lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <54F83962.3030408@bmw-carit.de>
Date:	Thu, 5 Mar 2015 12:09:22 +0100
From:	Daniel Wagner <daniel.wagner@...-carit.de>
To:	"Rafael J. Wysocki" <rjw@...ysocki.net>,
	Len Brown <lenb@...nel.org>, <linux-acpi@...r.kernel.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Some memory leak reported by kmemleak

Hi,

I just did some kmemleak run on my test hardware and I got 
some reports mentioning ACPI. I hope I got the right persons and
list.

This is based on 4.0.0-rc2+ 6587457b4b3

unreferenced object 0xffff881fafcbdce0 (size 32):
  comm "swapper/0", pid 1, jiffies 4294671332 (age 4303.330s)
  hex dump (first 32 bytes):
    20 dd cb af 1f 88 ff ff 00 dd cb af 1f 88 ff ff   ...............
    00 00 2d bd 00 00 00 00 04 00 2d bd 00 00 00 00  ..-.......-.....
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f99cc>] kmem_cache_alloc_trace+0x1dc/0x260
    [<ffffffff81451283>] apei_res_add+0xc3/0x120
    [<ffffffff814513c2>] collect_res_callback+0xa2/0xc0
    [<ffffffff81450e78>] apei_exec_for_each_entry+0x78/0xc0
    [<ffffffff81450efa>] apei_exec_collect_resources+0x1a/0x20
    [<ffffffff81d89b9b>] erst_init+0xfd/0x314
    [<ffffffff81002148>] do_one_initcall+0xd8/0x210
    [<ffffffff81d411dd>] kernel_init_freeable+0x192/0x22e
    [<ffffffff81767abe>] kernel_init+0xe/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff881fafcbdd20 (size 32):
  comm "swapper/0", pid 1, jiffies 4294671332 (age 4303.330s)
  hex dump (first 32 bytes):
    98 bd f0 b2 1f 88 ff ff e0 dc cb af 1f 88 ff ff  ................
    0c 00 2d bd 00 00 00 00 17 00 2d bd 00 00 00 00  ..-.......-.....
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f99cc>] kmem_cache_alloc_trace+0x1dc/0x260
    [<ffffffff81451283>] apei_res_add+0xc3/0x120
    [<ffffffff814513c2>] collect_res_callback+0xa2/0xc0
    [<ffffffff81450e78>] apei_exec_for_each_entry+0x78/0xc0
    [<ffffffff81450efa>] apei_exec_collect_resources+0x1a/0x20
    [<ffffffff81d89b9b>] erst_init+0xfd/0x314
    [<ffffffff81002148>] do_one_initcall+0xd8/0x210
    [<ffffffff81d411dd>] kernel_init_freeable+0x192/0x22e
    [<ffffffff81767abe>] kernel_init+0xe/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff881fafcbdd40 (size 32):
  comm "swapper/0", pid 1, jiffies 4294671332 (age 4303.330s)
  hex dump (first 32 bytes):
    a8 bd f0 b2 1f 88 ff ff a8 bd f0 b2 1f 88 ff ff  ................
    b2 00 00 00 00 00 00 00 b3 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f99cc>] kmem_cache_alloc_trace+0x1dc/0x260
    [<ffffffff81451283>] apei_res_add+0xc3/0x120
    [<ffffffff814513a8>] collect_res_callback+0x88/0xc0
    [<ffffffff81450e78>] apei_exec_for_each_entry+0x78/0xc0
    [<ffffffff81450efa>] apei_exec_collect_resources+0x1a/0x20
    [<ffffffff81d89b9b>] erst_init+0xfd/0x314
    [<ffffffff81002148>] do_one_initcall+0xd8/0x210
    [<ffffffff81d411dd>] kernel_init_freeable+0x192/0x22e
    [<ffffffff81767abe>] kernel_init+0xe/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff881fafcbdd00 (size 32):
  comm "swapper/0", pid 1, jiffies 4294671332 (age 4303.330s)
  hex dump (first 32 bytes):
    e0 dc cb af 1f 88 ff ff 98 bd f0 b2 1f 88 ff ff  ................
    71 00 2d bd 00 00 00 00 7d 00 2d bd 00 00 00 00  q.-.....}.-.....
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f99cc>] kmem_cache_alloc_trace+0x1dc/0x260
    [<ffffffff81451283>] apei_res_add+0xc3/0x120
    [<ffffffff814513c2>] collect_res_callback+0xa2/0xc0
    [<ffffffff81450e78>] apei_exec_for_each_entry+0x78/0xc0
    [<ffffffff81450efa>] apei_exec_collect_resources+0x1a/0x20
    [<ffffffff81d89b9b>] erst_init+0xfd/0x314
    [<ffffffff81002148>] do_one_initcall+0xd8/0x210
    [<ffffffff81d411dd>] kernel_init_freeable+0x192/0x22e
    [<ffffffff81767abe>] kernel_init+0xe/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff881fafcbdd60 (size 32):
  comm "swapper/0", pid 1, jiffies 4294671332 (age 4303.349s)
  hex dump (first 32 bytes):
    28 bd f0 b2 1f 88 ff ff 28 bd f0 b2 1f 88 ff ff  (.......(.......
