 00 88 ff ff p.......P....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd879f50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 9e 87 bd 00 88 ff ff 00 20 88 bd 00 88 ff ff ......... ...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 9f 87 bd 00 88 ff ff 70 20 88 bd 00 88 ff ff P.......p ...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 20 88 bd 00 88 ff ff e0 20 88 bd 00 88 ff ff . ....... ...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8820e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 20 88 bd 00 88 ff ff 50 21 88 bd 00 88 ff ff p ......P!...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882150 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 20 88 bd 00 88 ff ff c0 21 88 bd 00 88 ff ff . .......!...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8821c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 21 88 bd 00 88 ff ff 30 22 88 bd 00 88 ff ff P!......0"...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882230 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 21 88 bd 00 88 ff ff a0 22 88 bd 00 88 ff ff .!......."...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8822a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 22 88 bd 00 88 ff ff 10 23 88 bd 00 88 ff ff 0".......#...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882310 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 22 88 bd 00 88 ff ff 80 23 88 bd 00 88 ff ff .".......#...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882380 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 23 88 bd 00 88 ff ff f0 23 88 bd 00 88 ff ff .#.......#...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8823f0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 23 88 bd 00 88 ff ff 60 24 88 bd 00 88 ff ff .#......`$...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882460 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 23 88 bd 00 88 ff ff d0 24 88 bd 00 88 ff ff .#.......$...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8824d0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 24 88 bd 00 88 ff ff 40 25 88 bd 00 88 ff ff `$......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882540 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 24 88 bd 00 88 ff ff b0 25 88 bd 00 88 ff ff .$.......%...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8825b0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 25 88 bd 00 88 ff ff 20 26 88 bd 00 88 ff ff @%...... &...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882620 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 25 88 bd 00 88 ff ff 90 26 88 bd 00 88 ff ff .%.......&...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882690 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 26 88 bd 00 88 ff ff 00 27 88 bd 00 88 ff ff &.......'...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882700 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 26 88 bd 00 88 ff ff 70 27 88 bd 00 88 ff ff .&......p'...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882770 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 27 88 bd 00 88 ff ff e0 27 88 bd 00 88 ff ff .'.......'...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8827e0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 27 88 bd 00 88 ff ff 50 28 88 bd 00 88 ff ff p'......P(...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882850 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 27 88 bd 00 88 ff ff c0 28 88 bd 00 88 ff ff .'.......(...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8828c0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 28 88 bd 00 88 ff ff 30 29 88 bd 00 88 ff ff P(......0)...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882930 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): c0 28 88 bd 00 88 ff ff a0 29 88 bd 00 88 ff ff .(.......)...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8829a0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 30 29 88 bd 00 88 ff ff 10 2a 88 bd 00 88 ff ff 0).......*...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882a10 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): a0 29 88 bd 00 88 ff ff 80 2a 88 bd 00 88 ff ff .).......*...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882a80 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 10 2a 88 bd 00 88 ff ff f0 2a 88 bd 00 88 ff ff .*.......*...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882af0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 80 2a 88 bd 00 88 ff ff 60 2b 88 bd 00 88 ff ff .*......`+...