Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752877AbXLCJ02 (ORCPT ); Mon, 3 Dec 2007 04:26:28 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750908AbXLCJ0V (ORCPT ); Mon, 3 Dec 2007 04:26:21 -0500 Received: from mailhub.sw.ru ([195.214.233.200]:8360 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750715AbXLCJ0U (ORCPT ); Mon, 3 Dec 2007 04:26:20 -0500 Date: Mon, 3 Dec 2007 12:26:07 +0300 From: Alexey Dobriyan To: gregkh@suse.de, akpm@osdl.org Cc: linux-kernel@vger.kernel.org, kay.sievers@vrfy.org Subject: kobject ->k_name memory leak Message-ID: <20071203092607.GA22477@localhost.sw.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.11 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 849 Lines: 21 Hi, Greg! Commit ce2c9cb0259acd2aed184499ebe41ab00da13b25 aka "kobject: remove the static array for the name" introduced memory leak of a module name after modprobe/rmmod. Apparently for modules ->release callback is NULL. kobject_cleanup: ->release = 00000000, name = 'foo_sysctl' Pid: 1927, comm: rmmod Not tainted 2.6.24-rc3-e1cca7e8d484390169777b423a7fe46c7021fec1 #5 [] kobject_cleanup+0xb8/0xc0 [] kobject_release+0x0/0x10 [] kref_put+0x2b/0xa0 [] _spin_unlock+0x25/0x40 [] free_module+0x78/0xd0 [] sys_delete_module+0x12f/0x1a0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/