lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Wed, 23 Jan 2013 12:20:48 +0100
From:	Martin Mokrejs <mmokrejs@...d.natur.cuni.cz>
To:	Daniel Vetter <daniel.vetter@...ll.ch>,
	dri-devel@...ts.freedesktop.org
CC:	David Airlie <airlied@...ux.ie>,
	LKML <linux-kernel@...r.kernel.org>
Subject: linux-3.7.4: Regression causing a kmemleak in drm_pci_set_busid()

Hi,
  I have kmemleak detector enabled since 3.7.1 but now, with 3.7.4 I get the following:

  comm "X", pid 5475, jiffies 4294992244 (age 133695.910s)
  hex dump (first 32 bytes):
    69 39 31 35 40 70 63 69 3a 30 30 30 30 3a 30 30  i915@pci:0000:00
    3a 30 32 2e 30 00 6b 6b 6b 6b 6b 6b 6b 6b 6b a5  :02.0.kkkkkkkkk.
  backtrace:
    [<ffffffff815b4aad>] kmemleak_alloc+0x21/0x3e
    [<ffffffff81110352>] slab_post_alloc_hook+0x28/0x2a
    [<ffffffff8111288a>] __kmalloc+0xf2/0x104
    [<ffffffffa0077c0b>] drm_pci_set_busid+0xf6/0x12b [drm]
    [<ffffffffa0072a04>] drm_setversion+0xaf/0x177 [drm]
    [<ffffffffa00707b1>] drm_ioctl+0x309/0x3c9 [drm]
    [<ffffffff81125e7e>] do_vfs_ioctl+0x462/0x4a3
    [<ffffffff81125f06>] sys_ioctl+0x47/0x69
    [<ffffffff815dd716>] system_call_fastpath+0x1a/0x1f
    [<ffffffffffffffff>] 0xffffffffffffffff

Hope this helps,
Martin

View attachment "dmesg" of type "text/plain" (82776 bytes)

View attachment "lspci.txt" of type "text/plain" (1958 bytes)

View attachment "lspci-vvxx.txt" of type "text/plain" (36720 bytes)

Powered by blists - more mailing lists