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882b60 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): f0 2a 88 bd 00 88 ff ff d0 2b 88 bd 00 88 ff ff .*.......+...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882bd0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 60 2b 88 bd 00 88 ff ff 40 2c 88 bd 00 88 ff ff `+......@,...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882c40 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): d0 2b 88 bd 00 88 ff ff b0 2c 88 bd 00 88 ff ff .+.......,...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882cb0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 40 2c 88 bd 00 88 ff ff 20 2d 88 bd 00 88 ff ff @,...... -...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882d20 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): b0 2c 88 bd 00 88 ff ff 90 2d 88 bd 00 88 ff ff .,.......-...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882d90 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 20 2d 88 bd 00 88 ff ff 00 2e 88 bd 00 88 ff ff -.............. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882e00 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 90 2d 88 bd 00 88 ff ff 70 2e 88 bd 00 88 ff ff .-......p....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882e70 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 2e 88 bd 00 88 ff ff e0 2e 88 bd 00 88 ff ff ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882ee0 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 70 2e 88 bd 00 88 ff ff 50 2f 88 bd 00 88 ff ff p.......P/...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd882f50 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): e0 2e 88 bd 00 88 ff ff 00 30 88 bd 00 88 ff ff .........0...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd883000 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 50 2f 88 bd 00 88 ff ff 70 30 88 bd 00 88 ff ff P/......p0...... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd883070 (size 40): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 30 88 bd 00 88 ff ff 40 05 50 a3 00 88 ff ff .0......@....... 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234 [<ffffffff82afef26>] start_kernel+0x356/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bd8010c8 (size 128): comm "swapper", pid 0, jiffies 4294937296 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ d8 10 80 bd 00 88 ff ff d8 10 80 bd 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff811548c2>] kmem_cache_alloc_node_notrace+0xfd/0x134 [<ffffffff81f74f68>] process_zones+0x70/0x1a9 [<ffffffff82b1ecc8>] setup_per_cpu_pageset+0x24/0x4e [<ffffffff82afef30>] start_kernel+0x360/0x414 [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4 [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bccf73e8 (size 128): comm "swapper", pid 1, jiffies 4294937325 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ f8 73 cf bc 00 88 ff ff f8 73 cf bc 00 88 ff ff .s.......s...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff811548c2>] kmem_cache_alloc_node_notrace+0xfd/0x134 [<ffffffff81f74f68>] process_zones+0x70/0x1a9 [<ffffffff81f750e8>] pageset_cpuup_callback+0x47/0xbb [<ffffffff81f7c154>] notifier_call_chain+0x72/0xba [<ffffffff810ad590>] __raw_notifier_call_chain+0x21/0x37 [<ffffffff81f73bee>] _cpu_up+0x96/0x16e [<ffffffff81f73d47>] cpu_up+0x81/0xac [<ffffffff82afe810>] kernel_init+0xf4/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bcf90bd0 (size 72): comm "swapper", pid 1, jiffies 4294937436 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00 ................ 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff81572c8e>] acpi_ut_allocate_object_desc_dbg+0x6d/0x138 [<ffffffff81572e13>] acpi_ut_create_internal_object_dbg+0x66/0x142 [<ffffffff8155126f>] acpi_ex_read_data_from_field+0x1db/0x328 [<ffffffff8155b398>] acpi_ex_resolve_node_to_value+0x334/0x46c [<ffffffff8155249d>] acpi_ex_resolve_to_value+0x384/0x427 [<ffffffff81546beb>] acpi_ds_evaluate_name_path+0xb4/0x171 [<ffffffff8154450e>] acpi_ds_exec_end_op+0xf5/0x677 [<ffffffff81567bc0>] acpi_ps_parse_loop+0xc80/0xf58 [<ffffffff81566403>] acpi_ps_parse_aml+0x17c/0x4a7 [<ffffffff81568c1b>] acpi_ps_execute_method+0x2af/0x40c [<ffffffff815609a6>] acpi_ns_evaluate+0x24a/0x3e1 [<ffffffff81560cac>] acpi_ns_exec_module_code_list+0x16f/0x273 [<ffffffff815703d2>] acpi_initialize_objects+0xa1/0x1b2 [<ffffffff82b3395d>] acpi_init+0xa3/0x288 unreferenced object 0xffff8800bcbb9d68 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 10 32 b5 bc 00 88 ff ff 70 1e 50 bc 00 88 ff ff .2......p.P..... 58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1.............. backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bcb45630 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 70 4e b8 bc 00 88 ff ff c0 92 96 83 ff ff ff ff pN.............. 80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bcbaae70 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 08 61 bb bc 00 88 ff ff 40 51 96 83 ff ff ff ff .a......