lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 16 Sep 2011 15:29:54 +0800
From:	Lin Ming <ming.m.lin@...el.com>
To:	Sitsofe Wheeler <sitsofe@...oo.com>
Cc:	"Moore, Robert" <robert.moore@...el.com>,
	"linux-acpi@...r.kernel.org" <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: kmemleaks related to ACPI psparse

On Fri, 2011-09-16 at 15:22 +0800, Sitsofe Wheeler wrote:
> Hi,
> 
> In 3.1.0-rc5-dirty the following warning appeared in dmesg:

Hi,

Please attach the acpidump output.

Regards,
Lin Ming

> 
> [  249.506212] ACPI Exception: AE_TIME, Returned by Handler for [EmbeddedControl] (20110623/evregion-478)
> [  249.506387] ACPI Error: Method parse/execution failed [\_SB_.PCI0.SBRG.EC0_.RCTP] (Node ee96daf0), AE_TIME (20110623/psparse-536)
> [  249.506636] ACPI Error: Method parse/execution failed [\_TZ_.RTMP] (Node eeb85000), AE_TIME (20110623/psparse-536)
> [  249.506827] ACPI Error: Method parse/execution failed [\_TZ_.TZ00._TMP] (Node eeb85190), AE_TIME (20110623/psparse-536)
> [  249.511953] Thermal: failed to read out thermal zone 0
> 
> Shortly followed by a bunch of kmemleak warnings (the initial trigger
> has not been reproducible though):
> 
> unreferenced object 0xedcb81a0 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915201 (age 649.854s)
>   hex dump (first 32 bytes):
>     00 00 00 00 0d 01 70 00 00 00 00 00 00 00 00 00  ......p.........
>     00 00 00 00 d0 8d cb ed 00 00 00 00 01 00 00 00  ................
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c55d5>] acpi_ps_parse_loop+0x1e9/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
>     [<b0141cac>] kthread+0x7c/0x90
>     [<b055e102>] kernel_thread_helper+0x6/0xd
> unreferenced object 0xedcb8dd0 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915201 (age 649.854s)
>   hex dump (first 32 bytes):
>     a0 81 cb ed 0d 01 36 00 00 00 00 00 00 00 00 00  ......6.........
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c5159>] acpi_ps_complete_this_op+0xbb/0x146
>     [<b02c5202>] acpi_ps_complete_op+0x1e/0x208
>     [<b02c5afd>] acpi_ps_parse_loop+0x711/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
> unreferenced object 0xedcb84e0 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915202 (age 649.853s)
>   hex dump (first 32 bytes):
>     00 00 00 00 0d 01 a0 00 03 00 00 00 00 00 00 00  ................
>     00 00 00 00 00 80 cb ed 00 00 00 00 02 00 00 00  ................
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c55d5>] acpi_ps_parse_loop+0x1e9/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
>     [<b0141cac>] kthread+0x7c/0x90
>     [<b055e102>] kernel_thread_helper+0x6/0xd
> unreferenced object 0xedcb8000 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915209 (age 649.870s)
>   hex dump (first 32 bytes):
>     e0 84 cb ed 0d 01 a0 00 09 00 00 00 00 00 00 00  ................
>     00 00 00 00 90 8a cb ed 00 00 00 00 02 00 00 00  ................
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c55d5>] acpi_ps_parse_loop+0x1e9/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
>     [<b0141cac>] kthread+0x7c/0x90
>     [<b055e102>] kernel_thread_helper+0x6/0xd
> unreferenced object 0xedcb8a90 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915210 (age 649.869s)
>   hex dump (first 32 bytes):
>     00 80 cb ed 0d 01 70 00 14 00 00 00 00 00 00 00  ......p.........
>     00 00 00 00 40 83 cb ed 00 00 00 00 01 00 00 00  ....@...........
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c55d5>] acpi_ps_parse_loop+0x1e9/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
>     [<b0141cac>] kthread+0x7c/0x90
>     [<b055e102>] kernel_thread_helper+0x6/0xd
> unreferenced object 0xedcb8340 (size 32):
>   comm "kworker/0:2", pid 389, jiffies 4294915210 (age 649.869s)
>   hex dump (first 32 bytes):
>     90 8a cb ed 0d 01 2d 00 15 00 00 00 00 00 00 00  ......-.........
>     00 00 00 00 85 17 f8 ef 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<b0551807>] kmemleak_alloc+0x27/0x50
>     [<b0196435>] kmem_cache_alloc+0xc5/0x180
>     [<b02c5faf>] acpi_ps_alloc_op+0x82/0x84
>     [<b02c55d5>] acpi_ps_parse_loop+0x1e9/0x830
>     [<b02c4e1e>] acpi_ps_parse_aml+0x87/0x235
>     [<b02c61b4>] acpi_ps_execute_method+0x190/0x248
>     [<b02c1f8b>] acpi_ns_evaluate+0xc7/0x179
>     [<b02c1abd>] acpi_evaluate_object+0xd1/0x1c0
>     [<b02ad0aa>] acpi_evaluate_integer+0x2a/0x51
>     [<b02cf9de>] thermal_get_temp+0x34/0x5a
>     [<b03f6d49>] thermal_zone_device_update+0x29/0x2a0
>     [<b03f6fcd>] thermal_zone_device_check+0xd/0x10
>     [<b013bd2c>] process_one_work+0x18c/0x3c0
>     [<b013e697>] worker_thread+0x107/0x310
>     [<b0141cac>] kthread+0x7c/0x90
>     [<b055e102>] kernel_thread_helper+0x6/0xd
> 


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