Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753804AbZGRU36 (ORCPT ); Sat, 18 Jul 2009 16:29:58 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753763AbZGRU34 (ORCPT ); Sat, 18 Jul 2009 16:29:56 -0400 Received: from mail.gmx.net ([213.165.64.20]:37793 "HELO mail.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S1753744AbZGRU3z (ORCPT ); Sat, 18 Jul 2009 16:29:55 -0400 X-Authenticated: #23875046 X-Provags-ID: V01U2FsdGVkX197YP5OVFx7qMdnpgI+pPm4tktA4/8DJNwxtAXhVZ LVLmwVWPESttX5 Message-ID: <4A6230C0.6000509@fisher-privat.net> Date: Sat, 18 Jul 2009 22:29:52 +0200 From: Alexey Fisher User-Agent: Thunderbird 2.0.0.22 (X11/20090710) MIME-Version: 1.0 To: Catalin Marinas CC: Kernel Testers List , "linux-kernel@vger.kernel.org" Subject: [kmemleak] 60 wornings on sysfs_new_dirent+0x10c References: <4A5C20E5.6010203@fisher-privat.net> <84144f020907140019g511723dctb541f6333d1a082b@mail.gmail.com> <4A5C41C8.7040904@fisher-privat.net> <1247564356.28240.30.camel@pc1117.cambridge.arm.com> In-Reply-To: <1247564356.28240.30.camel@pc1117.cambridge.arm.com> X-Enigmail-Version: 0.95.6 Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Y-GMX-Trusted: 0 X-FuHaFi: 0.51 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 6476 Lines: 141 I getting a lot of sysfs_new_dirent warnings with latest ARM git. this message come if my usb-cardreader is attached. this are first sysfs_new_dirent warnings: ====================================================== unreferenced object 0xffff880133c580a0 (size 8): comm "khubd", pid 218, jiffies 4294893605 hex dump (first 8 bytes): 31 2d 36 00 01 88 ff ff 1-6..... backtrace: [] kmemleak_alloc+0x25/0x60 [] __kmalloc_track_caller+0x10b/0x200 [] kstrdup+0x40/0x70 [] sysfs_new_dirent+0x10c/0x120 [] create_dir+0x3d/0xb0 [] sysfs_create_dir+0x34/0x50 [] kobject_add_internal+0xb7/0x200 [] kobject_add_varg+0x38/0x60 [] kobject_add+0x44/0x70 [] device_add+0x118/0x5d0 [] usb_new_device+0x6d/0xe0 [] hub_thread+0x878/0x1280 [] kthread+0x96/0xa0 [] child_rip+0xa/0x20 [] 0xffffffffffffffff unreferenced object 0xffff880133c653c0 (size 80): comm "khubd", pid 218, jiffies 4294893605 hex dump (first 32 bytes): 01 00 00 00 00 00 00 80 10 2e 1c 34 01 88 ff ff ...........4.... 00 00 00 00 00 00 00 00 a0 80 c5 33 01 88 ff ff ...........3.... backtrace: [] kmemleak_alloc+0x25/0x60 [] kmem_cache_alloc+0xfb/0x180 [] sysfs_new_dirent+0x3c/0x120 [] create_dir+0x3d/0xb0 [] sysfs_create_dir+0x34/0x50 [] kobject_add_internal+0xb7/0x200 [] kobject_add_varg+0x38/0x60 [] kobject_add+0x44/0x70 [] device_add+0x118/0x5d0 [] usb_new_device+0x6d/0xe0 [] hub_thread+0x878/0x1280 [] kthread+0x96/0xa0 [] child_rip+0xa/0x20 [] 0xffffffffffffffff unreferenced object 0xffff880133c580e8 (size 8): comm "khubd", pid 218, jiffies 4294893605 hex dump (first 8 bytes): 31 2d 36 3a 31 2e 30 00 1-6:1.0. backtrace: [] kmemleak_alloc+0x25/0x60 [] __kmalloc_track_caller+0x10b/0x200 [] kstrdup+0x40/0x70 [] sysfs_new_dirent+0x10c/0x120 [] create_dir+0x3d/0xb0 [] sysfs_create_dir+0x34/0x50 [] kobject_add_internal+0xb7/0x200 [] kobject_add_varg+0x38/0x60 [] kobject_add+0x44/0x70 [] device_add+0x118/0x5d0 [] usb_set_configuration+0x444/0x740 [] generic_probe+0x32/0xb0 [] usb_probe_device+0x25/0x30 [] driver_probe_device+0x86/0x180 [] __device_attach+0x4b/0x50 [] bus_for_each_drv+0x68/0x90 unreferenced object 0xffff880133cf2b40 (size 80): comm "khubd", pid 218, jiffies 4294893605 hex dump (first 32 bytes): 01 00 00 00 00 00 00 80 c0 53 c6 33 01 88 ff ff .........S.3.... 00 00 00 00 00 00 00 00 e8 80 c5 33 01 88 ff ff ...........3.... backtrace: [] kmemleak_alloc+0x25/0x60 [] kmem_cache_alloc+0xfb/0x180 [] sysfs_new_dirent+0x3c/0x120 [] create_dir+0x3d/0xb0 [] sysfs_create_dir+0x34/0x50 [] kobject_add_internal+0xb7/0x200 [] kobject_add_varg+0x38/0x60 [] kobject_add+0x44/0x70 [] device_add+0x118/0x5d0 [] usb_set_configuration+0x444/0x740 [] generic_probe+0x32/0xb0 [] usb_probe_device+0x25/0x30 [] driver_probe_device+0x86/0x180 [] __device_attach+0x4b/0x50 [] bus_for_each_drv+0x68/0x90 [] device_attach+0x86/0x90 =================================================================== dump: ================================================================== [ 604.393175] kmemleak: Object 0xffff880133c580a0 (size 8): [ 604.393179] kmemleak: comm "khubd", pid 218, jiffies 4294893605 [ 604.393180] kmemleak: min_count = 1 [ 604.393182] kmemleak: count = 0 [ 604.393183] kmemleak: flags = 0x3 [ 604.393184] kmemleak: backtrace: [ 604.393186] [] kmemleak_alloc+0x25/0x60 [ 604.393193] [] __kmalloc_track_caller+0x10b/0x200 [ 604.393198] [] kstrdup+0x40/0x70 [ 604.393201] [] sysfs_new_dirent+0x10c/0x120 [ 604.393206] [] create_dir+0x3d/0xb0 [ 604.393209] [] sysfs_create_dir+0x34/0x50 [ 604.393212] [] kobject_add_internal+0xb7/0x200 [ 604.393217] [] kobject_add_varg+0x38/0x60 [ 604.393220] [] kobject_add+0x44/0x70 [ 604.393223] [] device_add+0x118/0x5d0 [ 604.393227] [] usb_new_device+0x6d/0xe0 [ 604.393232] [] hub_thread+0x878/0x1280 [ 604.393235] [] kthread+0x96/0xa0 [ 604.393240] [] child_rip+0xa/0x20 [ 604.393243] [] 0xffffffffffffffff =========================================================================== gdb: ========================================================== (gdb) l *(sysfs_new_dirent+0x10c) 0xffffffff8115ebdc is in sysfs_new_dirent (fs/sysfs/dir.c:315). 310 { 311 char *dup_name = NULL; 312 struct sysfs_dirent *sd; 313 314 if (type & SYSFS_COPY_NAME) { 315 name = dup_name = kstrdup(name, GFP_KERNEL); 316 if (!name) 317 return NULL; 318 } 319 ======================================================= -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/