@....... 80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bc40c840 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 38 27 b5 bc 00 88 ff ff 58 eb 82 bc 00 88 ff ff 8'......X....... 58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1.............. backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bc422738 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 10 82 bb bc 00 88 ff ff 18 23 b5 bc 00 88 ff ff .........#...... 58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1.............. backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bcb7a528 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 40 9b 96 83 ff ff ff ff 20 b4 ba bc 00 88 ff ff @....... ....... 80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bc4fe738 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): c0 30 95 83 ff ff ff ff c0 30 95 83 ff ff ff ff .0.......0...... 80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bc4ffb58 (size 192): comm "swapper", pid 1, jiffies 4294937726 hex dump (first 32 bytes): 50 2a 50 bc 00 88 ff ff 40 87 95 83 ff ff ff ff P*P.....@....... 80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81156362>] __kmalloc+0x185/0x1c2 [<ffffffff814bb3bf>] kzalloc+0x22/0x38 [<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3 [<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800bcfc9000 (size 216): comm "swapper", pid 1, jiffies 4294938848 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff811549fa>] kmem_cache_alloc_node+0x101/0x180 [<ffffffff81d53a39>] __alloc_skb+0x56/0x192 [<ffffffff82b68ba7>] llc_station_init+0xff/0x164 [<ffffffff82b689ee>] llc2_init+0x3a/0xf4 [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b6d95918 (size 512): comm "swapper", pid 1, jiffies 4294938848 hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk 00 00 00 00 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b .........kkkkkkk backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81155d41>] __kmalloc_node_track_caller+0x133/0x188 [<ffffffff81d53a66>] __alloc_skb+0x83/0x192 [<ffffffff82b68ba7>] llc_station_init+0xff/0x164 [<ffffffff82b689ee>] llc2_init+0x3a/0xf4 [<ffffffff810090b4>] do_one_initcall+0x82/0x1a6 [<ffffffff82afe8d3>] kernel_init+0x1b7/0x223 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852070 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): 90 f6 b2 0e 00 88 ff ff f0 4a 6f 8e 00 88 ff ff .........Jo..... 01 00 00 00 00 00 00 00 20 a9 de 8a 00 88 ff ff ........ ....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852230 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): 50 98 ea 90 00 88 ff ff 90 96 ea 90 00 88 ff ff P............... 01 00 00 00 00 00 00 00 a0 21 fd b0 00 88 ff ff .........!...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852310 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): e0 27 85 b5 00 88 ff ff 40 75 e1 b0 00 88 ff ff .'......@....... 01 00 00 00 00 00 00 00 a0 49 fd b0 00 88 ff ff .........I...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b58523f0 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): 40 f5 b2 0e 00 88 ff ff a0 f2 b2 0e 00 88 ff ff @............... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b58525b0 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): a0 32 15 9d 00 88 ff ff f0 f3 b2 0e 00 88 ff ff .2.............. 01 00 00 00 00 00 00 00 a0 e7 de 8a 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852770 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): a0 22 85 b5 00 88 ff ff 48 f5 93 83 ff ff ff ff ."......H....... 01 00 00 00 00 00 00 00 10 27 fe b0 00 88 ff ff .........'...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b58527e0 (size 40): comm "flush-43:10", pid 4582, jiffies 4294945417 hex dump (first 32 bytes): f0 c3 97 9e 00 88 ff ff 10 23 85 b5 00 88 ff ff .........#...... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63 [<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103 [<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47 [<ffffffff81186559>] bdi_writeback_task+0x96/0xd3 [<ffffffff81132e36>] bdi_start_fn+0x89/0xff [<ffffffff810a7bbc>] kthread+0x9d/0xa5 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852930 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): 80 93 ea 90 00 88 ff ff 00 b7 ca 96 00 88 ff ff ................ 