Received: by 10.223.176.46 with SMTP id f43csp1436094wra; Fri, 19 Jan 2018 11:30:56 -0800 (PST) X-Google-Smtp-Source: ACJfBosP4K6+lHeNm8+1yL3JGppF0xKg7rUH2GK7c166UHiRLyZ/jL2IHJ59CxQdtoBG2Bde25Bw X-Received: by 10.98.61.22 with SMTP id k22mr37872074pfa.133.1516390256041; Fri, 19 Jan 2018 11:30:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516390255; cv=none; d=google.com; s=arc-20160816; b=LhPik/lvis/bVaqXOZvREJK74mkwzCqtt92C9yMe1KmxDJ9zR6U/iijvj0fhhUq92i DHbgb2OAHnRfrqBoCANP7JHRWk9MiKuobNaRmCrJZV584LRqH9Wx/aJaocrCflAX04Fj 0BDHcUtTprnsvek9LrQb0M4WYL8QgIbfHQQQc1JO/2SkD8HZQmskh9Yq0QP1aL5OuOAS PC5eGoY5WSd28zWd/P1V6zzNOoySeIp7BTMf8apJlhoFA8MUuk/s5zazi+HWHqJb1IVG mb0P0NBDF5RPLZRfWSd8YRhv5i4PeC7e3DerGrPllFjkbahGf2U/HP7+eNGk8kfkTwAt OA2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :mime-version:arc-authentication-results; bh=Aml7hGzqUgqCQQrn6/q9x6eZlSylPOYHj8ZaB1WNRug=; b=kOiPzuCce1ffYw3zWZ2WqJgEnECEBxDkuUT9GQGuyaADw+GZM/Sn6xt6jxwYjl7D0W KSy1vGpnEi3p9Yv8DEy1K2q3FYIesihLCv5lT0QO8CdFqj5i7zsPPf1YBGfgUR6sgrb5 DyqvKQOaNT1fJArf7+1Fz8tN+eG7QeCRvJ5t3oliJ12UsfcsEG5KSIjcBjUw6gA7ltp2 /PjqH0XCFi+teJKfz/uFySWVx9GdvGbC7nBKYZOT0LGR0bu1MckcNyazahmz243HFz+S cUfQYsM8muWThLFfD9qBdzN+mm8qIqlNYnL795695uTJbwnM1QqCbHbX0e289c9qtzYn L9Kg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h127si8672625pgc.1.2018.01.19.11.30.40; Fri, 19 Jan 2018 11:30:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756216AbeAST3M (ORCPT + 99 others); Fri, 19 Jan 2018 14:29:12 -0500 Received: from outprodmail02.cc.columbia.edu ([128.59.72.51]:43338 "EHLO outprodmail02.cc.columbia.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756019AbeAST3G (ORCPT ); Fri, 19 Jan 2018 14:29:06 -0500 Received: from hazelnut (hazelnut.cc.columbia.edu [128.59.213.250]) by outprodmail02.cc.columbia.edu (8.14.4/8.14.4) with ESMTP id w0JJQVps053965 for ; Fri, 19 Jan 2018 14:29:05 -0500 Received: from hazelnut (localhost.localdomain [127.0.0.1]) by hazelnut (Postfix) with ESMTP id 7C34589 for ; Fri, 19 Jan 2018 14:29:06 -0500 (EST) Received: from sendprodmail03.cc.columbia.edu (sendprodmail03.cc.columbia.edu [128.59.72.15]) by hazelnut (Postfix) with ESMTP id 1A2678A for ; Fri, 19 Jan 2018 14:29:04 -0500 (EST) Received: from mail-wm0-f72.google.com (mail-wm0-f72.google.com [74.125.82.72]) by sendprodmail03.cc.columbia.edu (8.14.4/8.14.4) with ESMTP id w0JJT2GN064216 (version=TLSv1/SSLv3 cipher=AES128-GCM-SHA256 bits=128 verify=NOT) for ; Fri, 19 Jan 2018 14:29:03 -0500 Received: by mail-wm0-f72.google.com with SMTP id b193so1546491wmd.7 for ; Fri, 19 Jan 2018 11:29:02 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=Aml7hGzqUgqCQQrn6/q9x6eZlSylPOYHj8ZaB1WNRug=; b=MdReghPl7nVM3MqZvH2V9FrURx4dt7W8OhNAIczFjDdFUZkONm1aNyKijmjau3ppKE TOslYmMoNMrgDt2b60X9kFcgHiJczZ+cOPHpSD48iu7tg4XoWb1VcuaYadN2FKA2SvpR riL7T9AQOMwiWKIbPzqU5ahvbBDDXnZIaZ96paY/n4cAmxmaCuNIUW0HEFuzsMC6XE+5 8WHYieT+aNFT6KO8LBMv9Zos+DXElHGeyLPhtLNqniv29KRhx6gY7QXpjkMAGU+4rrx0 XstcD+wFVy6F2vCio16oMQJ7wYofajJsMo3SLOmnraI4LoSPFJd38LuDoPCn3PYluegA osZQ== X-Gm-Message-State: AKwxytfrUaVGUKpcnV/TsvOTwFIFLa+iGm18s4h5/UOAOOi8iMLzOku3 usGS3mNB1vKEuNOk306DBggOi/cO0r0YiS/wvnX4OmpA5PEMYCBZRxds2rdZjnmbymEHVYQc2vI 1+eK90rqCZKBgS0RZmoV2r1QmsO6DVWqTjV4MJ1QHwZQq4ju1 X-Received: by 10.80.179.6 with SMTP id q6mr14138496edd.87.1516390141913; Fri, 19 Jan 2018 11:29:01 -0800 (PST) X-Received: by 10.80.179.6 with SMTP id q6mr14138449edd.87.1516390141216; Fri, 19 Jan 2018 11:29:01 -0800 (PST) MIME-Version: 1.0 Received: by 10.80.241.82 with HTTP; Fri, 19 Jan 2018 11:29:00 -0800 (PST) From: Shankara Pailoor Date: Fri, 19 Jan 2018 11:29:00 -0800 Message-ID: Subject: Possible Memory Leak in KCOV Linux 4.15-rc1 To: Dmitry Vyukov Cc: LKML , syzkaller Content-Type: text/plain; charset="UTF-8" X-No-Spam-Score: Local X-Scanned-By: MIMEDefang 2.78 on 128.59.72.15 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Dmitry, I added support for kcov in strace and I have been tracing a fairly large program but after a little while, I notice that when I mmap a new cover buffer, the call fails with ENOMEM. After killing the program, I try and rerun and I notice that there is nearly no memory on the system. When I do a kmemleak scan I get the following reports: I believe the problem occurs when I try and setup the kcov buffer again after an exec. Instead of reusing the old file descriptor I open kcov again within that process. In that case, I don't