From mboxrd@z Thu Jan 1 00:00:00 1970
From: bugzilla-daemon@bugzilla.kernel.org
Subject: [Bug 60121] New: -next and -mm: kmemleak reports 6 leaks in
ext4_mount paths
Date: Tue, 25 Jun 2013 18:25:04 +0000 (UTC)
Message-ID:
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
To: linux-ext4@vger.kernel.org
Return-path:
Received: from mail.kernel.org ([198.145.19.201]:35693 "EHLO mail.kernel.org"
rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP
id S1751005Ab3FYSZJ (ORCPT );
Tue, 25 Jun 2013 14:25:09 -0400
Received: from mail.kernel.org (localhost [127.0.0.1])
by mail.kernel.org (Postfix) with ESMTP id 8E80D20396
for ; Tue, 25 Jun 2013 18:25:07 +0000 (UTC)
Received: from bugzilla.kernel.org (bugzilla.kernel.org [198.145.19.217])
by mail.kernel.org (Postfix) with ESMTP id 6DCF32038B
for ; Tue, 25 Jun 2013 18:25:05 +0000 (UTC)
Sender: linux-ext4-owner@vger.kernel.org
List-ID:
https://bugzilla.kernel.org/show_bug.cgi?id=60121
Summary: -next and -mm: kmemleak reports 6 leaks in ext4_mount
paths
Product: File System
Version: 2.5
Kernel Version: v3.10-rc6-684-g9dcc58c
Platform: All
OS/Version: Linux
Tree: -mm
Status: NEW
Severity: normal
Priority: P1
Component: ext4
AssignedTo: fs_ext4@kernel-bugs.osdl.org
ReportedBy: jmesmon@gmail.com
Regression: Yes
Created an attachment (id=106021)
--> (https://bugzilla.kernel.org/attachment.cgi?id=106021)
.config
In next-20130624, next-20130625 and mmotm (v3.10-rc6-684-g9dcc58c), kmemleak
complains about some ext4_mount related allocations.
----
# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff880002a6dd80 (size 256):
comm "swapper/0", pid 1, jiffies 4294892475 (age 33.128s)
hex dump (first 32 bytes):
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
ff ff ff ff ff ff ff ff 0c 0d 36 82 ff ff ff ff ..........6.....
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] list_lru_init+0x21/0xb0
[] sget+0x305/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
unreferenced object 0xffff880002a6d980 (size 256):
comm "swapper/0", pid 1, jiffies 4294892475 (age 33.128s)
hex dump (first 32 bytes):
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
ff ff ff ff ff ff ff ff 0c 0d 36 82 ff ff ff ff ..........6.....
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] list_lru_init+0x21/0xb0
[] sget+0x319/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
unreferenced object 0xffff880002a7a7a0 (size 32):
comm "swapper/0", pid 1, jiffies 4294892475 (age 33.128s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] register_shrinker+0x7e/0xa0
[] sget+0x59e/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
unreferenced object 0xffff88000692b1c0 (size 256):
comm "swapper/0", pid 1, jiffies 4294892648 (age 32.500s)
hex dump (first 32 bytes):
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
ff ff ff ff ff ff ff ff 0c 0d 36 82 ff ff ff ff ..........6.....
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] list_lru_init+0x21/0xb0
[] sget+0x305/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
unreferenced object 0xffff88000692b2c0 (size 256):
comm "swapper/0", pid 1, jiffies 4294892648 (age 32.500s)
hex dump (first 32 bytes):
00 00 00 00 ad 4e ad de ff ff ff ff 00 00 00 00 .....N..........
ff ff ff ff ff ff ff ff 0c 0d 36 82 ff ff ff ff ..........6.....
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] list_lru_init+0x21/0xb0
[] sget+0x319/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
unreferenced object 0xffff880006916780 (size 32):
comm "swapper/0", pid 1, jiffies 4294892648 (age 32.500s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] kmemleak_alloc+0x21/0x50
[] __kmalloc+0x103/0x460
[] register_shrinker+0x7e/0xa0
[] sget+0x59e/0x670
[] mount_bdev+0xba/0x1e0
[] ext4_mount+0x10/0x20
[] mount_fs+0x10/0xc0
[] vfs_kern_mount+0x5a/0xf0
[] do_mount+0x1da/0x9d0
[] SyS_mount+0x7e/0xc0
[] mount_block_root+0x104/0x223
[] mount_root+0xf1/0xfa
[] prepare_namespace+0x130/0x168
[] kernel_init_freeable+0x185/0x192
[] kernel_init+0x9/0x180
[] ret_from_fork+0x7c/0xb0
#
--
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.