01 00 00 00 00 00 00 00 20 7c 58 09 00 88 ff ff ........ |X..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852a10 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): 90 3d ad 9e 00 88 ff ff 40 2c 85 b5 00 88 ff ff .=......@,...... 02 00 00 00 00 00 00 00 e8 58 2e b9 00 88 ff ff .........X...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852af0 (size 40): comm "kthreadd", pid 2, jiffies 4294945417 hex dump (first 32 bytes): b0 3c 15 9d 00 88 ff ff 80 93 ea 90 00 88 ff ff .<.............. 02 00 00 00 00 00 00 00 d8 9c bd 09 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103d052>] kernel_thread+0x82/0xe0 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852c40 (size 40): comm "flush-43:15", pid 4587, jiffies 4294945417 hex dump (first 32 bytes): 10 2a 85 b5 00 88 ff ff 30 92 ea 90 00 88 ff ff .*......0....... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63 [<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103 [<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47 [<ffffffff81186559>] bdi_writeback_task+0x96/0xd3 [<ffffffff81132e36>] bdi_start_fn+0x89/0xff [<ffffffff810a7bbc>] kthread+0x9d/0xa5 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b5852d20 (size 40): comm "flush-8:0", pid 4588, jiffies 4294945417 hex dump (first 32 bytes): 70 f0 b2 0e 00 88 ff ff 00 3e ad 9e 00 88 ff ff p........>...... 02 00 00 00 00 00 00 00 e8 b8 41 12 00 88 ff ff ..........A..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63 [<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103 [<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47 [<ffffffff81186559>] bdi_writeback_task+0x96/0xd3 [<ffffffff81132e36>] bdi_start_fn+0x89/0xff [<ffffffff810a7bbc>] kthread+0x9d/0xa5 [<ffffffff8103d0ba>] child_rip+0xa/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b0e17540 (size 40): comm "plymouth", pid 9118, jiffies 4294947855 hex dump (first 32 bytes): 10 23 85 b5 00 88 ff ff 30 f2 b2 0e 00 88 ff ff .#......0....... 01 00 00 00 00 00 00 00 a0 71 fd b0 00 88 ff ff .........q...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800b0e178c0 (size 40): comm "atd", pid 9150, jiffies 4294947930 hex dump (first 32 bytes): 10 93 ea 90 00 88 ff ff 90 f6 b2 0e 00 88 ff ff ................ 01 00 00 00 00 00 00 00 a0 83 d6 56 00 88 ff ff ...........V.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800ae992000 (size 40): comm "NetworkManager", pid 9055, jiffies 4294948078 hex dump (first 32 bytes): 20 36 ad 9e 00 88 ff ff b0 3c 15 9d 00 88 ff ff 6.......<...... 02 00 00 00 00 00 00 00 d8 dc 3c 11 00 88 ff ff ..........<..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dcf402>] inet_create+0x247/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800a54cbb60 (size 40): comm "gnome-session", pid 9511, jiffies 4294952983 hex dump (first 32 bytes): 00 b7 ca 96 00 88 ff ff 50 31 15 9d 00 88 ff ff ........P1...... 02 00 00 00 00 00 00 00 d8 9c 2e 0f 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800a5740e00 (size 40): comm "canberra-gtk-pl", pid 9799, jiffies 4294953182 hex dump (first 32 bytes): 20 3d 88 bd 00 88 ff ff 50 21 85 b5 00 88 ff ff =......P!...... 01 00 00 00 00 00 00 00 a0 17 fd b0 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800a3500540 (size 40): comm "polkit-read-aut", pid 9825, jiffies 4294953349 hex dump (first 32 bytes): 70 30 88 bd 00 88 ff ff 80 fa b2 0e 00 88 ff ff p0.............. 02 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009e97c3f0 (size 40): comm "nm-applet", pid 9771, jiffies 4294953682 hex dump (first 32 bytes): 60 3b 15 9d 00 88 ff ff e0 27 85 b5 00 88 ff ff `;.......'...... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009e97c770 (size 40): comm "gnome-mount", pid 9849, jiffies 4294953694 hex dump (first 32 bytes): 70 30 15 9d 00 88 ff ff 50 38 15 9d 00 88 ff ff p0......P8...... 02 00 00 00 00 00 00 00 d8 7c c1 8f 00 88 ff ff .........|...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff8800a45bae00 (size 40): comm "dbus-daemon", pid 8845, jiffies 4294953696 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 c8 8b 8f 83 ff ff ff ff ................ 02 00 00 00 00 00 00 00 08 a3 67 8a 00 88 ff ff ..........g..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009e329380 (size 40): comm "hal-storage-mou", pid 9851, jiffies 4294953770 hex dump (first 32 bytes): 10 33 15 9d 00 88 ff ff 40 35 15 9d 00 88 ff ff .3......@....... 02 00 00 00 00 00 00 00 d8 bc 5d 29 00 88 ff ff ..........]).... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009ead3620 (size 40): comm "console-kit-dae", pid 8879, jiffies 4294954479 hex dump (first 32 bytes): 40 35 15 9d 00 88 ff ff 00 20 99 ae 00 88 ff ff @5....... ...... 02 00 00 00 00 00 00 00 d8 3c a6 1b 00 88 ff ff .........<...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880096cab700 (size 40): comm "sshd", pid 10008, jiffies 4294958039 hex dump (first 32 bytes): 30 29 85 b5 00 88 ff ff 60 bb 4c a5 00 88 ff ff 0)......`.L..... 02 00 00 00 00 00 00 00 d8 7c 5e 38 00 88 ff ff .........|^8.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880096cab770 (size 40): comm "sshd", pid 10008, jiffies 4294958039 hex dump (first 32 bytes): 50 31 15 9d 00 88 ff ff 70 30 15 9d 00 88 ff ff P1......p0...... 02 00 00 00 00 00 00 00 d8 1c 38 b5 00 88 ff ff ..........8..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880096cabaf0 (size 40): comm "firefox", pid 9992, jiffies 4295039742 hex dump (first 32 bytes): 50 91 ea 90 00 88 ff ff 20 3d ad 9e 00 88 ff ff P....... =...... 02 00 00 00 00 00 00 00 d8 1c fe 4e 00 88 ff ff ...........N.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009ead3d20 (size 40): comm "firefox", pid 10108, jiffies 4295039743 hex dump (first 32 bytes): f0 ba ca 96 00 88 ff ff c0 f8 b2 0e 00 88 ff ff ................ 02 00 00 00 00 00 00 00 d8 dc 46 90 00 88 ff ff ..........F..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009ead3d90 (size 40): comm "firefox", pid 10107, jiffies 4295039743 hex dump (first 32 bytes): 20 f6 b2 0e 00 88 ff ff 10 2a 85 b5 00 88 ff ff ........*...... 02 00 00 00 00 00 00 00 48 3a a5 a6 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009ead3e00 (size 40): comm "firefox", pid 10109, jiffies 4295039743 hex dump (first 32 bytes): 20 2d 85 b5 00 88 ff ff e0 4e 6f 8e 00 88 ff ff -.......No..... 01 00 00 00 00 00 00 00 e0 15 4c 09 00 88 ff ff ..........L..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff810c2241>] futex_wait+0xb1/0x297 [<ffffffff810c43b3>] do_futex+0xbb/0xa4c [<ffffffff810c4e66>] sys_futex+0x122/0x154 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153070 (size 40): comm "firefox", pid 10110, jiffies 4295039774 hex dump (first 32 bytes): 70 b7 ca 96 00 88 ff ff 70 c7 97 9e 00 88 ff ff p.......p....... 02 00 00 00 00 00 00 00 d8 9c a7 09 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153150 (size 40): comm "firefox", pid 9992, jiffies 4295039775 hex dump (first 32 bytes): 60 bb 4c a5 00 88 ff ff 70 b7 ca 96 00 88 ff ff `.L.....p....... 02 00 00 00 00 00 00 00 d8 9c 26 55 00 88 ff ff ..........&U.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153230 (size 40): comm "firefox", pid 9992, jiffies 4295039776 hex dump (first 32 bytes): 30 92 ea 90 00 88 ff ff 00 2e 85 b5 00 88 ff ff 0............... 01 00 00 00 00 00 00 00 a0 35 18 09 00 88 ff ff .........5...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d1532a0 (size 40): comm "firefox", pid 9992, jiffies 4295039776 hex dump (first 32 bytes): c0 91 ea 90 00 88 ff ff b0 25 85 b5 00 88 ff ff .........%...... 02 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153310 (size 40): comm "firefox", pid 9992, jiffies 4295039776 hex dump (first 32 bytes): 40 95 ea 90 00 88 ff ff 80 93 32 9e 00 88 ff ff @.........2..... 02 00 00 00 00 00 00 00 d8 bc b5 2c 00 88 ff ff ...........,.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153540 (size 40): comm "firefox", pid 9992, jiffies 4295039779 hex dump (first 32 bytes): 80 93 32 9e 00 88 ff ff 20 36 ad 9e 00 88 ff ff ..2..... 6...... 02 00 00 00 00 00 00 00 d8 7c 11 41 00 88 ff ff .........|.A.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4230 (size 40): comm "firefox", pid 9992, jiffies 4295039818 hex dump (first 32 bytes): a0 39 15 9d 00 88 ff ff 28 16 90 83 ff ff ff ff .9......(....... 02 00 00 00 00 00 00 00 08 42 1d 37 00 88 ff ff .........B.7.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4310 (size 40): comm "firefox", pid 9992, jiffies 4295039821 hex dump (first 32 bytes): 10 f3 b2 0e 00 88 ff ff 50 f1 b2 0e 00 88 ff ff ........P....... 02 00 00 00 00 00 00 00 68 b8 62 22 00 88 ff ff ........h.b".... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4380 (size 40): comm "firefox", pid 9992, jiffies 4295039821 hex dump (first 32 bytes): e0 4e 6f 8e 00 88 ff ff 20 f6 b2 0e 00 88 ff ff .No..... ....... 02 00 00 00 00 00 00 00 48 7a 5f a4 00 88 ff ff ........Hz_..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f44d0 (size 40): comm "firefox", pid 9992, jiffies 4295039821 hex dump (first 32 bytes): 40 45 6f 8e 00 88 ff ff 60 3b 15 9d 00 88 ff ff @Eo.....`;...... 