Received: by 10.213.65.16 with SMTP id m16csp134099imf; Sun, 11 Mar 2018 19:59:28 -0700 (PDT) X-Google-Smtp-Source: AG47ELtpGXRQQXTlbmrQwdMs2nLOazE++eLFtIikI1M+PxKfBrfrxNoDNeb43/5bbZ5SoTIaZVxc X-Received: by 2002:a17:902:7282:: with SMTP id d2-v6mr6617429pll.303.1520823568764; Sun, 11 Mar 2018 19:59:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520823568; cv=none; d=google.com; s=arc-20160816; b=Fh++JoNHQLQq7qPJWgzQ4Evd0MNvlTDbvpUN/BwGFr+zVKS/zvrh31OaKV/6Dd6Z3k vuoJyPhZxvQ9b6noknx7MpHllGIC2nbxFRv/JgcWeAmlVuIXFDfSSLOOX1C60KDgUaAW MeM1V053jzytPXUOZYFluS2DTdZ3g9gI2eRMembOXG/9RpmL6MSjL/EMsJLF9JmJlKXZ aleSH9uXytkBzB8TC4AIcE4KfwHy/hJJKA6EkgYo6mZx2nqWv1frO8xyhs78Qg9SDZUy cgfc4+BYOPOy060tqIMIi2T9t+78svLyRS7hz26HW6heybzBXps+Vbq7HMyVAtinLKlA FTZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:mime-version:user-agent:date:message-id:subject :from:to:dkim-signature:arc-authentication-results; bh=ZizGJAwAjdRxctnpUeOUmgHa0JYvem5mVUBXVKdFPEY=; b=HWUN6A+1H4uqnbAenZa/8cBf7Iqa/9cfIhRWQlvUqPE8YjjnikHvZWYr9ZHtqOyCal VoH/6L8dQmmW/qYPqUdzBFsQgRP2xPZdAJBz3hUjTC5PLETns0Khw18roltzup2oG48B F2cOUOkPMV8CWZbtVlzmzE6D24lRStGS1Arj4u554EJ9KwwsHcqW9TIb5AAh74QtlgWl SlsV8jtWLd35ZEEkfVcF4oh1Oc+dbLLZUpCc6nrTcW76Hhm/OZSsytb/VItaEX7jSFX2 RLmwNt9MxKWy6xoRsJftc/HQqXV39Hlio1dARiQSKu9B+elm5HJsy86qQdVszIES4X8j b96Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=fYIAQrgA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h130si4380169pgc.780.2018.03.11.19.59.13; Sun, 11 Mar 2018 19:59:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=fYIAQrgA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932570AbeCLC6V (ORCPT + 99 others); Sun, 11 Mar 2018 22:58:21 -0400 Received: from mail-oi0-f49.google.com ([209.85.218.49]:38458 "EHLO mail-oi0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932437AbeCLC6U (ORCPT ); Sun, 11 Mar 2018 22:58:20 -0400 Received: by mail-oi0-f49.google.com with SMTP id h23so11165665oib.5 for ; Sun, 11 Mar 2018 19:58:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:to:from:subject:message-id:date:user-agent:mime-version :content-language:content-transfer-encoding; bh=ZizGJAwAjdRxctnpUeOUmgHa0JYvem5mVUBXVKdFPEY=; b=fYIAQrgAidBSQf8k6YTY/W0Te9Yu91TdHkP4rtZf627kU4QOK60lqhGecTcgs8R/zQ 3zpUo3hKZKSLU3vnhx3ZAnSPQjUJUoCp9jgPg7nVmliRvoTibKi9jlwQVGQMvKYQtGJG Rqq8xM3ywmrH5USOvSUuVjNOIED4ApB8oNmtgq8uDJSqbbLTxr6pb+pS85JsMdwP+zel Wjgb4PPySu7HrqukWr6xWUxJkVHgH6s5LB8R+W0tdjNUHmzTjAo8SDx6SQ08vbFD4rP/ Ii6PJZQ/YX8j5qSFkTvr+TYggQqdmFpCikSHDh+YyF/0/LLMj2CcflCMgGGKV1fq9GG9 FYBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:to:from:subject:message-id:date :user-agent:mime-version:content-language:content-transfer-encoding; bh=ZizGJAwAjdRxctnpUeOUmgHa0JYvem5mVUBXVKdFPEY=; b=IMmrDgfLZCpZmamqNNugD18LIEJaIhsEoWCBFWPwUTvdaNV1QbpBHXDAA/sATd0HCv BrwcGquymFEO0A07/y7kqb8IRPS6MFDK8Gl7kxm52NbUX/WXPxZfJ/1GdNCWHp8yKB2I Dm5awXOPb7UyCdvI4vkUF0+qp53XAt7GDm5SgtKB/YyI7A0T3kmGsCpjFju2CuwVbjdl yAzpfssuSqG2CP/oAdruv2RK2Xc4Mxzvi3TlPOOrp7QkiPyYDsNdc9JfAalLvbvJrKEd