    00 00 00 e0 00 00 00 00 00 00 00 f0 00 00 00 00  ................
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f99cc>] kmem_cache_alloc_trace+0x1dc/0x260
    [<ffffffff81451283>] apei_res_add+0xc3/0x120
    [<ffffffff8145131a>] apei_get_res_callback+0x1a/0x20
    [<ffffffff81636e64>] pci_mmcfg_for_each_region+0x54/0x80
    [<ffffffff814519ae>] apei_resources_request+0xce/0x320
    [<ffffffff81d89bb1>] erst_init+0x113/0x314
    [<ffffffff81002148>] do_one_initcall+0xd8/0x210
    [<ffffffff81d411dd>] kernel_init_freeable+0x192/0x22e
    [<ffffffff81767abe>] kernel_init+0xe/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff887fb33ec000 (size 8192):
  comm "kworker/0:0", pid 4, jiffies 4294673526 (age 4301.169s)
  hex dump (first 32 bytes):
    00 82 e8 ae 1f 88 ff ff 80 82 e8 ae 1f 88 ff ff  ................
    00 83 e8 ae 1f 88 ff ff 80 83 e8 ae 1f 88 ff ff  ................
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811fa3fc>] __kmalloc+0x20c/0x2d0
    [<ffffffffa0069bff>] megasas_alloc_cmds_fusion+0x1cf/0x6f0 [megaraid_sas]
    [<ffffffffa006abe0>] megasas_init_adapter_fusion+0x140/0x5a0 [megaraid_sas]
    [<ffffffffa0067590>] megasas_probe_one+0x9e0/0x1a00 [megaraid_sas]
    [<ffffffff813de065>] local_pci_probe+0x45/0xa0
    [<ffffffff810afcb8>] work_for_cpu_fn+0x18/0x30
    [<ffffffff810b2feb>] process_one_work+0x14b/0x400
    [<ffffffff810b3b2c>] worker_thread+0x1bc/0x470
    [<ffffffff810b8878>] kthread+0xd8/0xf0
    [<ffffffff817786fc>] ret_from_fork+0x7c/0xb0
    [<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff887fae847ab0 (size 72):
  comm "systemd-udevd", pid 1342, jiffies 4294685829 (age 4288.978s)
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 0e 03 01 00 04 00 00 00  ................
    00 96 e2 ae 7f 88 ff ff 42 00 00 00 00 00 00 00  ........B.......
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811f9770>] kmem_cache_alloc+0x1d0/0x250
    [<ffffffff8144722a>] acpi_ut_allocate_object_desc_dbg+0x40/0x6d
    [<ffffffff814472ca>] acpi_ut_create_internal_object_dbg+0x25/0x8a
    [<ffffffff814473f4>] acpi_ut_create_buffer_object+0x2a/0x81
    [<ffffffff81433c3f>] acpi_ex_write_data_to_field+0x12c/0x217
    [<ffffffff81437e9e>] acpi_ex_store_object_to_node+0xc1/0xf1
    [<ffffffff81437fa0>] acpi_ex_store+0xd2/0x273
    [<ffffffff814353f3>] acpi_ex_opcode_1A_1T_1R+0x3ed/0x526
    [<ffffffff8142d0c9>] acpi_ds_exec_end_op+0xd0/0x3ef
    [<ffffffff8143faeb>] acpi_ps_parse_loop+0x531/0x597
    [<ffffffff814405f6>] acpi_ps_parse_aml+0x99/0x271
    [<ffffffff81440e30>] acpi_ps_execute_method+0x1c0/0x264
    [<ffffffff8143b483>] acpi_ns_evaluate+0x1c3/0x24f
    [<ffffffff8143df2a>] acpi_evaluate_object+0x14b/0x25b
    [<ffffffffa017af81>] read_capabilities+0x71/0x260 [acpi_power_meter]
unreferenced object 0xffff887faee29600 (size 96):
  comm "systemd-udevd", pid 1342, jiffies 4294685829 (age 4289.079s)
  hex dump (first 32 bytes):
    00 04 00 ea 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<ffffffff8176b31e>] kmemleak_alloc+0x4e/0xc0
    [<ffffffff811fa3fc>] __kmalloc+0x20c/0x2d0
    [<ffffffff81447036>] acpi_os_allocate_zeroed+0x35/0x37
    [<ffffffff8144740b>] acpi_ut_create_buffer_object+0x41/0x81
    [<ffffffff81433c3f>] acpi_ex_write_data_to_field+0x12c/0x217
    [<ffffffff81437e9e>] acpi_ex_store_object_to_node+0xc1/0xf1
    [<ffffffff81437fa0>] acpi_ex_store+0xd2/0x273
    [<ffffffff814353f3>] acpi_ex_opcode_1A_1T_1R+0x3ed/0x526
    [<ffffffff8142d0c9>] acpi_ds_exec_end_op+0xd0/0x3ef
    [<ffffffff8143faeb>] acpi_ps_parse_loop+0x531/0x597
    [<ffffffff814405f6>] acpi_ps_parse_aml+0x99/0x271
    [<ffffffff81440e30>] acpi_ps_execute_method+0x1c0/0x264
    [<ffffffff8143b483>] acpi_ns_evaluate+0x1c3/0x24f
    [<ffffffff8143df2a>] acpi_evaluate_object+0x14b/0x25b
    [<ffffffffa017af81>] read_capabilities+0x71/0x260 [acpi_power_meter]
    [<ffffffffa017b4b5>] acpi_power_meter_add+0xe5/0x16a [acpi_power_meter]
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