[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7a853278-da2f-edaa-3db5-353e6b2bbe29@canonical.com>
Date: Wed, 30 Aug 2017 21:20:17 -0700
From: John Johansen <john.johansen@...onical.com>
To: Jakub Kicinski <kubakici@...pl>, linux-kernel@...r.kernel.org
Subject: Re: Apparmor memory leak reports
On 08/30/2017 06:28 PM, Jakub Kicinski wrote:
> Hi!
>
> I'm seeing a lot of kmemleak reports like this on 4.13.0-rc6:
>
yep, thanks for the report. I have seen this one and am still trying
to chase it down.
> unreferenced object 0xffff88045e62ab08 (size 1024):
> comm "apparmor_parser", pid 802, jiffies 4294913386 (age 4794.692s)
> hex dump (first 32 bytes):
> 0c 1b 30 6b 04 88 ff ff 0c 1b 30 6b 04 88 ff ff ..0k......0k....
> 18 ab 62 5e 04 88 ff ff 18 ab 62 5e 04 88 ff ff ..b^......b^....
> backtrace:
> [<ffffffff866a8b68>] kmemleak_alloc+0x28/0x50
> [<ffffffff849a5376>] kmem_cache_alloc_trace+0x1e6/0x550
> [<ffffffff851bc40d>] aa_alloc_profile+0x5d/0x220
> [<ffffffff851c6d39>] unpack_profile+0x449/0x2530
> [<ffffffff851ca8b7>] aa_unpack+0x447/0x151c
> [<ffffffff851bf994>] aa_replace_profiles+0x254/0x3f00
> [<ffffffff8518f8e3>] policy_update+0x433/0x720
> [<ffffffff8518fd0a>] profile_replace+0x13a/0x210
> [<ffffffff84a5eb79>] __vfs_write+0xf9/0xdb0
> [<ffffffff84a65c29>] vfs_write+0x189/0x640
> [<ffffffff84a6b3a7>] SyS_write+0xf7/0x240
> [<ffffffff866c8cee>] entry_SYSCALL_64_fastpath+0x1c/0xb1
> [<ffffffffffffffff>] 0xffffffffffffffff
>
> unreferenced object 0xffff88046b301b08 (size 32):
> comm "apparmor_parser", pid 802, jiffies 4294913386 (age 4797.788s)
> hex dump (first 32 bytes):
> 01 00 00 00 2f 73 62 69 6e 2f 64 68 63 6c 69 65 ..../sbin/dhclie
> 6e 74 00 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b 6b a5 nt.kkkkkkkkkkkk.
> backtrace:
> [<ffffffff866a8b68>] kmemleak_alloc+0x28/0x50
> [<ffffffff849a4d94>] __kmalloc+0x204/0x600
> [<ffffffff8519e18e>] aa_str_alloc+0x5e/0x120
> [<ffffffff851a10a2>] aa_policy_init+0x2a2/0x370
> [<ffffffff851bc438>] aa_alloc_profile+0x88/0x220
> [<ffffffff851c6d39>] unpack_profile+0x449/0x2530
> [<ffffffff851ca8b7>] aa_unpack+0x447/0x151c
> [<ffffffff851bf994>] aa_replace_profiles+0x254/0x3f00
> [<ffffffff8518f8e3>] policy_update+0x433/0x720
> [<ffffffff8518fd0a>] profile_replace+0x13a/0x210
> [<ffffffff84a5eb79>] __vfs_write+0xf9/0xdb0
> [<ffffffff84a65c29>] vfs_write+0x189/0x640
> [<ffffffff84a6b3a7>] SyS_write+0xf7/0x240
> [<ffffffff866c8cee>] entry_SYSCALL_64_fastpath+0x1c/0xb1
> [<ffffffffffffffff>] 0xffffffffffffffff
>
> unreferenced object 0xffff8803fdc50008 (size 8192):
> comm "apparmor_parser", pid 802, jiffies 4294913386 (age 4827.224s)
> hex dump (first 32 bytes):
> 06 00 04 00 00 00 00 00 b1 04 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<ffffffff866a8b68>] kmemleak_alloc+0x28/0x50
> [<ffffffff849a9785>] __kmalloc_node+0x385/0x670
> [<ffffffff8485620b>] kvmalloc_node+0x4b/0x80
> [<ffffffff851a170d>] aa_dfa_unpack+0x41d/0x1de0
> [<ffffffff851c5c4f>] unpack_dfa+0x14f/0x3d0
> [<ffffffff851c7499>] unpack_profile+0xba9/0x2530
> [<ffffffff851ca8b7>] aa_unpack+0x447/0x151c
> [<ffffffff851bf994>] aa_replace_profiles+0x254/0x3f00
> [<ffffffff8518f8e3>] policy_update+0x433/0x720
> [<ffffffff8518fd0a>] profile_replace+0x13a/0x210
> [<ffffffff84a5eb79>] __vfs_write+0xf9/0xdb0
> [<ffffffff84a65c29>] vfs_write+0x189/0x640
> [<ffffffff84a6b3a7>] SyS_write+0xf7/0x240
> [<ffffffff866c8cee>] entry_SYSCALL_64_fastpath+0x1c/0xb1
> [<ffffffffffffffff>] 0xffffffffffffffff
>
> I'm running Ubuntu 14.04 user space on that machine.
>
Powered by blists - more mailing lists