lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 19 Jan 2010 12:03:27 -0600
From:	"Chris Friesen" <cfriesen@...tel.com>
To:	Catalin Marinas <catalin.marinas@....com>,
	Linux kernel <linux-kernel@...r.kernel.org>
Subject: issues with kmemleak backport

Hi,

I've backported about 60 kmemleak patches to a modified 2.6.27 in an
attempt to track down a memory leak of about 4MB/hr that we're seeing on
an x86 blade.

For the most part the backport was straightforward, but now booting up
the kernel I see this:

Cannot insert 0xc312b880 into the object search tree (already existing)
Pid: 0, comm: swapper Not tainted 2.6.27-pne #23
 [<c048babd>] create_object+0x21d/0x250
 [<c014172b>] kmemleak_init+0x12a/0x1cf
 [<c012980d>] start_kernel+0x225/0x338
 [<c01293aa>] ? unknown_bootoption+0x0/0x1ed
 [<c0129093>] _sinittext+0x93/0x99
 =======================
Kernel memory leak detector disabled
Object 0xc312b880 (size 340):
  comm "swapper", pid 0, jiffies 4294667296
  min_count = 0
  count = 0
  flags = 0x1
  checksum = 0
  backtrace:
     [<c01415f9>] log_early+0x90/0x98
     [<c08132df>] kmemleak_alloc+0x5f/0x70
     [<c013f1c9>] alloc_bootmem_core+0x2c3/0x2c8
     [<c013f233>] ___alloc_bootmem_nopanic+0x65/0x91
     [<c013f2c8>] ___alloc_bootmem+0x16/0x3c
     [<c013f39e>] __alloc_bootmem+0x12/0x14
     [<c0147c43>] con_init+0x8a/0x22d
     [<c01474c4>] console_init+0x19/0x27
     [<c01297b6>] start_kernel+0x1ce/0x338
     [<c0129093>] _sinittext+0x93/0x99
     [<ffffffff>] 0xffffffff


Have you got any suggestions as to how I should deal with this?

Thanks,
Chris
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