know what happens to the old kcov struct. I don't see a maintainers list for kcov so I decided to email you directly. Let me know what more information I can provide. unreferenced object 0xffff8800633f6378 (size 96): comm "runltp", pid 1847, jiffies 4294957922 (age 190.320s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc90008679000 (size 134217728): comm "runltp", pid 1847, jiffies 4294957981 (age 190.261s) hex dump (first 32 bytes): e0 d2 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff8800633f6a58 (size 96): comm "runltp", pid 1848, jiffies 4294958935 (age 189.307s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc9001067a000 (size 134217728): comm "runltp", pid 1848, jiffies 4294958994 (age 189.248s) hex dump (first 32 bytes): 76 db 46 00 00 00 00 00 22 05 73 81 ff ff ff ff v.F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88006516c6e8 (size 96): comm "runltp", pid 1849, jiffies 4294960010 (age 188.242s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc9001867b000 (size 134217728): comm "runltp", pid 1849, jiffies 4294960071 (age 188.181s) hex dump (first 32 bytes): 5d ee 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ].F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88003ed519d0 (size 96): comm "runltp", pid 1850, jiffies 4294961128 (age 187.124s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc900206bd000 (size 134217728): comm "runltp", pid 1850, jiffies 4294961186 (age 187.066s) hex dump (first 32 bytes): b8 e3 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88003ed50c10 (size 96): comm "runltp", pid 1851, jiffies 4294962256 (age 186.004s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc900286ff000 (size 134217728): comm "runltp", pid 1851, jiffies 4294962315 (age 185.946s) hex dump (first 32 bytes): 15 af 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff root@syzkaller:~# cat /sys/kernel/debug/kmemleak unreferenced object 0xffff8800633f6378 (size 96): comm "runltp", pid 1847, jiffies 4294957922 (age 362.452s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc90008679000 (size 134217728): comm "runltp", pid 1847, jiffies 4294957981 (age 362.393s) hex dump (first 32 bytes): e0 d2 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff8800633f6a58 (size 96): comm "runltp", pid 1848, jiffies 4294958935 (age 361.439s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc9001067a000 (size 134217728): comm "runltp", pid 1848, jiffies 4294958994 (age 361.380s) hex dump (first 32 bytes): 76 db 46 00 00 00 00 00 22 05 73 81 ff ff ff ff v.F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88006516c6e8 (size 96): comm "runltp", pid 1849, jiffies 4294960010 (age 360.369s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc9001867b000 (size 134217728): comm "runltp", pid 1849, jiffies 4294960071 (age 360.308s) hex dump (first 32 bytes): 5d ee 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ].F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88003ed519d0 (size 96): comm "runltp", pid 1850, jiffies 4294961128 (age 359.251s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc900206bd000 (size 134217728): comm "runltp", pid 1850, jiffies 4294961186 (age 359.193s) hex dump (first 32 bytes): b8 e3 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffff88003ed50c10 (size 96): comm "runltp", pid 1851, jiffies 4294962256 (age 358.132s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 ad 4e ad de .............N.. ff ff ff ff 00 00 00 00 ff ff ff ff ff ff ff ff ................ backtrace: [] kmem_cache_alloc_trace+0x146/0x2e0 [] kcov_open+0x25/0x80 [] open_proxy_open+0x1e4/0x2b0 [] do_dentry_open+0x682/0xd70 [] vfs_open+0x107/0x230 [] path_openat+0x1157/0x3520 [] do_filp_open+0x25b/0x3b0 [] do_sys_open+0x4fc/0x6c0 [] SyS_open+0x2d/0x40 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff unreferenced object 0xffffc900286ff000 (size 134217728): comm "runltp", pid 1851, jiffies 4294962315 (age 358.073s) hex dump (first 32 bytes): 15 af 46 00 00 00 00 00 22 05 73 81 ff ff ff ff ..F.....".s..... 47 16 73 81 ff ff ff ff 11 16 73 81 ff ff ff ff G.s.......s..... backtrace: [] __vmalloc_node_range+0x387/0x6a0 [] vmalloc_user+0x6c/0x140 [] kcov_mmap+0x2e/0x170 [] mmap_region+0xa9c/0x15a0 [] do_mmap+0x6c6/0xe10 [] vm_mmap_pgoff+0x1de/0x270 [] SyS_mmap_pgoff+0x469/0x610 [] SyS_mmap+0x16/0x20 [] do_syscall_64+0x23b/0x820 [] return_from_SYSCALL_64+0x0/0x75 [] 0xffffffffffffffff