lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20151125125723.GY21147@gandi.net>
Date:	Wed, 25 Nov 2015 13:57:23 +0100
From:	William Dauchy <william@...di.net>
To:	Linux NFS mailing list <linux-nfs@...r.kernel.org>,
	netdev@...r.kernel.org
Subject: kmemleak report with nfs3/4 activity on v4.1.x

Hello,

I'm seeing some kmemleak reports while I'm using nfsv3/4 as a client on
linux v4.1.13;

unreferenced object 0xffff880c22a97ad0 (size 16):
  comm "softirq", pid 0, jiffies 4294896089 (age 43927.436s)
  hex dump (first 16 bytes):
    00 00 00 00 00 00 00 00 00 45 1e 24 06 88 ff ff  .........E.$....
  backtrace:
    [<ffffffff811255fd>] create_object+0x152/0x280
    [<ffffffff81529c04>] kmemleak_alloc+0x20/0x42
    [<ffffffff811136dd>] slab_post_alloc_hook+0x2a/0x45
    [<ffffffff81115c48>] kmem_cache_alloc+0xbc/0xd1
    [<ffffffff81254cef>] gr_update_task_in_ip_table+0x2e/0xc3
    [<ffffffff814701bc>] __inet_hash_connect+0x241/0x30e
    [<ffffffff814702b8>] inet_hash_connect+0x2f/0x3a
    [<ffffffff81484c41>] tcp_v4_connect+0x31f/0x470
    [<ffffffff81499a2b>] __inet_stream_connect+0x9f/0x2c3
    [<ffffffff81499c80>] inet_stream_connect+0x31/0x4d
    [<ffffffff8140d870>] kernel_connect+0x18/0x20
    [<ffffffff81503cb6>] xs_tcp_setup_socket+0x25c/0x37f
    [<ffffffff810724c3>] process_one_work+0x1d0/0x30f
    [<ffffffff81072822>] worker_thread+0x1f0/0x2aa
    [<ffffffff81077cdc>] kthread+0xcd/0xd5
    [<ffffffff8153443e>] ret_from_fork+0x3e/0x70

What can I do to help resolve this issue?

Thanks,
-- 
William

Download attachment "signature.asc" of type "application/pgp-signature" (182 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