Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758216AbZFYTcS (ORCPT ); Thu, 25 Jun 2009 15:32:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753324AbZFYTcI (ORCPT ); Thu, 25 Jun 2009 15:32:08 -0400 Received: from mx2.redhat.com ([66.187.237.31]:42942 "EHLO mx2.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754443AbZFYTcH (ORCPT ); Thu, 25 Jun 2009 15:32:07 -0400 Date: Thu, 25 Jun 2009 15:31:45 -0400 From: Dave Jones To: Catalin Marinas Cc: Linux Kernel Subject: Re: kmemleak false positive? Message-ID: <20090625193145.GA2600@redhat.com> Mail-Followup-To: Dave Jones , Catalin Marinas , Linux Kernel References: <20090625001137.GB22755@redhat.com> <1245921918.26218.19.camel@pc1117.cambridge.arm.com> <20090625145600.GA6654@redhat.com> <1245943539.26218.70.camel@pc1117.cambridge.arm.com> <20090625154014.GA7866@redhat.com> <1245949202.26218.88.camel@pc1117.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1245949202.26218.88.camel@pc1117.cambridge.arm.com> User-Agent: Mutt/1.5.19 (2009-01-05) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1849 Lines: 40 On Thu, Jun 25, 2009 at 06:00:02PM +0100, Catalin Marinas wrote: > On Thu, 2009-06-25 at 11:40 -0400, Dave Jones wrote: > > Here's another case (with stack scanning on btw) which looks odd.. > > > > kmemleak: unreferenced object 0xd86ba000 (size 16): > > kmemleak: comm "init", pid 1, jiffies 4294683556 > > kmemleak: backtrace: > > kmemleak: [] kmemleak_alloc+0x193/0x2b8 > > kmemleak: [] kmem_cache_alloc+0x11e/0x174 > > kmemleak: [] avtab_insertf+0xd6/0x140 > > kmemleak: [] avtab_read_item+0x26a/0x284 > > kmemleak: [] avtab_read+0x82/0xe5 > > kmemleak: [] policydb_read+0x40c/0x1028 > > kmemleak: [] security_load_policy+0x57/0x37c > > kmemleak: [] sel_write_load+0xb2/0x54a > > kmemleak: [] vfs_write+0x9f/0x10f > > kmemleak: [] sys_write+0x58/0x8d > > kmemleak: [] sysenter_do_call+0x12/0x38 > > kmemleak: [] 0xffffffff > > > > I looked over the SELinux code, and couldn't see an obvious leak. > > Eric Paris came to the same conclusion. > > How long does a memory scanning take (i.e. time cat debug/kmemleak) on > your platform? Another tweak is to increase MSECS_MIN_AGE to something > like 1 minute or more. Especially on SMP, some newly allocated objects > may be in registers and reported as leaks. 0.00user 16.15system 0:33.38elapsed 48%CPU (0avgtext+0avgdata 0maxresident)k 0inputs+0outputs (0major+158minor)pagefaults 0swaps This is a VIA C3 with 512MB of RAM. Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/