02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4540 (size 40): comm "Xorg", pid 9433, jiffies 4295039831 hex dump (first 32 bytes): c0 48 6f 8e 00 88 ff ff d0 44 6f 8e 00 88 ff ff .Ho......Do..... 02 00 00 00 00 00 00 00 90 19 1d 37 00 88 ff ff ...........7.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff8117412c>] do_select+0x5e0/0x638 [<ffffffff81174375>] core_sys_select+0x1f1/0x2aa [<ffffffff811746a0>] sys_select+0xa8/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4770 (size 40): comm "firefox", pid 9992, jiffies 4295039873 hex dump (first 32 bytes): d0 94 ea 90 00 88 ff ff b0 4c 6f 8e 00 88 ff ff .........Lo..... 02 00 00 00 00 00 00 00 90 2d fd b0 00 88 ff ff .........-...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153690 (size 40): comm "firefox", pid 9992, jiffies 4295039873 hex dump (first 32 bytes): 00 ce 80 b6 00 88 ff ff 08 56 94 83 ff ff ff ff .........V...... 01 00 00 00 00 00 00 00 08 6a 1d 37 00 88 ff ff .........j.7.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153700 (size 40): comm "firefox", pid 9992, jiffies 4295039873 hex dump (first 32 bytes): 70 4e 6f 8e 00 88 ff ff c0 48 6f 8e 00 88 ff ff pNo......Ho..... 02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153770 (size 40): comm "firefox", pid 9992, jiffies 4295039873 hex dump (first 32 bytes): 00 77 89 bd 00 88 ff ff 40 3c 15 9d 00 88 ff ff .w......@<...... 01 00 00 00 00 00 00 00 08 60 fd b0 00 88 ff ff .........`...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153850 (size 40): comm "firefox", pid 9992, jiffies 4295039884 hex dump (first 32 bytes): 70 c7 97 9e 00 88 ff ff 70 4e 6f 8e 00 88 ff ff p.......pNo..... 02 00 00 00 00 00 00 00 d8 5c af 24 00 88 ff ff .........\.$.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d1539a0 (size 40): comm "firefox", pid 9992, jiffies 4295039884 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 30 42 6f 8e 00 88 ff ff ........0Bo..... 02 00 00 00 00 00 00 00 90 41 1d 37 00 88 ff ff .........A.7.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153b60 (size 40): comm "firefox", pid 9992, jiffies 4295039884 hex dump (first 32 bytes): d0 44 6f 8e 00 88 ff ff f0 c3 97 9e 00 88 ff ff .Do............. 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88009d153cb0 (size 40): comm "firefox", pid 9992, jiffies 4295039884 hex dump (first 32 bytes): 00 20 99 ae 00 88 ff ff f0 2a 85 b5 00 88 ff ff . .......*...... 02 00 00 00 00 00 00 00 d8 9c 8d 33 00 88 ff ff ...........3.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f48c0 (size 40): comm "firefox", pid 9992, jiffies 4295040062 hex dump (first 32 bytes): 00 37 15 9d 00 88 ff ff 40 45 6f 8e 00 88 ff ff .7......@....... 02 00 00 00 00 00 00 00 a0 17 1d 37 00 88 ff ff ...........7.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4a80 (size 40): comm "firefox", pid 9992, jiffies 4295040319 hex dump (first 32 bytes): 50 f1 b2 0e 00 88 ff ff 70 f0 b2 0e 00 88 ff ff P.......p....... 01 00 00 00 00 00 00 00 20 1a 4c 09 00 88 ff ff ........ .L..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4af0 (size 40): comm "firefox", pid 9992, jiffies 4295040320 hex dump (first 32 bytes): 70 20 85 b5 00 88 ff ff a0 f9 b2 0e 00 88 ff ff p .............. 01 00 00 00 00 00 00 00 60 af de 8a 00 88 ff ff ........`....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4e70 (size 40): comm "firefox", pid 9992, jiffies 4295040338 hex dump (first 32 bytes): 50 38 15 9d 00 88 ff ff 00 37 15 9d 00 88 ff ff P8.......7...... 02 00 00 00 00 00 00 00 d8 dc a0 2c 00 88 ff ff ...........,.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4ee0 (size 40): comm "firefox", pid 9992, jiffies 4295040338 hex dump (first 32 bytes): 00 3e ad 9e 00 88 ff ff 80 43 6f 8e 00 88 ff ff .>.......Co..... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88008e6f4f50 (size 40): comm "firefox", pid 9992, jiffies 4295040338 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 18 27 8f 83 ff ff ff ff .........'...... 03 00 00 00 00 00 00 00 48 5a 2c a5 00 88 ff ff ........HZ,..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f070 (size 40): comm "plymouth-set-de", pid 19150, jiffies 4295900723 hex dump (first 32 bytes): 80 4a 6f 8e 00 88 ff ff 20 2d 85 b5 00 88 ff ff .Jo..... -...... 02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f150 (size 40): comm "plymouth-set-de", pid 19150, jiffies 4295900723 hex dump (first 32 bytes): 10 43 6f 8e 00 88 ff ff 80 4a 6f 8e 00 88 ff ff .Co......Jo..... 02 00 00 00 00 00 00 00 e8 b8 bb 41 00 88 ff ff ...........A.