lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Jan 2013 12:20:48 +0100 From: Martin Mokrejs <mmokrejs@...d.natur.cuni.cz> To: Daniel Vetter <daniel.vetter@...ll.ch>, dri-devel@...ts.freedesktop.org CC: David Airlie <airlied@...ux.ie>, LKML <linux-kernel@...r.kernel.org> Subject: linux-3.7.4: Regression causing a kmemleak in drm_pci_set_busid() Hi, I have kmemleak detector enabled since 3.7.1 but now, with 3.7.4 I get the following: comm "X", pid 5475, jiffies 4294992244 (age 133695.910s) hex dump (first 32 bytes): 69 39 31 35 40 70 63 69 3a 30 30 30 30 3a 30 30 i915@pci:0000:00 3a 30 32 2e 30 00 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 :02.0.kkkkkkkkk. backtrace: [<ffffffff815b4aad>] kmemleak_alloc+0x21/0x3e [<ffffffff81110352>] slab_post_alloc_hook+0x28/0x2a [<ffffffff8111288a>] __kmalloc+0xf2/0x104 [<ffffffffa0077c0b>] drm_pci_set_busid+0xf6/0x12b [drm] [<ffffffffa0072a04>] drm_setversion+0xaf/0x177 [drm] [<ffffffffa00707b1>] drm_ioctl+0x309/0x3c9 [drm] [<ffffffff81125e7e>] do_vfs_ioctl+0x462/0x4a3 [<ffffffff81125f06>] sys_ioctl+0x47/0x69 [<ffffffff815dd716>] system_call_fastpath+0x1a/0x1f [<ffffffffffffffff>] 0xffffffffffffffff Hope this helps, Martin View attachment "dmesg" of type "text/plain" (82776 bytes) View attachment "lspci.txt" of type "text/plain" (1958 bytes) View attachment "lspci-vvxx.txt" of type "text/plain" (36720 bytes)
Powered by blists - more mailing lists