O1eRymImS/vid8gw1GAL78q6jBpVIrd1C5C9T8btu3EOSl+sic/WtB3FCjoXXOBxuXau YQWw== X-Gm-Message-State: AElRT7Fs85JyOniU9ScJk0booTGw2og2CyrGRB8Eo7AiFQw9ApIKc9xg vO8RR84ZBjZo+jIqtAT5eXPtIQ== X-Received: by 10.202.204.203 with SMTP id c194mr4189343oig.156.1520823499650; Sun, 11 Mar 2018 19:58:19 -0700 (PDT) Received: from [192.168.1.106] (cpe-24-31-251-255.kc.res.rr.com. [24.31.251.255]) by smtp.gmail.com with ESMTPSA id 111sm3318634oty.64.2018.03.11.19.58.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 11 Mar 2018 19:58:19 -0700 (PDT) To: LKML From: Larry Finger Subject: Possible memory leak in acpi_ut_create_internal_object_dbg() in 4.16-rcX Message-ID: <002b1e6f-f1e8-c9e9-0083-a2bb8fb26c42@lwfinger.net> Date: Sun, 11 Mar 2018 21:58:22 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Running kernel 4.16-rcX, kmemleak complains about a leak of one object. This is linux-ubqc:~ # echo scan > /sys/kernel/debug/kmemleak linux-ubqc:~ # cat /sys/kernel/debug/kmemleak unreferenced object 0xffff8802263b2630 (size 72): comm "swapper/0", pid 1, jiffies 4294892345 (age 8143.468s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 0e 14 01 00 00 05 00 00 ................ 00 00 00 00 00 00 00 00 b8 01 1d 26 02 88 ff ff ...........&.... backtrace: [<00000000a4d7a095>] acpi_ut_create_internal_object_dbg+0x4d/0x10e [<0000000091af3dcd>] acpi_ds_build_internal_object+0xed/0x1cd [<00000000c23098e0>] acpi_ds_build_internal_package_obj+0x1e6/0x32d [<00000000130427ae>] acpi_ds_eval_data_object_operands+0x178/0x218 [<0000000096a9eea7>] acpi_ds_exec_end_op+0x429/0x6b7 [<00000000bf84c466>] acpi_ps_parse_loop+0x919/0x9b1 [<0000000038521867>] acpi_ps_parse_aml+0x1a2/0x4af [<00000000f5588116>] acpi_ds_execute_arguments+0x184/0x1c3 [<000000004cdf7505>] acpi_ds_get_package_arguments+0xf8/0x124 [<00000000d3e97ad0>] acpi_ns_init_one_object+0xca/0x133 [<000000006c8e6828>] acpi_ns_walk_namespace+0x134/0x283 [<00000000d83f628d>] acpi_walk_namespace+0xf5/0x13d [<0000000031cfada2>] acpi_ns_initialize_objects+0x103/0x1fe [<00000000001d0e25>] acpi_initialize_objects+0x47/0xd4 [<000000005e2d42df>] acpi_init+0xc7/0x340 [<000000000ef98997>] do_one_initcall+0x4e/0x18d Using gdb to find the offending source line returns: 99 /* Allocate the raw object descriptor */ 100 101 object = 102 acpi_ut_allocate_object_desc_dbg(module_name, line_number, 103 component_id); 104 if (!object) { 105 return_PTR(NULL); 106 } 107 108 switch (type) { My suspicion is that this is a false positive, and a kmemleak_not_leak() call is likely appropriate, but that decision should be made at a higher level. I am not sure why kmemleak is triggering on this. Most of the relevant code is more than 10 years old. Although leaking a single object is not serious, I prefer to eliminate it to ensure that every leak mentioned in the logs is something that I need to address. This is particularly important when I am debugging a driver. Thanks, Larry