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f230 (size 40): comm "firefox", pid 9992, jiffies 4295900751 hex dump (first 32 bytes): 40 75 e1 b0 00 88 ff ff 40 f5 b2 0e 00 88 ff ff @u......@....... 02 00 00 00 00 00 00 00 90 73 fd b0 00 88 ff ff .........s...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f2a0 (size 40): comm "firefox", pid 9992, jiffies 4295900751 hex dump (first 32 bytes): f0 23 85 b5 00 88 ff ff 70 90 ea 90 00 88 ff ff .#......p....... 01 00 00 00 00 00 00 00 a0 71 49 b6 00 88 ff ff .........qI..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9070 (size 40): comm "plymouth-popula", pid 19166, jiffies 4295900753 hex dump (first 32 bytes): a0 f2 b2 0e 00 88 ff ff 10 f3 b2 0e 00 88 ff ff ................ 02 00 00 00 00 00 00 00 90 73 49 b6 00 88 ff ff .........sI..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f310 (size 40): comm "firefox", pid 9992, jiffies 4295900755 hex dump (first 32 bytes): 70 90 ea 90 00 88 ff ff 10 43 6f 8e 00 88 ff ff p........Co..... 02 00 00 00 00 00 00 00 08 74 49 b6 00 88 ff ff .........tI..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f3f0 (size 40): comm "firefox", pid 9992, jiffies 4295900767 hex dump (first 32 bytes): b0 25 85 b5 00 88 ff ff 40 95 ea 90 00 88 ff ff .%......@....... 01 00 00 00 00 00 00 00 60 e1 de 8a 00 88 ff ff ........`....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f4d0 (size 40): comm "firefox", pid 9992, jiffies 4295900767 hex dump (first 32 bytes): 80 3a 15 9d 00 88 ff ff 30 b9 ca 96 00 88 ff ff .:......0....... 03 00 00 00 00 00 00 00 a0 35 fd b0 00 88 ff ff .........5...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f540 (size 40): comm "firefox", pid 9992, jiffies 4295900771 hex dump (first 32 bytes): 30 f2 b2 0e 00 88 ff ff f0 23 85 b5 00 88 ff ff 0........#...... 02 00 00 00 00 00 00 00 08 74 fd b0 00 88 ff ff .........t...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f5b0 (size 40): comm "firefox", pid 9992, jiffies 4295900771 hex dump (first 32 bytes): 90 96 ea 90 00 88 ff ff e0 97 ea 90 00 88 ff ff ................ 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f620 (size 40): comm "firefox", pid 9992, jiffies 4295900771 hex dump (first 32 bytes): 80 43 6f 8e 00 88 ff ff 90 3d ad 9e 00 88 ff ff .Co......=...... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9150 (size 40): comm "firefox", pid 9992, jiffies 4295900783 hex dump (first 32 bytes): e0 97 ea 90 00 88 ff ff f0 ba ca 96 00 88 ff ff ................ 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea91c0 (size 40): comm "firefox", pid 9992, jiffies 4295900783 hex dump (first 32 bytes): a0 f9 b2 0e 00 88 ff ff a0 32 15 9d 00 88 ff ff .........2...... 02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf [<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c [<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd [<ffffffff81dcf48c>] inet_create+0x2d1/0x32e [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea92a0 (size 40): comm "thunderbird-bin", pid 18849, jiffies 4295900959 hex dump (first 32 bytes): 90 76 89 bd 00 88 ff ff b0 2c 85 b5 00 88 ff ff .v.......,...... 01 00 00 00 00 00 00 00 a0 71 fd b0 00 88 ff ff .........q...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9310 (size 40): comm "thunderbird-bin", pid 18986, jiffies 4295900963 hex dump (first 32 bytes): 30 f9 b2 0e 00 88 ff ff c0 78 e1 b0 00 88 ff ff 0........x...... 01 00 00 00 00 00 00 00 e0 89 d6 56 00 88 ff ff ...........V.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f690 (size 40): comm "Xorg", pid 9433, jiffies 4295900963 hex dump (first 32 bytes): c0 78 e1 b0 00 88 ff ff 70 20 85 b5 00 88 ff ff .x......p ...... 01 00 00 00 00 00 00 00 e0 bb d6 56 00 88 ff ff ...........V.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff8117412c>] do_select+0x5e0/0x638 [<ffffffff81174375>] core_sys_select+0x1f1/0x2aa [<ffffffff811746a0>] sys_select+0xa8/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9380 (size 40): comm "thunderbird-bin", pid 18849, jiffies 4295900963 hex dump (first 32 bytes): f0 2a 85 b5 00 88 ff ff 30 29 85 b5 00 88 ff ff .*......0)...... 02 00 00 00 00 00 00 00 d8 bc 94 46 00 88 ff ff ...........F.... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f700 (size 40): comm "Xorg", pid 9433, jiffies 4295900963 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 98 94 92 83 ff ff ff ff ................ 03 00 00 00 00 00 00 00 48 da be 9e 00 88 ff ff ........H....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff8117412c>] do_select+0x5e0/0x638 [<ffffffff81174375>] core_sys_select+0x1f1/0x2aa [<ffffffff811746a0>] sys_select+0xa8/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f7e0 (size 40): comm "gconfd-2", pid 10000, jiffies 4295900966 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 d8 a4 8a 83 ff ff ff ff ................ 03 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f850 (size 40): comm "gconfd-2", pid 10000, jiffies 4295900966 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 98 3f 8a 83 ff ff ff ff .........?...... 03 00 00 00 00 00 00 00 98 de 13 9d 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f8c0 (size 40): comm "gconfd-2", pid 10000, jiffies 4295900966 hex dump (first 32 bytes): 20 3d ad 9e 00 88 ff ff 30 f9 b2 0e 00 88 ff ff =......0....... 01 00 00 00 00 00 00 00 60 e1 de 8a 00 88 ff ff ........`....... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deea1e>] unix_create+0x78/0x97 [<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd [<ffffffff81d4ae2e>] sock_create+0x45/0x5b [<ffffffff81d4b0af>] sys_socket+0x3d/0x85 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f930 (size 40): comm "gconfd-2", pid 10000, jiffies 4295900966 hex dump (first 32 bytes): c0 f8 b2 0e 00 88 ff ff 10 93 ea 90 00 88 ff ff ................ 01 00 00 00 00 00 00 00 a0 e7 de 8a 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff81095ab2>] init_timer_key+0x38/0x8a [<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d [<ffffffff81dee867>] unix_create1+0x78/0x1b7 [<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7 [<ffffffff81d4b4b4>] sys_connect+0x88/0xcb [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2f9a0 (size 40): comm "gconfd-2", pid 10000, jiffies 4295900966 hex dump (first 32 bytes): f0 4a 6f 8e 00 88 ff ff c0 91 ea 90 00 88 ff ff .Jo............. 01 00 00 00 00 00 00 00 e0 ed de 8a 00 88 ff ff ................ backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9540 (size 40): comm "plymouth-popula", pid 19566, jiffies 4295901052 hex dump (first 32 bytes): f0 f3 b2 0e 00 88 ff ff 10 33 15 9d 00 88 ff ff .........3...... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2fa10 (size 40): comm "plymouth-popula", pid 19688, jiffies 4295901223 hex dump (first 32 bytes): 00 2e 85 b5 00 88 ff ff 60 44 6f 8e 00 88 ff ff ........`Do..... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9690 (size 40): comm "plymouth-popula", pid 19689, jiffies 4295901224 hex dump (first 32 bytes): 30 22 85 b5 00 88 ff ff b0 f5 b2 0e 00 88 ff ff 0".............. 01 00 00 00 00 00 00 00 20 5a 58 09 00 88 ff ff ........ ZX..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea97e0 (size 40): comm "mkinitrd", pid 19807, jiffies 4295901373 hex dump (first 32 bytes): b0 f5 b2 0e 00 88 ff ff 50 91 ea 90 00 88 ff ff ........P....... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff880090ea9850 (size 40): comm "mkinitrd", pid 19807, jiffies 4295901374 hex dump (first 32 bytes): 80 fa b2 0e 00 88 ff ff 30 22 85 b5 00 88 ff ff ........0"...... 02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:...... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea4e>] debug_object_init+0x27/0x3d [<ffffffff810abd7e>] hrtimer_init+0x38/0x90 [<ffffffff81082b6d>] copy_process+0x836/0x1261 [<ffffffff81083706>] do_fork+0x16e/0x360 [<ffffffff8103a69e>] sys_clone+0x3c/0x57 [<ffffffff8103c363>] stub_clone+0x13/0x20 [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88000eb2fa80 (size 40): comm "firefox", pid 9991, jiffies 4295901374 hex dump (first 32 bytes): 40 05 50 a3 00 88 ff ff 50 98 ea 90 00 88 ff ff @.P.....P....... 01 00 00 00 00 00 00 00 e0 04 4c 09 00 88 ff ff ..........L..... backtrace: [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8 [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a [<ffffffff814ae6c8>] __debug_object_init+0x53/0x372 [<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40 [<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63 [<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131 [<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81 [<ffffffff811737d1>] do_sys_poll+0x38d/0x442 [<ffffffff81173a57>] sys_poll+0x64/0xe4 [<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff I am not sure how to interpret these stack trace, dmesg is flooded with these: evbug.c: Event. Dev: input1, Type: 1, Code: 57, Value: 1 evbug.c: Event. Dev: input1, Type: 0, Code: 0, Value: 0 evbug.c: Event. Dev: input1, Type: 4, Code: 4, Value: 57 evbug.c: Event. Dev: input1, Type: 1, Code: 57, Value: 0 evbug.c: Event. Dev: input1, Type: 0, Code: 0, Value: 0 But otherwise system seemed fine and running...with some other problems.. -- Regards, Peter Teoh -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists