2009-10-15 03:28:20

by Peter Teoh

[permalink] [raw]
Subject: kmemleak errors

cat /sys/kernel/debug/kmemleak gave:

unreferenced object 0xffff8800bd864000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 70 40 86 bd 00 88 ff ff ........p@......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 40 86 bd 00 88 ff ff e0 40 86 bd 00 88 ff ff .@.......@......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8640e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 40 86 bd 00 88 ff ff 50 41 86 bd 00 88 ff ff [email protected]......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 40 86 bd 00 88 ff ff c0 41 86 bd 00 88 ff ff [email protected]......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8641c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 41 86 bd 00 88 ff ff 30 42 86 bd 00 88 ff ff PA......0B......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 41 86 bd 00 88 ff ff a0 42 86 bd 00 88 ff ff .A.......B......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8642a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 42 86 bd 00 88 ff ff 10 43 86 bd 00 88 ff ff 0B.......C......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 42 86 bd 00 88 ff ff 80 43 86 bd 00 88 ff ff .B.......C......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 43 86 bd 00 88 ff ff f0 43 86 bd 00 88 ff ff .C.......C......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8643f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 43 86 bd 00 88 ff ff 60 44 86 bd 00 88 ff ff .C......`D......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 43 86 bd 00 88 ff ff d0 44 86 bd 00 88 ff ff .C.......D......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8644d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 44 86 bd 00 88 ff ff 40 45 86 bd 00 88 ff ff `D......@E......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 44 86 bd 00 88 ff ff b0 45 86 bd 00 88 ff ff .D.......E......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8645b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 45 86 bd 00 88 ff ff 20 46 86 bd 00 88 ff ff @E...... F......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 45 86 bd 00 88 ff ff 90 46 86 bd 00 88 ff ff .E.......F......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 46 86 bd 00 88 ff ff 00 47 86 bd 00 88 ff ff F.......G......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 46 86 bd 00 88 ff ff 70 47 86 bd 00 88 ff ff .F......pG......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 47 86 bd 00 88 ff ff e0 47 86 bd 00 88 ff ff .G.......G......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8647e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 47 86 bd 00 88 ff ff 50 48 86 bd 00 88 ff ff pG......PH......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 47 86 bd 00 88 ff ff c0 48 86 bd 00 88 ff ff .G.......H......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8648c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 48 86 bd 00 88 ff ff 30 49 86 bd 00 88 ff ff PH......0I......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 48 86 bd 00 88 ff ff a0 49 86 bd 00 88 ff ff .H.......I......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8649a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 49 86 bd 00 88 ff ff 10 4a 86 bd 00 88 ff ff 0I.......J......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864a10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 49 86 bd 00 88 ff ff 80 4a 86 bd 00 88 ff ff .I.......J......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864a80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 4a 86 bd 00 88 ff ff f0 4a 86 bd 00 88 ff ff .J.......J......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864af0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 4a 86 bd 00 88 ff ff 60 4b 86 bd 00 88 ff ff .J......`K......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864b60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 4a 86 bd 00 88 ff ff d0 4b 86 bd 00 88 ff ff .J.......K......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864bd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 4b 86 bd 00 88 ff ff 40 4c 86 bd 00 88 ff ff `K......@L......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864c40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 4b 86 bd 00 88 ff ff b0 4c 86 bd 00 88 ff ff .K.......L......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864cb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 4c 86 bd 00 88 ff ff 20 4d 86 bd 00 88 ff ff @L...... M......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864d20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 4c 86 bd 00 88 ff ff 90 4d 86 bd 00 88 ff ff .L.......M......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864d90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 4d 86 bd 00 88 ff ff 00 4e 86 bd 00 88 ff ff M.......N......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864e00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 4d 86 bd 00 88 ff ff 70 4e 86 bd 00 88 ff ff .M......pN......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864e70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 4e 86 bd 00 88 ff ff e0 4e 86 bd 00 88 ff ff .N.......N......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864ee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 4e 86 bd 00 88 ff ff 50 4f 86 bd 00 88 ff ff pN......PO......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd864f50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 4e 86 bd 00 88 ff ff 00 50 86 bd 00 88 ff ff .N.......P......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 4f 86 bd 00 88 ff ff 70 50 86 bd 00 88 ff ff PO......pP......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 50 86 bd 00 88 ff ff e0 50 86 bd 00 88 ff ff .P.......P......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8650e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 50 86 bd 00 88 ff ff 50 51 86 bd 00 88 ff ff pP......PQ......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 50 86 bd 00 88 ff ff c0 51 86 bd 00 88 ff ff .P.......Q......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8651c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 51 86 bd 00 88 ff ff 30 52 86 bd 00 88 ff ff PQ......0R......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 51 86 bd 00 88 ff ff a0 52 86 bd 00 88 ff ff .Q.......R......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8652a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 52 86 bd 00 88 ff ff 10 53 86 bd 00 88 ff ff 0R.......S......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 52 86 bd 00 88 ff ff 80 53 86 bd 00 88 ff ff .R.......S......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 53 86 bd 00 88 ff ff f0 53 86 bd 00 88 ff ff .S.......S......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8653f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 53 86 bd 00 88 ff ff 60 54 86 bd 00 88 ff ff .S......`T......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 53 86 bd 00 88 ff ff d0 54 86 bd 00 88 ff ff .S.......T......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8654d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 54 86 bd 00 88 ff ff 40 55 86 bd 00 88 ff ff `T......@U......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 54 86 bd 00 88 ff ff b0 55 86 bd 00 88 ff ff .T.......U......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8655b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 55 86 bd 00 88 ff ff 20 56 86 bd 00 88 ff ff @U...... V......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 55 86 bd 00 88 ff ff 90 56 86 bd 00 88 ff ff .U.......V......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 56 86 bd 00 88 ff ff 00 57 86 bd 00 88 ff ff V.......W......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 56 86 bd 00 88 ff ff 70 57 86 bd 00 88 ff ff .V......pW......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 57 86 bd 00 88 ff ff e0 57 86 bd 00 88 ff ff .W.......W......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8657e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 57 86 bd 00 88 ff ff 50 58 86 bd 00 88 ff ff pW......PX......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 57 86 bd 00 88 ff ff c0 58 86 bd 00 88 ff ff .W.......X......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8658c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 58 86 bd 00 88 ff ff 30 59 86 bd 00 88 ff ff PX......0Y......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 58 86 bd 00 88 ff ff a0 59 86 bd 00 88 ff ff .X.......Y......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8659a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 59 86 bd 00 88 ff ff 10 5a 86 bd 00 88 ff ff 0Y.......Z......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865a10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 59 86 bd 00 88 ff ff 80 5a 86 bd 00 88 ff ff .Y.......Z......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865a80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 5a 86 bd 00 88 ff ff f0 5a 86 bd 00 88 ff ff .Z.......Z......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865af0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 5a 86 bd 00 88 ff ff 60 5b 86 bd 00 88 ff ff .Z......`[......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865b60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 5a 86 bd 00 88 ff ff d0 5b 86 bd 00 88 ff ff .Z.......[......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865bd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 5b 86 bd 00 88 ff ff 40 5c 86 bd 00 88 ff ff `[......@\......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865c40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 5b 86 bd 00 88 ff ff b0 5c 86 bd 00 88 ff ff .[.......\......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865cb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 5c 86 bd 00 88 ff ff 20 5d 86 bd 00 88 ff ff @\...... ]......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865d20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 5c 86 bd 00 88 ff ff 90 5d 86 bd 00 88 ff ff .\.......]......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865d90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 5d 86 bd 00 88 ff ff 00 5e 86 bd 00 88 ff ff ].......^......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865e00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 5d 86 bd 00 88 ff ff 70 5e 86 bd 00 88 ff ff .]......p^......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865e70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 5e 86 bd 00 88 ff ff e0 5e 86 bd 00 88 ff ff .^.......^......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865ee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 5e 86 bd 00 88 ff ff 50 5f 86 bd 00 88 ff ff p^......P_......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd865f50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 5e 86 bd 00 88 ff ff 00 e0 86 bd 00 88 ff ff .^..............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 5f 86 bd 00 88 ff ff 70 e0 86 bd 00 88 ff ff P_......p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 e0 86 bd 00 88 ff ff e0 e0 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e0e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 e0 86 bd 00 88 ff ff 50 e1 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 e0 86 bd 00 88 ff ff c0 e1 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e1c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 e1 86 bd 00 88 ff ff 30 e2 86 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 e1 86 bd 00 88 ff ff a0 e2 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e2a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 e2 86 bd 00 88 ff ff 10 e3 86 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 e2 86 bd 00 88 ff ff 80 e3 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 e3 86 bd 00 88 ff ff f0 e3 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e3f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 e3 86 bd 00 88 ff ff 60 e4 86 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 e3 86 bd 00 88 ff ff d0 e4 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e4d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 e4 86 bd 00 88 ff ff 40 e5 86 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 e4 86 bd 00 88 ff ff b0 e5 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e5b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 e5 86 bd 00 88 ff ff 20 e6 86 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 e5 86 bd 00 88 ff ff 90 e6 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 e6 86 bd 00 88 ff ff 00 e7 86 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 e6 86 bd 00 88 ff ff 70 e7 86 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 e7 86 bd 00 88 ff ff e0 e7 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e7e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 e7 86 bd 00 88 ff ff 50 e8 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 e7 86 bd 00 88 ff ff c0 e8 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e8c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 e8 86 bd 00 88 ff ff 30 e9 86 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 e8 86 bd 00 88 ff ff a0 e9 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86e9a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 e9 86 bd 00 88 ff ff 10 ea 86 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ea10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 e9 86 bd 00 88 ff ff 80 ea 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ea80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 ea 86 bd 00 88 ff ff f0 ea 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86eaf0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 ea 86 bd 00 88 ff ff 60 eb 86 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86eb60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 ea 86 bd 00 88 ff ff d0 eb 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ebd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 eb 86 bd 00 88 ff ff 40 ec 86 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ec40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 eb 86 bd 00 88 ff ff b0 ec 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ecb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 ec 86 bd 00 88 ff ff 20 ed 86 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ed20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 ec 86 bd 00 88 ff ff 90 ed 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ed90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 ed 86 bd 00 88 ff ff 00 ee 86 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ee00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 ed 86 bd 00 88 ff ff 70 ee 86 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ee70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 ee 86 bd 00 88 ff ff e0 ee 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86eee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 ee 86 bd 00 88 ff ff 50 ef 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ef50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 ee 86 bd 00 88 ff ff 00 f0 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 ef 86 bd 00 88 ff ff 70 f0 86 bd 00 88 ff ff P.......p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 f0 86 bd 00 88 ff ff e0 f0 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f0e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 f0 86 bd 00 88 ff ff 50 f1 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 f0 86 bd 00 88 ff ff c0 f1 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f1c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 f1 86 bd 00 88 ff ff 30 f2 86 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 f1 86 bd 00 88 ff ff a0 f2 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f2a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 f2 86 bd 00 88 ff ff 10 f3 86 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 f2 86 bd 00 88 ff ff 80 f3 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 f3 86 bd 00 88 ff ff f0 f3 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f3f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 f3 86 bd 00 88 ff ff 60 f4 86 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 f3 86 bd 00 88 ff ff d0 f4 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f4d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 f4 86 bd 00 88 ff ff 40 f5 86 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 f4 86 bd 00 88 ff ff b0 f5 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f5b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 f5 86 bd 00 88 ff ff 20 f6 86 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 f5 86 bd 00 88 ff ff 90 f6 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 f6 86 bd 00 88 ff ff 00 f7 86 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 f6 86 bd 00 88 ff ff 70 f7 86 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 f7 86 bd 00 88 ff ff e0 f7 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f7e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 f7 86 bd 00 88 ff ff 50 f8 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 f7 86 bd 00 88 ff ff c0 f8 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f8c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 f8 86 bd 00 88 ff ff 30 f9 86 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 f8 86 bd 00 88 ff ff a0 f9 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86f9a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 f9 86 bd 00 88 ff ff 10 fa 86 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fa10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 f9 86 bd 00 88 ff ff 80 fa 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fa80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 fa 86 bd 00 88 ff ff f0 fa 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86faf0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 fa 86 bd 00 88 ff ff 60 fb 86 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fb60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 fa 86 bd 00 88 ff ff d0 fb 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fbd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 fb 86 bd 00 88 ff ff 40 fc 86 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fc40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 fb 86 bd 00 88 ff ff b0 fc 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fcb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 fc 86 bd 00 88 ff ff 20 fd 86 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fd20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 fc 86 bd 00 88 ff ff 90 fd 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fd90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 fd 86 bd 00 88 ff ff 00 fe 86 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fe00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 fd 86 bd 00 88 ff ff 70 fe 86 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fe70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 fe 86 bd 00 88 ff ff e0 fe 86 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86fee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 fe 86 bd 00 88 ff ff 50 ff 86 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd86ff50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 fe 86 bd 00 88 ff ff 00 80 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 ff 86 bd 00 88 ff ff 70 80 87 bd 00 88 ff ff P.......p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 80 87 bd 00 88 ff ff e0 80 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8780e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 80 87 bd 00 88 ff ff 50 81 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 80 87 bd 00 88 ff ff c0 81 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8781c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 81 87 bd 00 88 ff ff 30 82 87 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 81 87 bd 00 88 ff ff a0 82 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8782a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 82 87 bd 00 88 ff ff 10 83 87 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 82 87 bd 00 88 ff ff 80 83 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 83 87 bd 00 88 ff ff f0 83 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8783f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 83 87 bd 00 88 ff ff 60 84 87 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 83 87 bd 00 88 ff ff d0 84 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8784d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 84 87 bd 00 88 ff ff 40 85 87 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 84 87 bd 00 88 ff ff b0 85 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8785b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 85 87 bd 00 88 ff ff 20 86 87 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 85 87 bd 00 88 ff ff 90 86 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 86 87 bd 00 88 ff ff 00 87 87 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 86 87 bd 00 88 ff ff 70 87 87 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 87 87 bd 00 88 ff ff e0 87 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8787e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 87 87 bd 00 88 ff ff 50 88 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 87 87 bd 00 88 ff ff c0 88 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8788c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 88 87 bd 00 88 ff ff 30 89 87 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 88 87 bd 00 88 ff ff a0 89 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8789a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 89 87 bd 00 88 ff ff 10 8a 87 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878a10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 89 87 bd 00 88 ff ff 80 8a 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878a80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 8a 87 bd 00 88 ff ff f0 8a 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878af0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 8a 87 bd 00 88 ff ff 60 8b 87 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878b60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 8a 87 bd 00 88 ff ff d0 8b 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878bd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 8b 87 bd 00 88 ff ff 40 8c 87 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878c40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 8b 87 bd 00 88 ff ff b0 8c 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878cb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 8c 87 bd 00 88 ff ff 20 8d 87 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878d20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 8c 87 bd 00 88 ff ff 90 8d 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878d90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 8d 87 bd 00 88 ff ff 00 8e 87 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878e00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 8d 87 bd 00 88 ff ff 70 8e 87 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878e70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 8e 87 bd 00 88 ff ff e0 8e 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878ee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 8e 87 bd 00 88 ff ff 50 8f 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd878f50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 8e 87 bd 00 88 ff ff 00 90 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 8f 87 bd 00 88 ff ff 70 90 87 bd 00 88 ff ff P.......p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 90 87 bd 00 88 ff ff e0 90 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8790e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 90 87 bd 00 88 ff ff 50 91 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 90 87 bd 00 88 ff ff c0 91 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8791c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 91 87 bd 00 88 ff ff 30 92 87 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 91 87 bd 00 88 ff ff a0 92 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8792a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 92 87 bd 00 88 ff ff 10 93 87 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 92 87 bd 00 88 ff ff 80 93 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 93 87 bd 00 88 ff ff f0 93 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8793f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 93 87 bd 00 88 ff ff 60 94 87 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 93 87 bd 00 88 ff ff d0 94 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8794d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 94 87 bd 00 88 ff ff 40 95 87 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 94 87 bd 00 88 ff ff b0 95 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8795b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 95 87 bd 00 88 ff ff 20 96 87 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 95 87 bd 00 88 ff ff 90 96 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 96 87 bd 00 88 ff ff 00 97 87 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 96 87 bd 00 88 ff ff 70 97 87 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 97 87 bd 00 88 ff ff e0 97 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8797e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 97 87 bd 00 88 ff ff 50 98 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 97 87 bd 00 88 ff ff c0 98 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8798c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 98 87 bd 00 88 ff ff 30 99 87 bd 00 88 ff ff P.......0.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 98 87 bd 00 88 ff ff a0 99 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8799a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 99 87 bd 00 88 ff ff 10 9a 87 bd 00 88 ff ff 0...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879a10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 99 87 bd 00 88 ff ff 80 9a 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879a80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 9a 87 bd 00 88 ff ff f0 9a 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879af0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 9a 87 bd 00 88 ff ff 60 9b 87 bd 00 88 ff ff ........`.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879b60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 9a 87 bd 00 88 ff ff d0 9b 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879bd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 9b 87 bd 00 88 ff ff 40 9c 87 bd 00 88 ff ff `.......@.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879c40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 9b 87 bd 00 88 ff ff b0 9c 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879cb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 9c 87 bd 00 88 ff ff 20 9d 87 bd 00 88 ff ff @....... .......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879d20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 9c 87 bd 00 88 ff ff 90 9d 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879d90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 9d 87 bd 00 88 ff ff 00 9e 87 bd 00 88 ff ff ...............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879e00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 9d 87 bd 00 88 ff ff 70 9e 87 bd 00 88 ff ff ........p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879e70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 9e 87 bd 00 88 ff ff e0 9e 87 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879ee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 9e 87 bd 00 88 ff ff 50 9f 87 bd 00 88 ff ff p.......P.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd879f50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 9e 87 bd 00 88 ff ff 00 20 88 bd 00 88 ff ff ......... ......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 9f 87 bd 00 88 ff ff 70 20 88 bd 00 88 ff ff P.......p ......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 20 88 bd 00 88 ff ff e0 20 88 bd 00 88 ff ff . ....... ......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8820e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 20 88 bd 00 88 ff ff 50 21 88 bd 00 88 ff ff p ......P!......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882150 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 20 88 bd 00 88 ff ff c0 21 88 bd 00 88 ff ff . .......!......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8821c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 21 88 bd 00 88 ff ff 30 22 88 bd 00 88 ff ff P!......0"......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882230 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 21 88 bd 00 88 ff ff a0 22 88 bd 00 88 ff ff .!......."......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8822a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 22 88 bd 00 88 ff ff 10 23 88 bd 00 88 ff ff 0".......#......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882310 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 22 88 bd 00 88 ff ff 80 23 88 bd 00 88 ff ff .".......#......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882380 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 23 88 bd 00 88 ff ff f0 23 88 bd 00 88 ff ff .#.......#......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8823f0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 23 88 bd 00 88 ff ff 60 24 88 bd 00 88 ff ff .#......`$......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882460 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 23 88 bd 00 88 ff ff d0 24 88 bd 00 88 ff ff .#.......$......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8824d0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 24 88 bd 00 88 ff ff 40 25 88 bd 00 88 ff ff `$......@%......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882540 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 24 88 bd 00 88 ff ff b0 25 88 bd 00 88 ff ff .$.......%......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8825b0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 25 88 bd 00 88 ff ff 20 26 88 bd 00 88 ff ff @%...... &......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882620 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 25 88 bd 00 88 ff ff 90 26 88 bd 00 88 ff ff .%.......&......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882690 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 26 88 bd 00 88 ff ff 00 27 88 bd 00 88 ff ff &.......'......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882700 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 26 88 bd 00 88 ff ff 70 27 88 bd 00 88 ff ff .&......p'......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882770 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 27 88 bd 00 88 ff ff e0 27 88 bd 00 88 ff ff .'.......'......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8827e0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 27 88 bd 00 88 ff ff 50 28 88 bd 00 88 ff ff p'......P(......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882850 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 27 88 bd 00 88 ff ff c0 28 88 bd 00 88 ff ff .'.......(......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8828c0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 28 88 bd 00 88 ff ff 30 29 88 bd 00 88 ff ff P(......0)......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882930 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
c0 28 88 bd 00 88 ff ff a0 29 88 bd 00 88 ff ff .(.......)......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8829a0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
30 29 88 bd 00 88 ff ff 10 2a 88 bd 00 88 ff ff 0).......*......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882a10 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
a0 29 88 bd 00 88 ff ff 80 2a 88 bd 00 88 ff ff .).......*......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882a80 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
10 2a 88 bd 00 88 ff ff f0 2a 88 bd 00 88 ff ff .*.......*......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882af0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
80 2a 88 bd 00 88 ff ff 60 2b 88 bd 00 88 ff ff .*......`+......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882b60 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
f0 2a 88 bd 00 88 ff ff d0 2b 88 bd 00 88 ff ff .*.......+......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882bd0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
60 2b 88 bd 00 88 ff ff 40 2c 88 bd 00 88 ff ff `+......@,......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882c40 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
d0 2b 88 bd 00 88 ff ff b0 2c 88 bd 00 88 ff ff .+.......,......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882cb0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
40 2c 88 bd 00 88 ff ff 20 2d 88 bd 00 88 ff ff @,...... -......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882d20 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
b0 2c 88 bd 00 88 ff ff 90 2d 88 bd 00 88 ff ff .,.......-......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882d90 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
20 2d 88 bd 00 88 ff ff 00 2e 88 bd 00 88 ff ff -..............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882e00 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
90 2d 88 bd 00 88 ff ff 70 2e 88 bd 00 88 ff ff .-......p.......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882e70 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 2e 88 bd 00 88 ff ff e0 2e 88 bd 00 88 ff ff ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882ee0 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
70 2e 88 bd 00 88 ff ff 50 2f 88 bd 00 88 ff ff p.......P/......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd882f50 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
e0 2e 88 bd 00 88 ff ff 00 30 88 bd 00 88 ff ff .........0......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd883000 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
50 2f 88 bd 00 88 ff ff 70 30 88 bd 00 88 ff ff P/......p0......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd883070 (size 40):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 30 88 bd 00 88 ff ff 40 05 50 a3 00 88 ff ff [email protected].....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
[<ffffffff82afef26>] start_kernel+0x356/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bd8010c8 (size 128):
comm "swapper", pid 0, jiffies 4294937296
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
d8 10 80 bd 00 88 ff ff d8 10 80 bd 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff811548c2>] kmem_cache_alloc_node_notrace+0xfd/0x134
[<ffffffff81f74f68>] process_zones+0x70/0x1a9
[<ffffffff82b1ecc8>] setup_per_cpu_pageset+0x24/0x4e
[<ffffffff82afef30>] start_kernel+0x360/0x414
[<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
[<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bccf73e8 (size 128):
comm "swapper", pid 1, jiffies 4294937325
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................
f8 73 cf bc 00 88 ff ff f8 73 cf bc 00 88 ff ff .s.......s......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff811548c2>] kmem_cache_alloc_node_notrace+0xfd/0x134
[<ffffffff81f74f68>] process_zones+0x70/0x1a9
[<ffffffff81f750e8>] pageset_cpuup_callback+0x47/0xbb
[<ffffffff81f7c154>] notifier_call_chain+0x72/0xba
[<ffffffff810ad590>] __raw_notifier_call_chain+0x21/0x37
[<ffffffff81f73bee>] _cpu_up+0x96/0x16e
[<ffffffff81f73d47>] cpu_up+0x81/0xac
[<ffffffff82afe810>] kernel_init+0xf4/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bcf90bd0 (size 72):
comm "swapper", pid 1, jiffies 4294937436
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 0e 01 01 00 00 00 00 00 ................
01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff81572c8e>] acpi_ut_allocate_object_desc_dbg+0x6d/0x138
[<ffffffff81572e13>] acpi_ut_create_internal_object_dbg+0x66/0x142
[<ffffffff8155126f>] acpi_ex_read_data_from_field+0x1db/0x328
[<ffffffff8155b398>] acpi_ex_resolve_node_to_value+0x334/0x46c
[<ffffffff8155249d>] acpi_ex_resolve_to_value+0x384/0x427
[<ffffffff81546beb>] acpi_ds_evaluate_name_path+0xb4/0x171
[<ffffffff8154450e>] acpi_ds_exec_end_op+0xf5/0x677
[<ffffffff81567bc0>] acpi_ps_parse_loop+0xc80/0xf58
[<ffffffff81566403>] acpi_ps_parse_aml+0x17c/0x4a7
[<ffffffff81568c1b>] acpi_ps_execute_method+0x2af/0x40c
[<ffffffff815609a6>] acpi_ns_evaluate+0x24a/0x3e1
[<ffffffff81560cac>] acpi_ns_exec_module_code_list+0x16f/0x273
[<ffffffff815703d2>] acpi_initialize_objects+0xa1/0x1b2
[<ffffffff82b3395d>] acpi_init+0xa3/0x288
unreferenced object 0xffff8800bcbb9d68 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
10 32 b5 bc 00 88 ff ff 70 1e 50 bc 00 88 ff ff .2......p.P.....
58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1..............
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bcb45630 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
70 4e b8 bc 00 88 ff ff c0 92 96 83 ff ff ff ff pN..............
80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bcbaae70 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
08 61 bb bc 00 88 ff ff 40 51 96 83 ff ff ff ff .a......@Q......
80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bc40c840 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
38 27 b5 bc 00 88 ff ff 58 eb 82 bc 00 88 ff ff 8'......X.......
58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1..............
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bc422738 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
10 82 bb bc 00 88 ff ff 18 23 b5 bc 00 88 ff ff .........#......
58 31 ae bc 00 88 ff ff 02 00 00 00 00 00 00 00 X1..............
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bcb7a528 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
40 9b 96 83 ff ff ff ff 20 b4 ba bc 00 88 ff ff @....... .......
80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bc4fe738 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
c0 30 95 83 ff ff ff ff c0 30 95 83 ff ff ff ff .0.......0......
80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bc4ffb58 (size 192):
comm "swapper", pid 1, jiffies 4294937726
hex dump (first 32 bytes):
50 2a 50 bc 00 88 ff ff 40 87 95 83 ff ff ff ff P*P.....@.......
80 80 ae bc 00 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81156362>] __kmalloc+0x185/0x1c2
[<ffffffff814bb3bf>] kzalloc+0x22/0x38
[<ffffffff814bb5d7>] dma_debug_init+0x202/0x2d3
[<ffffffff82b04ebe>] pci_iommu_init+0x21/0x5e
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800bcfc9000 (size 216):
comm "swapper", pid 1, jiffies 4294938848
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff811549fa>] kmem_cache_alloc_node+0x101/0x180
[<ffffffff81d53a39>] __alloc_skb+0x56/0x192
[<ffffffff82b68ba7>] llc_station_init+0xff/0x164
[<ffffffff82b689ee>] llc2_init+0x3a/0xf4
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b6d95918 (size 512):
comm "swapper", pid 1, jiffies 4294938848
hex dump (first 32 bytes):
01 00 00 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b 6b ........kkkkkkkk
00 00 00 00 00 00 00 00 00 6b 6b 6b 6b 6b 6b 6b .........kkkkkkk
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81155d41>] __kmalloc_node_track_caller+0x133/0x188
[<ffffffff81d53a66>] __alloc_skb+0x83/0x192
[<ffffffff82b68ba7>] llc_station_init+0xff/0x164
[<ffffffff82b689ee>] llc2_init+0x3a/0xf4
[<ffffffff810090b4>] do_one_initcall+0x82/0x1a6
[<ffffffff82afe8d3>] kernel_init+0x1b7/0x223
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852070 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
90 f6 b2 0e 00 88 ff ff f0 4a 6f 8e 00 88 ff ff .........Jo.....
01 00 00 00 00 00 00 00 20 a9 de 8a 00 88 ff ff ........ .......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852230 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
50 98 ea 90 00 88 ff ff 90 96 ea 90 00 88 ff ff P...............
01 00 00 00 00 00 00 00 a0 21 fd b0 00 88 ff ff .........!......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852310 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
e0 27 85 b5 00 88 ff ff 40 75 e1 b0 00 88 ff ff .'......@u......
01 00 00 00 00 00 00 00 a0 49 fd b0 00 88 ff ff .........I......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b58523f0 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
40 f5 b2 0e 00 88 ff ff a0 f2 b2 0e 00 88 ff ff @...............
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b58525b0 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
a0 32 15 9d 00 88 ff ff f0 f3 b2 0e 00 88 ff ff .2..............
01 00 00 00 00 00 00 00 a0 e7 de 8a 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852770 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
a0 22 85 b5 00 88 ff ff 48 f5 93 83 ff ff ff ff ."......H.......
01 00 00 00 00 00 00 00 10 27 fe b0 00 88 ff ff .........'......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b58527e0 (size 40):
comm "flush-43:10", pid 4582, jiffies 4294945417
hex dump (first 32 bytes):
f0 c3 97 9e 00 88 ff ff 10 23 85 b5 00 88 ff ff .........#......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63
[<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103
[<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47
[<ffffffff81186559>] bdi_writeback_task+0x96/0xd3
[<ffffffff81132e36>] bdi_start_fn+0x89/0xff
[<ffffffff810a7bbc>] kthread+0x9d/0xa5
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852930 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
80 93 ea 90 00 88 ff ff 00 b7 ca 96 00 88 ff ff ................
01 00 00 00 00 00 00 00 20 7c 58 09 00 88 ff ff ........ |X.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852a10 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
90 3d ad 9e 00 88 ff ff 40 2c 85 b5 00 88 ff ff .=......@,......
02 00 00 00 00 00 00 00 e8 58 2e b9 00 88 ff ff .........X......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852af0 (size 40):
comm "kthreadd", pid 2, jiffies 4294945417
hex dump (first 32 bytes):
b0 3c 15 9d 00 88 ff ff 80 93 ea 90 00 88 ff ff .<..............
02 00 00 00 00 00 00 00 d8 9c bd 09 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103d052>] kernel_thread+0x82/0xe0
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852c40 (size 40):
comm "flush-43:15", pid 4587, jiffies 4294945417
hex dump (first 32 bytes):
10 2a 85 b5 00 88 ff ff 30 92 ea 90 00 88 ff ff .*......0.......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63
[<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103
[<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47
[<ffffffff81186559>] bdi_writeback_task+0x96/0xd3
[<ffffffff81132e36>] bdi_start_fn+0x89/0xff
[<ffffffff810a7bbc>] kthread+0x9d/0xa5
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b5852d20 (size 40):
comm "flush-8:0", pid 4588, jiffies 4294945417
hex dump (first 32 bytes):
70 f0 b2 0e 00 88 ff ff 00 3e ad 9e 00 88 ff ff p........>......
02 00 00 00 00 00 00 00 e8 b8 41 12 00 88 ff ff ..........A.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff81095b7f>] init_timer_on_stack_key+0x36/0x63
[<ffffffff81f76dcf>] schedule_timeout+0xa5/0x103
[<ffffffff81f76eec>] schedule_timeout_interruptible+0x31/0x47
[<ffffffff81186559>] bdi_writeback_task+0x96/0xd3
[<ffffffff81132e36>] bdi_start_fn+0x89/0xff
[<ffffffff810a7bbc>] kthread+0x9d/0xa5
[<ffffffff8103d0ba>] child_rip+0xa/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b0e17540 (size 40):
comm "plymouth", pid 9118, jiffies 4294947855
hex dump (first 32 bytes):
10 23 85 b5 00 88 ff ff 30 f2 b2 0e 00 88 ff ff .#......0.......
01 00 00 00 00 00 00 00 a0 71 fd b0 00 88 ff ff .........q......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800b0e178c0 (size 40):
comm "atd", pid 9150, jiffies 4294947930
hex dump (first 32 bytes):
10 93 ea 90 00 88 ff ff 90 f6 b2 0e 00 88 ff ff ................
01 00 00 00 00 00 00 00 a0 83 d6 56 00 88 ff ff ...........V....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800ae992000 (size 40):
comm "NetworkManager", pid 9055, jiffies 4294948078
hex dump (first 32 bytes):
20 36 ad 9e 00 88 ff ff b0 3c 15 9d 00 88 ff ff 6.......<......
02 00 00 00 00 00 00 00 d8 dc 3c 11 00 88 ff ff ..........<.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dcf402>] inet_create+0x247/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800a54cbb60 (size 40):
comm "gnome-session", pid 9511, jiffies 4294952983
hex dump (first 32 bytes):
00 b7 ca 96 00 88 ff ff 50 31 15 9d 00 88 ff ff ........P1......
02 00 00 00 00 00 00 00 d8 9c 2e 0f 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800a5740e00 (size 40):
comm "canberra-gtk-pl", pid 9799, jiffies 4294953182
hex dump (first 32 bytes):
20 3d 88 bd 00 88 ff ff 50 21 85 b5 00 88 ff ff =......P!......
01 00 00 00 00 00 00 00 a0 17 fd b0 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800a3500540 (size 40):
comm "polkit-read-aut", pid 9825, jiffies 4294953349
hex dump (first 32 bytes):
70 30 88 bd 00 88 ff ff 80 fa b2 0e 00 88 ff ff p0..............
02 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009e97c3f0 (size 40):
comm "nm-applet", pid 9771, jiffies 4294953682
hex dump (first 32 bytes):
60 3b 15 9d 00 88 ff ff e0 27 85 b5 00 88 ff ff `;.......'......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009e97c770 (size 40):
comm "gnome-mount", pid 9849, jiffies 4294953694
hex dump (first 32 bytes):
70 30 15 9d 00 88 ff ff 50 38 15 9d 00 88 ff ff p0......P8......
02 00 00 00 00 00 00 00 d8 7c c1 8f 00 88 ff ff .........|......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff8800a45bae00 (size 40):
comm "dbus-daemon", pid 8845, jiffies 4294953696
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 c8 8b 8f 83 ff ff ff ff ................
02 00 00 00 00 00 00 00 08 a3 67 8a 00 88 ff ff ..........g.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009e329380 (size 40):
comm "hal-storage-mou", pid 9851, jiffies 4294953770
hex dump (first 32 bytes):
10 33 15 9d 00 88 ff ff 40 35 15 9d 00 88 ff ff .3......@5......
02 00 00 00 00 00 00 00 d8 bc 5d 29 00 88 ff ff ..........])....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009ead3620 (size 40):
comm "console-kit-dae", pid 8879, jiffies 4294954479
hex dump (first 32 bytes):
40 35 15 9d 00 88 ff ff 00 20 99 ae 00 88 ff ff @5....... ......
02 00 00 00 00 00 00 00 d8 3c a6 1b 00 88 ff ff .........<......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880096cab700 (size 40):
comm "sshd", pid 10008, jiffies 4294958039
hex dump (first 32 bytes):
30 29 85 b5 00 88 ff ff 60 bb 4c a5 00 88 ff ff 0)......`.L.....
02 00 00 00 00 00 00 00 d8 7c 5e 38 00 88 ff ff .........|^8....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880096cab770 (size 40):
comm "sshd", pid 10008, jiffies 4294958039
hex dump (first 32 bytes):
50 31 15 9d 00 88 ff ff 70 30 15 9d 00 88 ff ff P1......p0......
02 00 00 00 00 00 00 00 d8 1c 38 b5 00 88 ff ff ..........8.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880096cabaf0 (size 40):
comm "firefox", pid 9992, jiffies 4295039742
hex dump (first 32 bytes):
50 91 ea 90 00 88 ff ff 20 3d ad 9e 00 88 ff ff P....... =......
02 00 00 00 00 00 00 00 d8 1c fe 4e 00 88 ff ff ...........N....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009ead3d20 (size 40):
comm "firefox", pid 10108, jiffies 4295039743
hex dump (first 32 bytes):
f0 ba ca 96 00 88 ff ff c0 f8 b2 0e 00 88 ff ff ................
02 00 00 00 00 00 00 00 d8 dc 46 90 00 88 ff ff ..........F.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009ead3d90 (size 40):
comm "firefox", pid 10107, jiffies 4295039743
hex dump (first 32 bytes):
20 f6 b2 0e 00 88 ff ff 10 2a 85 b5 00 88 ff ff ........*......
02 00 00 00 00 00 00 00 48 3a a5 a6 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009ead3e00 (size 40):
comm "firefox", pid 10109, jiffies 4295039743
hex dump (first 32 bytes):
20 2d 85 b5 00 88 ff ff e0 4e 6f 8e 00 88 ff ff -.......No.....
01 00 00 00 00 00 00 00 e0 15 4c 09 00 88 ff ff ..........L.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff810c2241>] futex_wait+0xb1/0x297
[<ffffffff810c43b3>] do_futex+0xbb/0xa4c
[<ffffffff810c4e66>] sys_futex+0x122/0x154
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153070 (size 40):
comm "firefox", pid 10110, jiffies 4295039774
hex dump (first 32 bytes):
70 b7 ca 96 00 88 ff ff 70 c7 97 9e 00 88 ff ff p.......p.......
02 00 00 00 00 00 00 00 d8 9c a7 09 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153150 (size 40):
comm "firefox", pid 9992, jiffies 4295039775
hex dump (first 32 bytes):
60 bb 4c a5 00 88 ff ff 70 b7 ca 96 00 88 ff ff `.L.....p.......
02 00 00 00 00 00 00 00 d8 9c 26 55 00 88 ff ff ..........&U....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153230 (size 40):
comm "firefox", pid 9992, jiffies 4295039776
hex dump (first 32 bytes):
30 92 ea 90 00 88 ff ff 00 2e 85 b5 00 88 ff ff 0...............
01 00 00 00 00 00 00 00 a0 35 18 09 00 88 ff ff .........5......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d1532a0 (size 40):
comm "firefox", pid 9992, jiffies 4295039776
hex dump (first 32 bytes):
c0 91 ea 90 00 88 ff ff b0 25 85 b5 00 88 ff ff .........%......
02 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153310 (size 40):
comm "firefox", pid 9992, jiffies 4295039776
hex dump (first 32 bytes):
40 95 ea 90 00 88 ff ff 80 93 32 9e 00 88 ff ff @.........2.....
02 00 00 00 00 00 00 00 d8 bc b5 2c 00 88 ff ff ...........,....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153540 (size 40):
comm "firefox", pid 9992, jiffies 4295039779
hex dump (first 32 bytes):
80 93 32 9e 00 88 ff ff 20 36 ad 9e 00 88 ff ff ..2..... 6......
02 00 00 00 00 00 00 00 d8 7c 11 41 00 88 ff ff .........|.A....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4230 (size 40):
comm "firefox", pid 9992, jiffies 4295039818
hex dump (first 32 bytes):
a0 39 15 9d 00 88 ff ff 28 16 90 83 ff ff ff ff .9......(.......
02 00 00 00 00 00 00 00 08 42 1d 37 00 88 ff ff .........B.7....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4310 (size 40):
comm "firefox", pid 9992, jiffies 4295039821
hex dump (first 32 bytes):
10 f3 b2 0e 00 88 ff ff 50 f1 b2 0e 00 88 ff ff ........P.......
02 00 00 00 00 00 00 00 68 b8 62 22 00 88 ff ff ........h.b"....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4380 (size 40):
comm "firefox", pid 9992, jiffies 4295039821
hex dump (first 32 bytes):
e0 4e 6f 8e 00 88 ff ff 20 f6 b2 0e 00 88 ff ff .No..... .......
02 00 00 00 00 00 00 00 48 7a 5f a4 00 88 ff ff ........Hz_.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f44d0 (size 40):
comm "firefox", pid 9992, jiffies 4295039821
hex dump (first 32 bytes):
40 45 6f 8e 00 88 ff ff 60 3b 15 9d 00 88 ff ff @Eo.....`;......
02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4540 (size 40):
comm "Xorg", pid 9433, jiffies 4295039831
hex dump (first 32 bytes):
c0 48 6f 8e 00 88 ff ff d0 44 6f 8e 00 88 ff ff .Ho......Do.....
02 00 00 00 00 00 00 00 90 19 1d 37 00 88 ff ff ...........7....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff8117412c>] do_select+0x5e0/0x638
[<ffffffff81174375>] core_sys_select+0x1f1/0x2aa
[<ffffffff811746a0>] sys_select+0xa8/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4770 (size 40):
comm "firefox", pid 9992, jiffies 4295039873
hex dump (first 32 bytes):
d0 94 ea 90 00 88 ff ff b0 4c 6f 8e 00 88 ff ff .........Lo.....
02 00 00 00 00 00 00 00 90 2d fd b0 00 88 ff ff .........-......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153690 (size 40):
comm "firefox", pid 9992, jiffies 4295039873
hex dump (first 32 bytes):
00 ce 80 b6 00 88 ff ff 08 56 94 83 ff ff ff ff .........V......
01 00 00 00 00 00 00 00 08 6a 1d 37 00 88 ff ff .........j.7....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153700 (size 40):
comm "firefox", pid 9992, jiffies 4295039873
hex dump (first 32 bytes):
70 4e 6f 8e 00 88 ff ff c0 48 6f 8e 00 88 ff ff pNo......Ho.....
02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153770 (size 40):
comm "firefox", pid 9992, jiffies 4295039873
hex dump (first 32 bytes):
00 77 89 bd 00 88 ff ff 40 3c 15 9d 00 88 ff ff .w......@<......
01 00 00 00 00 00 00 00 08 60 fd b0 00 88 ff ff .........`......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153850 (size 40):
comm "firefox", pid 9992, jiffies 4295039884
hex dump (first 32 bytes):
70 c7 97 9e 00 88 ff ff 70 4e 6f 8e 00 88 ff ff p.......pNo.....
02 00 00 00 00 00 00 00 d8 5c af 24 00 88 ff ff .........\.$....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d1539a0 (size 40):
comm "firefox", pid 9992, jiffies 4295039884
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 30 42 6f 8e 00 88 ff ff ........0Bo.....
02 00 00 00 00 00 00 00 90 41 1d 37 00 88 ff ff .........A.7....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153b60 (size 40):
comm "firefox", pid 9992, jiffies 4295039884
hex dump (first 32 bytes):
d0 44 6f 8e 00 88 ff ff f0 c3 97 9e 00 88 ff ff .Do.............
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88009d153cb0 (size 40):
comm "firefox", pid 9992, jiffies 4295039884
hex dump (first 32 bytes):
00 20 99 ae 00 88 ff ff f0 2a 85 b5 00 88 ff ff . .......*......
02 00 00 00 00 00 00 00 d8 9c 8d 33 00 88 ff ff ...........3....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f48c0 (size 40):
comm "firefox", pid 9992, jiffies 4295040062
hex dump (first 32 bytes):
00 37 15 9d 00 88 ff ff 40 45 6f 8e 00 88 ff ff .7......@Eo.....
02 00 00 00 00 00 00 00 a0 17 1d 37 00 88 ff ff ...........7....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4a80 (size 40):
comm "firefox", pid 9992, jiffies 4295040319
hex dump (first 32 bytes):
50 f1 b2 0e 00 88 ff ff 70 f0 b2 0e 00 88 ff ff P.......p.......
01 00 00 00 00 00 00 00 20 1a 4c 09 00 88 ff ff ........ .L.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4af0 (size 40):
comm "firefox", pid 9992, jiffies 4295040320
hex dump (first 32 bytes):
70 20 85 b5 00 88 ff ff a0 f9 b2 0e 00 88 ff ff p ..............
01 00 00 00 00 00 00 00 60 af de 8a 00 88 ff ff ........`.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4e70 (size 40):
comm "firefox", pid 9992, jiffies 4295040338
hex dump (first 32 bytes):
50 38 15 9d 00 88 ff ff 00 37 15 9d 00 88 ff ff P8.......7......
02 00 00 00 00 00 00 00 d8 dc a0 2c 00 88 ff ff ...........,....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4ee0 (size 40):
comm "firefox", pid 9992, jiffies 4295040338
hex dump (first 32 bytes):
00 3e ad 9e 00 88 ff ff 80 43 6f 8e 00 88 ff ff .>.......Co.....
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88008e6f4f50 (size 40):
comm "firefox", pid 9992, jiffies 4295040338
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 18 27 8f 83 ff ff ff ff .........'......
03 00 00 00 00 00 00 00 48 5a 2c a5 00 88 ff ff ........HZ,.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f070 (size 40):
comm "plymouth-set-de", pid 19150, jiffies 4295900723
hex dump (first 32 bytes):
80 4a 6f 8e 00 88 ff ff 20 2d 85 b5 00 88 ff ff .Jo..... -......
02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f150 (size 40):
comm "plymouth-set-de", pid 19150, jiffies 4295900723
hex dump (first 32 bytes):
10 43 6f 8e 00 88 ff ff 80 4a 6f 8e 00 88 ff ff .Co......Jo.....
02 00 00 00 00 00 00 00 e8 b8 bb 41 00 88 ff ff ...........A....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f230 (size 40):
comm "firefox", pid 9992, jiffies 4295900751
hex dump (first 32 bytes):
40 75 e1 b0 00 88 ff ff 40 f5 b2 0e 00 88 ff ff @u......@.......
02 00 00 00 00 00 00 00 90 73 fd b0 00 88 ff ff .........s......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f2a0 (size 40):
comm "firefox", pid 9992, jiffies 4295900751
hex dump (first 32 bytes):
f0 23 85 b5 00 88 ff ff 70 90 ea 90 00 88 ff ff .#......p.......
01 00 00 00 00 00 00 00 a0 71 49 b6 00 88 ff ff .........qI.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9070 (size 40):
comm "plymouth-popula", pid 19166, jiffies 4295900753
hex dump (first 32 bytes):
a0 f2 b2 0e 00 88 ff ff 10 f3 b2 0e 00 88 ff ff ................
02 00 00 00 00 00 00 00 90 73 49 b6 00 88 ff ff .........sI.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f310 (size 40):
comm "firefox", pid 9992, jiffies 4295900755
hex dump (first 32 bytes):
70 90 ea 90 00 88 ff ff 10 43 6f 8e 00 88 ff ff p........Co.....
02 00 00 00 00 00 00 00 08 74 49 b6 00 88 ff ff .........tI.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f3f0 (size 40):
comm "firefox", pid 9992, jiffies 4295900767
hex dump (first 32 bytes):
b0 25 85 b5 00 88 ff ff 40 95 ea 90 00 88 ff ff .%......@.......
01 00 00 00 00 00 00 00 60 e1 de 8a 00 88 ff ff ........`.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f4d0 (size 40):
comm "firefox", pid 9992, jiffies 4295900767
hex dump (first 32 bytes):
80 3a 15 9d 00 88 ff ff 30 b9 ca 96 00 88 ff ff .:......0.......
03 00 00 00 00 00 00 00 a0 35 fd b0 00 88 ff ff .........5......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f540 (size 40):
comm "firefox", pid 9992, jiffies 4295900771
hex dump (first 32 bytes):
30 f2 b2 0e 00 88 ff ff f0 23 85 b5 00 88 ff ff 0........#......
02 00 00 00 00 00 00 00 08 74 fd b0 00 88 ff ff .........t......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f5b0 (size 40):
comm "firefox", pid 9992, jiffies 4295900771
hex dump (first 32 bytes):
90 96 ea 90 00 88 ff ff e0 97 ea 90 00 88 ff ff ................
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f620 (size 40):
comm "firefox", pid 9992, jiffies 4295900771
hex dump (first 32 bytes):
80 43 6f 8e 00 88 ff ff 90 3d ad 9e 00 88 ff ff .Co......=......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace7b>] inet_csk_init_xmit_timers+0xa2/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9150 (size 40):
comm "firefox", pid 9992, jiffies 4295900783
hex dump (first 32 bytes):
e0 97 ea 90 00 88 ff ff f0 ba ca 96 00 88 ff ff ................
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace2b>] inet_csk_init_xmit_timers+0x52/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea91c0 (size 40):
comm "firefox", pid 9992, jiffies 4295900783
hex dump (first 32 bytes):
a0 f9 b2 0e 00 88 ff ff a0 32 15 9d 00 88 ff ff .........2......
02 00 00 00 00 00 00 00 48 7a 53 6f 00 88 ff ff ........HzSo....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81dace53>] inet_csk_init_xmit_timers+0x7a/0xcf
[<ffffffff81dbdc8a>] tcp_init_xmit_timers+0x36/0x4c
[<ffffffff81dbe331>] tcp_v4_init_sock+0x61/0x1bd
[<ffffffff81dcf48c>] inet_create+0x2d1/0x32e
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea92a0 (size 40):
comm "thunderbird-bin", pid 18849, jiffies 4295900959
hex dump (first 32 bytes):
90 76 89 bd 00 88 ff ff b0 2c 85 b5 00 88 ff ff .v.......,......
01 00 00 00 00 00 00 00 a0 71 fd b0 00 88 ff ff .........q......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9310 (size 40):
comm "thunderbird-bin", pid 18986, jiffies 4295900963
hex dump (first 32 bytes):
30 f9 b2 0e 00 88 ff ff c0 78 e1 b0 00 88 ff ff 0........x......
01 00 00 00 00 00 00 00 e0 89 d6 56 00 88 ff ff ...........V....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f690 (size 40):
comm "Xorg", pid 9433, jiffies 4295900963
hex dump (first 32 bytes):
c0 78 e1 b0 00 88 ff ff 70 20 85 b5 00 88 ff ff .x......p ......
01 00 00 00 00 00 00 00 e0 bb d6 56 00 88 ff ff ...........V....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff8117412c>] do_select+0x5e0/0x638
[<ffffffff81174375>] core_sys_select+0x1f1/0x2aa
[<ffffffff811746a0>] sys_select+0xa8/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9380 (size 40):
comm "thunderbird-bin", pid 18849, jiffies 4295900963
hex dump (first 32 bytes):
f0 2a 85 b5 00 88 ff ff 30 29 85 b5 00 88 ff ff .*......0)......
02 00 00 00 00 00 00 00 d8 bc 94 46 00 88 ff ff ...........F....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f700 (size 40):
comm "Xorg", pid 9433, jiffies 4295900963
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 98 94 92 83 ff ff ff ff ................
03 00 00 00 00 00 00 00 48 da be 9e 00 88 ff ff ........H.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff8117412c>] do_select+0x5e0/0x638
[<ffffffff81174375>] core_sys_select+0x1f1/0x2aa
[<ffffffff811746a0>] sys_select+0xa8/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f7e0 (size 40):
comm "gconfd-2", pid 10000, jiffies 4295900966
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 d8 a4 8a 83 ff ff ff ff ................
03 00 00 00 00 00 00 00 48 9a 2e ae 00 88 ff ff ........H.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f850 (size 40):
comm "gconfd-2", pid 10000, jiffies 4295900966
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 98 3f 8a 83 ff ff ff ff .........?......
03 00 00 00 00 00 00 00 98 de 13 9d 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f8c0 (size 40):
comm "gconfd-2", pid 10000, jiffies 4295900966
hex dump (first 32 bytes):
20 3d ad 9e 00 88 ff ff 30 f9 b2 0e 00 88 ff ff =......0.......
01 00 00 00 00 00 00 00 60 e1 de 8a 00 88 ff ff ........`.......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deea1e>] unix_create+0x78/0x97
[<ffffffff81d4ad1c>] __sock_create+0x15f/0x1dd
[<ffffffff81d4ae2e>] sock_create+0x45/0x5b
[<ffffffff81d4b0af>] sys_socket+0x3d/0x85
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f930 (size 40):
comm "gconfd-2", pid 10000, jiffies 4295900966
hex dump (first 32 bytes):
c0 f8 b2 0e 00 88 ff ff 10 93 ea 90 00 88 ff ff ................
01 00 00 00 00 00 00 00 a0 e7 de 8a 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff81095ab2>] init_timer_key+0x38/0x8a
[<ffffffff81d4d8ec>] sock_init_data+0x7a/0x20d
[<ffffffff81dee867>] unix_create1+0x78/0x1b7
[<ffffffff81deeae1>] unix_stream_connect+0xa4/0x3e7
[<ffffffff81d4b4b4>] sys_connect+0x88/0xcb
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2f9a0 (size 40):
comm "gconfd-2", pid 10000, jiffies 4295900966
hex dump (first 32 bytes):
f0 4a 6f 8e 00 88 ff ff c0 91 ea 90 00 88 ff ff .Jo.............
01 00 00 00 00 00 00 00 e0 ed de 8a 00 88 ff ff ................
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9540 (size 40):
comm "plymouth-popula", pid 19566, jiffies 4295901052
hex dump (first 32 bytes):
f0 f3 b2 0e 00 88 ff ff 10 33 15 9d 00 88 ff ff .........3......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2fa10 (size 40):
comm "plymouth-popula", pid 19688, jiffies 4295901223
hex dump (first 32 bytes):
00 2e 85 b5 00 88 ff ff 60 44 6f 8e 00 88 ff ff ........`Do.....
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9690 (size 40):
comm "plymouth-popula", pid 19689, jiffies 4295901224
hex dump (first 32 bytes):
30 22 85 b5 00 88 ff ff b0 f5 b2 0e 00 88 ff ff 0"..............
01 00 00 00 00 00 00 00 20 5a 58 09 00 88 ff ff ........ ZX.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea97e0 (size 40):
comm "mkinitrd", pid 19807, jiffies 4295901373
hex dump (first 32 bytes):
b0 f5 b2 0e 00 88 ff ff 50 91 ea 90 00 88 ff ff ........P.......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff880090ea9850 (size 40):
comm "mkinitrd", pid 19807, jiffies 4295901374
hex dump (first 32 bytes):
80 fa b2 0e 00 88 ff ff 30 22 85 b5 00 88 ff ff ........0"......
02 00 00 00 00 00 00 00 48 3a 1e 9d 00 88 ff ff ........H:......
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea4e>] debug_object_init+0x27/0x3d
[<ffffffff810abd7e>] hrtimer_init+0x38/0x90
[<ffffffff81082b6d>] copy_process+0x836/0x1261
[<ffffffff81083706>] do_fork+0x16e/0x360
[<ffffffff8103a69e>] sys_clone+0x3c/0x57
[<ffffffff8103c363>] stub_clone+0x13/0x20
[<ffffffffffffffff>] 0xffffffffffffffff
unreferenced object 0xffff88000eb2fa80 (size 40):
comm "firefox", pid 9991, jiffies 4295901374
hex dump (first 32 bytes):
40 05 50 a3 00 88 ff ff 50 98 ea 90 00 88 ff ff @.P.....P.......
01 00 00 00 00 00 00 00 e0 04 4c 09 00 88 ff ff ..........L.....
backtrace:
[<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
[<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
[<ffffffff814ae6c8>] __debug_object_init+0x53/0x372
[<ffffffff814aea11>] debug_object_init_on_stack+0x2a/0x40
[<ffffffff810ac3e7>] hrtimer_init_on_stack+0x36/0x63
[<ffffffff81f77a95>] schedule_hrtimeout_range+0x81/0x131
[<ffffffff81173352>] poll_schedule_timeout+0x4a/0x81
[<ffffffff811737d1>] do_sys_poll+0x38d/0x442
[<ffffffff81173a57>] sys_poll+0x64/0xe4
[<ffffffff8103bffb>] system_call_fastpath+0x16/0x1b
[<ffffffffffffffff>] 0xffffffffffffffff

I am not sure how to interpret these stack trace, dmesg is flooded with these:

evbug.c: Event. Dev: input1, Type: 1, Code: 57, Value: 1
evbug.c: Event. Dev: input1, Type: 0, Code: 0, Value: 0
evbug.c: Event. Dev: input1, Type: 4, Code: 4, Value: 57
evbug.c: Event. Dev: input1, Type: 1, Code: 57, Value: 0
evbug.c: Event. Dev: input1, Type: 0, Code: 0, Value: 0

But otherwise system seemed fine and running...with some other problems..



--
Regards,
Peter Teoh


2009-10-15 10:40:15

by Catalin Marinas

[permalink] [raw]
Subject: Re: kmemleak errors

Peter Teoh <[email protected]> wrote:
> cat /sys/kernel/debug/kmemleak gave:
>
> unreferenced object 0xffff8800bd864000 (size 40):
> comm "swapper", pid 0, jiffies 4294937296
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 70 40 86 bd 00 88 ff ff ........p@......
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
> [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
> [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
> [<ffffffff82afef26>] start_kernel+0x356/0x414
> [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
> [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
> [<ffffffffffffffff>] 0xffffffffffffffff

If run

echo scan > /sys/kernel/debug/kmemleak

a few times, do they disappear? I think the debug_objects reports are
false positives but couldn't figure why kmemleak cannot track
them. I'll look again at them and maybe add an annotation
(kmemleak_not_leak).

--
Catalin

2009-10-16 05:40:06

by Peter Teoh

[permalink] [raw]
Subject: Re: kmemleak errors

On Thu, Oct 15, 2009 at 6:39 PM, Catalin Marinas
<[email protected]> wrote:
> Peter Teoh <[email protected]> wrote:
>> cat /sys/kernel/debug/kmemleak gave:
>>
>> unreferenced object 0xffff8800bd864000 (size 40):
>> ? comm "swapper", pid 0, jiffies 4294937296
>> ? hex dump (first 32 bytes):
>> ? ? 00 00 00 00 00 00 00 00 70 40 86 bd 00 88 ff ff ?........p@......
>> ? ? 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ?................
>> ? backtrace:
>> ? ? [<ffffffff81ef55b6>] kmemleak_alloc+0x73/0xd8
>> ? ? [<ffffffff81154d66>] kmem_cache_alloc+0xf7/0x15a
>> ? ? [<ffffffff82b2b88a>] debug_objects_mem_init+0x71/0x234
>> ? ? [<ffffffff82afef26>] start_kernel+0x356/0x414
>> ? ? [<ffffffff82afe2a9>] x86_64_start_reservations+0xb9/0xd4
>> ? ? [<ffffffff82afe3b2>] x86_64_start_kernel+0xee/0x109
>> ? ? [<ffffffffffffffff>] 0xffffffffffffffff
>
> If run
>
> ?echo scan > /sys/kernel/debug/kmemleak
>

sorry, i have overwritten the kernel image to follow up on another
kernel bugzilla report. but on another (32bit Fedora Core10) the
following is the kmemleak output (scan > /sys/kernel/debug/kmemleak is
done at least thrice) and the following output remained exactly not
changed - not even a single byte modified:

unreferenced object 0xf70320a0 (size 32):
comm "swapper", pid 0, jiffies 4294667388
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c04024d1>] kernel_thread+0x85/0x8d
[<c08a85ea>] rest_init+0x1e/0x5a
[<c0d34b5c>] start_kernel+0x383/0x388
[<c0d340ae>] i386_start_kernel+0xae/0xb3
[<ffffffff>] 0xffffffff
unreferenced object 0xf7253200 (size 32):
comm "swapper", pid 1, jiffies 4294669642
hex dump (first 32 bytes):
a0 36 25 f7 00 00 00 00 00 00 00 00 00 00 00 00 .6%.............
00 00 00 00 44 5f 25 f6 72 b7 47 c0 00 00 00 00 ....D_%.r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5cb39>] kmemleak_test_init+0x25/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf7253100 (size 32):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
a0 36 25 f7 01 00 00 00 00 00 00 00 00 00 00 00 .6%.............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5cbc8>] kmemleak_test_init+0xb4/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf705b800 (size 1024):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
00 bc 05 f7 ff ff ff ff 00 00 00 80 00 00 00 00 ................
fd ff ff ff ff ff ff df 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5cc57>] kmemleak_test_init+0x143/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf705bc00 (size 1024):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
00 00 00 00 ff ff ff ff 00 20 00 08 00 00 01 00 ......... ......
ff ff ff bf ff 7f ff ff 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5cce6>] kmemleak_test_init+0x1d2/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf7191000 (size 2048):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
00 18 19 f7 fb ff ff ff 00 00 00 00 21 00 00 00 ............!...
ff ff ff ff db ff ff ff 00 04 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5cd75>] kmemleak_test_init+0x261/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf7191800 (size 2048):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
00 20 19 f7 fe ff ff ff 00 00 00 00 00 00 00 04 . ..............
ff fd ff ff f5 ff ff f7 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0d5ce04>] kmemleak_test_init+0x2f0/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf801d000 (size 64):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
b7 fd ee 8e f6 fe 5f f3 b9 fb dd f7 9f eb ed cf ......_.........
df 91 f1 ff fb f9 5f fd ea f2 fb 9f df 3f ff de ......_......?..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c051560c>] __vmalloc_node+0xb9/0xca
[<c051574c>] vmalloc+0x21/0x23
[<c0d5cfa8>] kmemleak_test_init+0x494/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf8026000 (size 64):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
fb fc fe 7f bf bf 7f 5d df fa 79 dd fd fc fd dd .......]..y.....
f7 ff 9f ff f7 fe df f6 9b ab 9f e5 f9 fc eb fe ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c051560c>] __vmalloc_node+0xb9/0xca
[<c051574c>] vmalloc+0x21/0x23
[<c0d5cfbd>] kmemleak_test_init+0x4a9/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf8029000 (size 64):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
cf ef af fd bf f4 ff 7b fd a8 37 5f ec e9 fa d7 .......{..7_....
bb b7 fc ee fe fe d5 ff fd ff f1 fe df 9f ff fd ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c051560c>] __vmalloc_node+0xb9/0xca
[<c051574c>] vmalloc+0x21/0x23
[<c0d5cfd2>] kmemleak_test_init+0x4be/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf802c000 (size 64):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
ff ef fd dd fd 7d f3 cb 7b f7 f7 9f f2 af ff fb .....}..{.......
bf 3b af ef ff fb 5f 77 9f bf 99 be 9d f9 fd b7 .;...._w........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c051560c>] __vmalloc_node+0xb9/0xca
[<c051574c>] vmalloc+0x21/0x23
[<c0d5cfea>] kmemleak_test_init+0x4d6/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf802f000 (size 64):
comm "swapper", pid 1, jiffies 4294669643
hex dump (first 32 bytes):
b7 fd ee 8e fe fe 5f f3 b9 fa dd f7 bf eb ed cf ......_.........
df 91 f1 ff f9 f9 5f fd ea fa fa 9f df 3f ff de ......_......?..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c051560c>] __vmalloc_node+0xb9/0xca
[<c051574c>] vmalloc+0x21/0x23
[<c0d5cfff>] kmemleak_test_init+0x4eb/0x6e8
[<c040116a>] do_one_initcall+0x78/0x1fb
[<c0d343e6>] kernel_init+0x160/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c16270 (size 16):
comm "swapper", pid 1, jiffies 4294673952
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c0401322>] init_post+0x35/0x18f
[<c0d34459>] kernel_init+0x1d3/0x1dd
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339bf0 (size 16):
comm "swapper", pid 1, jiffies 4294673953
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c0536969>] open_exec+0x23/0x152
[<c057b384>] load_script+0x26c/0x2e4
[<c05356ea>] search_binary_handler+0x1e1/0x48c
[<c0537331>] do_execve+0x2f6/0x46f
[<c04022d9>] sys_execve+0x57/0x96
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339600 (size 16):
comm "swapper", pid 1, jiffies 4294673953
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c0536969>] open_exec+0x23/0x152
[<c057d2e9>] load_elf_binary+0x3b3/0x1b92
[<c05356ea>] search_binary_handler+0x1e1/0x48c
[<c057b3e5>] load_script+0x2cd/0x2e4
[<c05356ea>] search_binary_handler+0x1e1/0x48c
[<c0537331>] do_execve+0x2f6/0x46f
[<c04022d9>] sys_execve+0x57/0x96
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf63395e0 (size 16):
comm "init", pid 1, jiffies 4294673953
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339be0 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339bd0 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339bc0 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339bb0 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339ba0 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b90 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b80 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b70 (size 16):
comm "init", pid 1, jiffies 4294673954
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b60 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b50 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b40 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b30 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b20 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b10 (size 16):
comm "init", pid 1, jiffies 4294673955
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339b00 (size 16):
comm "init", pid 1, jiffies 4294673956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339af0 (size 16):
comm "init", pid 1, jiffies 4294673956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339ae0 (size 16):
comm "init", pid 1, jiffies 4294673956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339ad0 (size 16):
comm "init", pid 1, jiffies 4294673956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339ac0 (size 16):
comm "init", pid 1, jiffies 4294673956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04042c5>] syscall_call+0x7/0xb
[<ffffffff>] 0xffffffff
unreferenced object 0xf63395f0 (size 16):
comm "init", pid 1, jiffies 4294673961
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c18930 (size 48):
comm "init", pid 1, jiffies 4294673964
hex dump (first 32 bytes):
28 4c c0 f6 34 89 c1 f5 34 89 c1 f5 01 00 00 00 (L..4...4.......
01 00 00 00 37 00 01 00 01 00 00 00 00 00 00 00 ....7...........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0625679>] selinux_inode_alloc_security+0x2e/0x89
[<c0613269>] security_inode_alloc+0x1e/0x20
[<c054abbc>] inode_init_always+0xbd/0x1b9
[<c054ad1d>] alloc_inode+0x65/0xcd
[<c054b12a>] new_inode+0x1c/0x96
[<c07e752a>] sock_alloc+0x16/0x80
[<c07e8353>] __sock_create+0x10c/0x472
[<c07e8700>] sock_create+0x29/0x2e
[<c07e8a67>] sys_socket+0x47/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6223020 (size 32):
comm "init", pid 1, jiffies 4294673964
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 01 00 00 00 03 00 00 00 ................
37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7...............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0621e70>] selinux_sk_alloc_security+0x40/0x108
[<c0613af9>] security_sk_alloc+0x15/0x18
[<c07ec119>] sk_prot_alloc+0x105/0x268
[<c07ec29c>] sk_alloc+0x20/0x72
[<c08201bf>] __netlink_create+0x2a/0xbc
[<c08204d4>] netlink_create+0x283/0x2d9
[<c07e8522>] __sock_create+0x2db/0x472
[<c07e8700>] sock_create+0x29/0x2e
[<c07e8a67>] sys_socket+0x47/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339ab0 (size 16):
comm "init", pid 1, jiffies 4294673964
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c07e75da>] sock_alloc_fd+0x46/0x8b
[<c07e7717>] sock_map_fd+0x1c/0xa7
[<c07e8a92>] sys_socket+0x72/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339aa0 (size 16):
comm "init", pid 1, jiffies 4294673979
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c0530cc1>] alloc_file+0x1a/0x56
[<c0538515>] create_write_pipe+0x164/0x1da
[<c05385ce>] do_pipe_flags+0x43/0x19b
[<c0538740>] sys_pipe2+0x1a/0x7f
[<c05387b7>] sys_pipe+0x12/0x14
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339a80 (size 16):
comm "init", pid 1, jiffies 4294673979
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053808e>] create_read_pipe+0x14/0x94
[<c053860d>] do_pipe_flags+0x82/0x19b
[<c0538740>] sys_pipe2+0x1a/0x7f
[<c05387b7>] sys_pipe+0x12/0x14
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6339a70 (size 16):
comm "init", pid 1, jiffies 4294673979
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c35040 (size 32):
comm "init", pid 1, jiffies 4294673980
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c0402444>] sys_clone+0x49/0x51
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c126c0 (size 48):
comm "init", pid 856, jiffies 4294673981
hex dump (first 32 bytes):
28 6c c2 f6 c4 26 c1 f5 c4 26 c1 f5 01 00 00 00 (l...&...&......
01 00 00 00 37 00 01 00 01 00 00 00 00 00 00 00 ....7...........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0625679>] selinux_inode_alloc_security+0x2e/0x89
[<c0613269>] security_inode_alloc+0x1e/0x20
[<c054abbc>] inode_init_always+0xbd/0x1b9
[<c054ad1d>] alloc_inode+0x65/0xcd
[<c054b12a>] new_inode+0x1c/0x96
[<c07e752a>] sock_alloc+0x16/0x80
[<c07e8353>] __sock_create+0x10c/0x472
[<c07e8700>] sock_create+0x29/0x2e
[<c07e8a67>] sys_socket+0x47/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6290c40 (size 32):
comm "init", pid 856, jiffies 4294673981
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 01 00 00 00 03 00 00 00 ................
37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7...............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0621e70>] selinux_sk_alloc_security+0x40/0x108
[<c0613af9>] security_sk_alloc+0x15/0x18
[<c07ec119>] sk_prot_alloc+0x105/0x268
[<c07ec29c>] sk_alloc+0x20/0x72
[<c08201bf>] __netlink_create+0x2a/0xbc
[<c08204d4>] netlink_create+0x283/0x2d9
[<c07e8522>] __sock_create+0x2db/0x472
[<c07e8700>] sock_create+0x29/0x2e
[<c07e8a67>] sys_socket+0x47/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c16260 (size 16):
comm "init", pid 856, jiffies 4294673981
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c07e75da>] sock_alloc_fd+0x46/0x8b
[<c07e7717>] sock_map_fd+0x1c/0xa7
[<c07e8a92>] sys_socket+0x72/0x9d
[<c07e9bdd>] sys_socketcall+0xbd/0x1d7
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c16210 (size 16):
comm "nash-hotplug", pid 856, jiffies 4294673982
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5c12720 (size 48):
comm "nash-hotplug", pid 856, jiffies 4294673983
hex dump (first 32 bytes):
98 61 cb f6 24 27 c1 f5 24 27 c1 f5 01 00 00 00 .a..$'..$'......
01 00 00 00 07 00 01 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0625679>] selinux_inode_alloc_security+0x2e/0x89
[<c0613269>] security_inode_alloc+0x1e/0x20
[<c054abbc>] inode_init_always+0xbd/0x1b9
[<c054ad1d>] alloc_inode+0x65/0xcd
[<c054b12a>] new_inode+0x1c/0x96
[<c058b31d>] proc_pid_make_inode+0x11/0xc7
[<c058e376>] proc_pid_instantiate+0x1a/0xe0
[<c058ecf0>] proc_pid_lookup+0x1c5/0x1fd
[<c058a183>] proc_root_lookup+0x3d/0x42
[<c053a0ce>] do_lookup+0x12f/0x338
[<c053ddac>] __link_path_walk+0xf4b/0x164f
[<c053e592>] vfs_follow_link+0xe2/0x1bf
[<c058a5e3>] proc_self_follow_link+0x69/0x74
[<c053d66f>] __link_path_walk+0x80e/0x164f
unreferenced object 0xf5c12780 (size 48):
comm "nash-hotplug", pid 856, jiffies 4294673983
hex dump (first 32 bytes):
18 63 cb f6 84 27 c1 f5 84 27 c1 f5 01 00 00 00 .c...'...'......
01 00 00 00 06 00 01 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0625679>] selinux_inode_alloc_security+0x2e/0x89
[<c0613269>] security_inode_alloc+0x1e/0x20
[<c054abbc>] inode_init_always+0xbd/0x1b9
[<c054ad1d>] alloc_inode+0x65/0xcd
[<c054b12a>] new_inode+0x1c/0x96
[<c058b31d>] proc_pid_make_inode+0x11/0xc7
[<c058e459>] proc_pident_instantiate+0x1d/0xff
[<c058e6e6>] proc_pident_lookup+0xcb/0x103
[<c058e75e>] proc_tgid_base_lookup+0x14/0x16
[<c053a0ce>] do_lookup+0x12f/0x338
[<c053ddac>] __link_path_walk+0xf4b/0x164f
[<c053e6ad>] path_walk+0x3e/0x8d
[<c053e73d>] do_path_lookup+0x41/0x11c
[<c053f9b1>] do_filp_open+0x1aa/0xebc
unreferenced object 0xf5ddd780 (size 16):
comm "init", pid 1, jiffies 4294681956
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6223ba0 (size 32):
comm "kthreadd", pid 2, jiffies 4294682545
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 b4 3b 22 f6 63 00 00 00 .........;".c...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c04024d1>] kernel_thread+0x85/0x8d
[<c047348d>] kthreadd+0xa4/0xec
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf6223f00 (size 32):
comm "kthreadd", pid 2, jiffies 4294682545
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 70 6c 75 67 5f 69 6f 00 ........plug_io.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c04024d1>] kernel_thread+0x85/0x8d
[<c047348d>] kthreadd+0xa4/0xec
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf6223e00 (size 32):
comm "kthreadd", pid 2, jiffies 4294682545
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 63 6b 70 6f 69 6e 74 00 ........ckpoint.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c04024d1>] kernel_thread+0x85/0x8d
[<c047348d>] kthreadd+0xa4/0xec
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf6223b80 (size 32):
comm "kthreadd", pid 2, jiffies 4294682545
hex dump (first 32 bytes):
01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 5f 73 74 61 74 73 00 00 ........_stats..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff1a8>] kmemdup+0x22/0x5a
[<c0624ad2>] selinux_cred_prepare+0x18/0x41
[<c0613437>] security_prepare_creds+0x15/0x18
[<c047af05>] prepare_creds+0xc4/0xeb
[<c047b537>] copy_creds+0x8a/0x2c5
[<c044eff6>] copy_process+0x31e/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c04024d1>] kernel_thread+0x85/0x8d
[<c047348d>] kthreadd+0xa4/0xec
[<c0404e33>] kernel_thread_helper+0x7/0x10
[<ffffffff>] 0xffffffff
unreferenced object 0xf5ddd940 (size 16):
comm "init", pid 1, jiffies 4294683351
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5ddd820 (size 16):
comm "init", pid 1, jiffies 4294683377
hex dump (first 16 bytes):
01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0620df4>] selinux_file_alloc_security+0x34/0xdd
[<c06132ed>] security_file_alloc+0x14/0x16
[<c0530b97>] get_empty_filp+0x10d/0x21d
[<c053f964>] do_filp_open+0x15d/0xebc
[<c052c10e>] do_sys_open+0x93/0x16a
[<c052c231>] sys_open+0x23/0x2b
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58067c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698474
hex dump (first 32 bytes):
34 7e 60 f8 c0 6f 80 f5 50 d5 da f5 60 d5 da f5 4~`..o..P...`...
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad550 (size 16):
comm "modprobe", pid 2123, jiffies 4294698474
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad560 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806fc0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
c0 67 80 f5 80 6a 80 f5 70 d5 da f5 80 d5 da f5 .g...j..p.......
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad570 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad580 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806a80 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
c0 6f 80 f5 e0 6e 80 f5 a0 66 80 f5 90 d5 da f5 .o...n...f......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58066a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 bb 89 f5 72 b7 47 c0 e8 f6 c8 f6 ount....r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad590 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806ee0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
80 6a 80 f5 c0 6a 80 f5 a0 d5 da f5 f0 80 bd f5 .j...j..........
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad5a0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd80f0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
69 6e 74 00 75 a3 8a c0 int.u...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806ac0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
e0 6e 80 f5 e0 6a 80 f5 40 66 80 f5 f8 80 bd f5 .n...j..@f......
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806640 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 db f5 e8 f6 c8 f6 80 57 db f5 e8 f6 c8 f6 h........W......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd80f8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
69 6e 74 00 dd d7 59 c0 int...Y.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5806ae0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
c0 6a 80 f5 34 7e 60 f8 00 81 bd f5 08 81 bd f5 .j..4~`.........
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3cb3>] ftrace_define_fields_i915_ring_wait_end+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8100 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
64 65 76 00 e6 c7 52 c0 dev...R.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3cb3>] ftrace_define_fields_i915_ring_wait_end+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8108 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
75 33 32 00 0e c1 52 c0 u32...R.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3cb3>] ftrace_define_fields_i915_ring_wait_end+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fa80 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
e4 7e 60 f8 40 fb d5 f5 10 d6 da f5 20 d6 da f5 .~`.@....... ...
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad610 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad620 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fb40 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
80 fa d5 f5 40 fa d5 f5 30 d6 da f5 40 d6 da f5 [email protected]...@...
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad630 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad640 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fa40 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
40 fb d5 f5 40 fc d5 f5 40 fe d5 f5 50 d6 da f5 @...@[email protected]...
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fe40 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 f3 3e f6 72 b7 47 c0 e8 f6 c8 f6 ount..>.r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad650 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fc40 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
40 fa d5 f5 20 fd d5 f5 60 d6 da f5 30 81 bd f5 @... ...`...0...
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad660 (size 16):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8130 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
69 6e 74 00 0a 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fd20 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
40 fc d5 f5 c0 fd d5 f5 80 fd d5 f5 38 81 bd f5 @...........8...
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fd80 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 ac fa 91 f5 72 b7 47 c0 e8 f6 c8 f6 h.......r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8138 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
69 6e 74 00 25 08 00 00 int.%...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3b78>] ftrace_define_fields_i915_gem_request_wait_end+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fdc0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
20 fd d5 f5 c0 fe d5 f5 40 81 bd f5 48 81 bd f5 [email protected]...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3bad>] ftrace_define_fields_i915_gem_request_wait_end+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8140 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
64 65 76 00 00 00 00 00 dev.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3bad>] ftrace_define_fields_i915_gem_request_wait_end+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8148 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
75 33 32 00 00 00 00 00 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3bad>] ftrace_define_fields_i915_gem_request_wait_end+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fec0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 32 bytes):
c0 fd d5 f5 e4 7e 60 f8 50 81 bd f5 58 81 bd f5 .....~`.P...X...
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3be5>] ftrace_define_fields_i915_gem_request_wait_end+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8150 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
73 65 71 6e 6f 00 00 00 seqno...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3be5>] ftrace_define_fields_i915_gem_request_wait_end+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8158 (size 8):
comm "modprobe", pid 2123, jiffies 4294698475
hex dump (first 8 bytes):
75 33 32 00 00 02 20 00 u32... .
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3be5>] ftrace_define_fields_i915_gem_request_wait_end+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fc20 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
3c 7f 60 f8 c0 fb d5 f5 70 d6 da f5 80 d6 da f5 <.`.....p.......
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad670 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad680 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fbc0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
20 fc d5 f5 80 fb d5 f5 90 d6 da f5 a0 d6 da f5 ...............
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad690 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6a0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fb80 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
c0 fb d5 f5 c0 f8 d5 f5 40 ff d5 f5 b0 d6 da f5 ........@.......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5ff40 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 a9 fe f5 72 b7 47 c0 e8 f6 c8 f6 ount....r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6b0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5f8c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
80 fb d5 f5 a0 fd d5 f5 c0 d6 da f5 60 81 bd f5 ............`...
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6c0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8160 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
69 6e 74 00 60 81 bd f5 int.`...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fda0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
c0 f8 d5 f5 e0 fb d5 f5 60 fd d5 f5 68 81 bd f5 ........`...h...
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fd60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 0c b8 89 f5 72 b7 47 c0 e8 f6 c8 f6 h.......r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8168 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
69 6e 74 00 c0 10 b9 f5 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3ad9>]
ftrace_define_fields_i915_gem_request_wait_begin+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fbe0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
a0 fd d5 f5 60 fe d5 f5 70 81 bd f5 78 81 bd f5 ....`...p...x...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3b0e>]
ftrace_define_fields_i915_gem_request_wait_begin+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8170 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
64 65 76 00 38 cf 8b f5 dev.8...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3b0e>]
ftrace_define_fields_i915_gem_request_wait_begin+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8178 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
75 33 32 00 24 82 bd f5 u32.$...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3b0e>]
ftrace_define_fields_i915_gem_request_wait_begin+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fe60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
e0 fb d5 f5 3c 7f 60 f8 80 81 bd f5 88 81 bd f5 ....<.`.........
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3b46>]
ftrace_define_fields_i915_gem_request_wait_begin+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8180 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
73 65 71 6e 6f 00 00 00 seqno...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3b46>]
ftrace_define_fields_i915_gem_request_wait_begin+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8188 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
75 33 32 00 08 00 00 00 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3b46>]
ftrace_define_fields_i915_gem_request_wait_begin+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fe00 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
94 7f 60 f8 a0 f7 d5 f5 d0 d6 da f5 e0 d6 da f5 ..`.............
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6d0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6e0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5f7a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
00 fe d5 f5 60 fb d5 f5 f0 d6 da f5 00 d7 da f5 ....`...........
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad6f0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad700 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5fb60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
a0 f7 d5 f5 00 ff d5 f5 60 ff d5 f5 10 d7 da f5 ........`.......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5ff60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 f6 c8 f6 80 57 db f5 e8 f6 c8 f6 ount.....W......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad710 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5d5ff00 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
60 fb d5 f5 20 07 29 f6 20 d7 da f5 90 81 bd f5 `... .). .......
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad720 (size 16):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8190 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
69 6e 74 00 ff ff ff ff int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6290720 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
00 ff d5 f5 60 03 29 f6 c0 01 29 f6 98 81 bd f5 ....`.)...).....
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf62901c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 14 16 3a f6 72 b7 47 c0 e8 f6 c8 f6 h.....:.r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8198 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
69 6e 74 00 75 a3 8a c0 int.u...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3a3a>] ftrace_define_fields_i915_gem_request_retire+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6290360 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
20 07 29 f6 20 0e 29 f6 a0 81 bd f5 a8 81 bd f5 .). .).........
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3a6f>] ftrace_define_fields_i915_gem_request_retire+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81a0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
64 65 76 00 2b dc 59 c0 dev.+.Y.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3a6f>] ftrace_define_fields_i915_gem_request_retire+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81a8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
75 33 32 00 71 fd 52 c0 u32.q.R.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3a6f>] ftrace_define_fields_i915_gem_request_retire+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf6290e20 (size 32):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 32 bytes):
60 03 29 f6 94 7f 60 f8 b0 81 bd f5 b8 81 bd f5 `.)...`.........
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3aa7>] ftrace_define_fields_i915_gem_request_retire+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81b0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
73 65 71 6e 6f 00 ff ff seqno...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3aa7>] ftrace_define_fields_i915_gem_request_retire+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81b8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698476
hex dump (first 8 bytes):
75 33 32 00 00 00 00 00 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3aa7>] ftrace_define_fields_i915_gem_request_retire+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863aa0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
44 80 60 f8 00 3d 86 f5 90 d7 da f5 a0 d7 da f5 D.`..=..........
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad790 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7a0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863d00 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
a0 3a 86 f5 40 38 86 f5 b0 d7 da f5 c0 d7 da f5 .:..@8..........
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7b0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7c0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863840 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
00 3d 86 f5 a0 34 86 f5 60 32 86 f5 d0 d7 da f5 .=...4..`2......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863260 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 f6 c8 f6 80 57 db f5 e8 f6 c8 f6 ount.....W......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7d0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58634a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
40 38 86 f5 c0 33 86 f5 e0 d7 da f5 f0 81 bd f5 @8...3..........
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7e0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81f0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58633c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
a0 34 86 f5 e0 3e 86 f5 00 3a 86 f5 f8 81 bd f5 .4...>...:......
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863a00 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 64 27 9e f5 72 b7 47 c0 e8 f6 c8 f6 h...d'..r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd81f8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
69 6e 74 00 08 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3884>] ftrace_define_fields_i915_gem_request_flush+0x10/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863ee0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
c0 33 86 f5 40 34 86 f5 00 82 bd f5 08 82 bd f5 .3..@4..........
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d38bd>] ftrace_define_fields_i915_gem_request_flush+0x49/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8200 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
64 65 76 00 00 02 20 00 dev... .
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d38bd>] ftrace_define_fields_i915_gem_request_flush+0x49/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8208 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 08 82 bd f5 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d38bd>] ftrace_define_fields_i915_gem_request_flush+0x49/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863440 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
e0 3e 86 f5 60 3f 86 f5 10 82 bd f5 18 82 bd f5 .>..`?..........
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d38f9>] ftrace_define_fields_i915_gem_request_flush+0x85/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8210 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
73 65 71 6e 6f 00 b9 f5 seqno...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d38f9>] ftrace_define_fields_i915_gem_request_flush+0x85/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8218 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 38 cf 8b f5 u32.8...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d38f9>] ftrace_define_fields_i915_gem_request_flush+0x85/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863f60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
40 34 86 f5 60 3c 86 f5 f0 d7 da f5 20 82 bd f5 @4..`<...... ...
00 00 00 00 14 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3931>] ftrace_define_fields_i915_gem_request_flush+0xbd/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad7f0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
66 6c 75 73 68 5f 64 6f 6d 61 69 6e 73 00 00 00 flush_domains...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3931>] ftrace_define_fields_i915_gem_request_flush+0xbd/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8220 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 cc 82 bd f5 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3931>] ftrace_define_fields_i915_gem_request_flush+0xbd/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863c60 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
60 3f 86 f5 44 80 60 f8 a0 38 86 f5 28 82 bd f5 `?..D.`..8..(...
00 00 00 00 18 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3969>] ftrace_define_fields_i915_gem_request_flush+0xf5/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58638a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
69 6e 76 61 6c 69 64 61 74 65 5f 64 6f 6d 61 69 invalidate_domai
6e 73 00 00 ac aa f4 f5 72 b7 47 c0 e8 f6 c8 f6 ns......r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3969>] ftrace_define_fields_i915_gem_request_flush+0xf5/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8228 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 00 00 00 00 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3969>] ftrace_define_fields_i915_gem_request_flush+0xf5/0x117 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863860 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
9c 80 60 f8 c0 3e 86 f5 00 d8 da f5 10 d8 da f5 ..`..>..........
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad800 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad810 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863ec0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
60 38 86 f5 c0 3f 86 f5 20 d8 da f5 30 d8 da f5 `8...?.. ...0...
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad820 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad830 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863fc0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
c0 3e 86 f5 c0 38 86 f5 20 30 86 f5 40 d8 da f5 .>...8.. 0..@...
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863020 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 07 f9 f5 72 b7 47 c0 e8 f6 c8 f6 ount....r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad840 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58638c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
c0 3f 86 f5 00 3b 86 f5 50 d8 da f5 30 82 bd f5 .?...;..P...0...
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad850 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8230 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
69 6e 74 00 08 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863b00 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
c0 38 86 f5 a0 3b 86 f5 e0 3f 86 f5 38 82 bd f5 .8...;...?..8...
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863fe0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 a4 dc 83 f5 72 b7 47 c0 e8 f6 c8 f6 h.......r.G.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8238 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
69 6e 74 00 ff ff ff ff int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d37e5>] ftrace_define_fields_i915_gem_request_submit+0x10/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863ba0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
00 3b 86 f5 a0 3e 86 f5 40 82 bd f5 48 82 bd f5 .;...>[email protected]...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d381a>] ftrace_define_fields_i915_gem_request_submit+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8240 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
64 65 76 00 75 a3 8a c0 dev.u...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d381a>] ftrace_define_fields_i915_gem_request_submit+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8248 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 2b dc 59 c0 u32.+.Y.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d381a>] ftrace_define_fields_i915_gem_request_submit+0x45/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863ea0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
a0 3b 86 f5 9c 80 60 f8 50 82 bd f5 58 82 bd f5 .;....`.P...X...
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3852>] ftrace_define_fields_i915_gem_request_submit+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8250 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
73 65 71 6e 6f 00 52 c0 seqno.R.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3852>] ftrace_define_fields_i915_gem_request_submit+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8258 (size 8):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 8 bytes):
75 33 32 00 ff ff ff ff u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3852>] ftrace_define_fields_i915_gem_request_submit+0x7d/0x9f [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863380 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
f4 80 60 f8 00 32 86 f5 60 d8 da f5 70 d8 da f5 ..`..2..`...p...
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad860 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad870 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5863200 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
80 33 86 f5 c0 30 86 f5 80 d8 da f5 90 d8 da f5 .3...0..........
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad880 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad890 (size 16):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58630c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698477
hex dump (first 32 bytes):
00 32 86 f5 a0 62 3f f6 a0 32 86 f5 a0 d8 da f5 .2...b?..2......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58632a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 f6 c8 f6 80 57 db f5 e8 f6 c8 f6 ount.....W......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8a0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf63f62a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
c0 30 86 f5 60 64 3f f6 b0 d8 da f5 60 82 bd f5 .0..`d?.....`...
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8b0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8260 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf63f6460 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
a0 62 3f f6 00 80 8e f5 c0 64 3f f6 68 82 bd f5 .b?......d?.h...
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf63f64c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 8b f5 02 00 00 00 00 00 00 00 40 0f 49 c0 [email protected].
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8268 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d377e>] ftrace_define_fields_i915_gem_object_destroy+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8000 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
60 64 3f f6 f4 80 60 f8 70 82 bd f5 20 80 8e f5 `d?...`.p... ...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d37b3>] ftrace_define_fields_i915_gem_object_destroy+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8270 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
6f 62 6a 00 00 00 00 00 obj.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d37b3>] ftrace_define_fields_i915_gem_object_destroy+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8020 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
73 74 72 75 63 74 20 64 72 6d 5f 67 65 6d 5f 6f struct drm_gem_o
62 6a 65 63 74 20 2a 00 38 cf 8b f5 08 00 00 00 bject *.8.......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d37b3>] ftrace_define_fields_i915_gem_object_destroy+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8040 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
4c 81 60 f8 60 80 8e f5 c0 d8 da f5 d0 d8 da f5 L.`.`...........
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8c0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8d0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8060 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
40 80 8e f5 80 80 8e f5 e0 d8 da f5 f0 d8 da f5 @...............
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8e0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad8f0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8080 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
60 80 8e f5 c0 80 8e f5 a0 80 8e f5 00 d9 da f5 `...............
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e80a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 02 20 00 b8 80 8e f5 b8 80 8e f5 ount.. .........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad900 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e80c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
80 80 8e f5 e0 80 8e f5 10 d9 da f5 78 82 bd f5 ............x...
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad910 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8278 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e80e0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
c0 80 8e f5 20 81 8e f5 00 81 8e f5 80 82 bd f5 .... ...........
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8100 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 h...............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8280 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 07 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3717>] ftrace_define_fields_i915_gem_object_unbind+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8120 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
e0 80 8e f5 4c 81 60 f8 88 82 bd f5 40 81 8e f5 ....L.`.....@...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d374c>] ftrace_define_fields_i915_gem_object_unbind+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8288 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
6f 62 6a 00 25 08 00 00 obj.%...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d374c>] ftrace_define_fields_i915_gem_object_unbind+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8140 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
73 74 72 75 63 74 20 64 72 6d 5f 67 65 6d 5f 6f struct drm_gem_o
62 6a 65 63 74 20 2a 00 00 13 b9 c0 00 02 20 00 bject *....... .
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d374c>] ftrace_define_fields_i915_gem_object_unbind+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8160 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
a4 81 60 f8 80 81 8e f5 20 d9 da f5 30 d9 da f5 ..`..... ...0...
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad920 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad930 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8180 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
60 81 8e f5 a0 81 8e f5 40 d9 da f5 50 d9 da f5 `[email protected]...
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad940 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad950 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e81a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
80 81 8e f5 e0 81 8e f5 c0 81 8e f5 60 d9 da f5 ............`...
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e81c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 00 00 00 00 00 00 00 07 00 00 00 ount............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad960 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e81e0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
a0 81 8e f5 00 82 8e f5 70 d9 da f5 90 82 bd f5 ........p.......
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad970 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8290 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8200 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
e0 81 8e f5 40 82 8e f5 20 82 8e f5 98 82 bd f5 ....@... .......
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8220 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 8b f5 08 00 00 00 01 00 00 00 ff ff ff ff h...............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd8298 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 00 00 00 00 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d363c>] ftrace_define_fields_i915_gem_object_get_fence+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8240 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
00 82 8e f5 80 82 8e f5 a0 82 bd f5 60 82 8e f5 ............`...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d3675>] ftrace_define_fields_i915_gem_object_get_fence+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82a0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
6f 62 6a 00 08 00 00 00 obj.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d3675>] ftrace_define_fields_i915_gem_object_get_fence+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8260 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
73 74 72 75 63 74 20 64 72 6d 5f 67 65 6d 5f 6f struct drm_gem_o
62 6a 65 63 74 20 2a 00 00 00 00 00 00 00 00 00 bject *.........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d3675>] ftrace_define_fields_i915_gem_object_get_fence+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8280 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
40 82 8e f5 a0 82 8e f5 a8 82 bd f5 b0 82 bd f5 @...............
00 00 00 00 10 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d36ad>] ftrace_define_fields_i915_gem_object_get_fence+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82a8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
66 65 6e 63 65 00 20 00 fence. .
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d36ad>] ftrace_define_fields_i915_gem_object_get_fence+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82b0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 b0 82 bd f5 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d36ad>] ftrace_define_fields_i915_gem_object_get_fence+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e82a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
80 82 8e f5 a4 81 60 f8 80 d9 da f5 b8 82 bd f5 ......`.........
00 00 00 00 14 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d36e5>] ftrace_define_fields_i915_gem_object_get_fence+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad980 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
74 69 6c 69 6e 67 5f 6d 6f 64 65 00 00 00 00 00 tiling_mode.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d36e5>] ftrace_define_fields_i915_gem_object_get_fence+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82b8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 8 bytes):
69 6e 74 00 c0 10 b9 f5 int.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d36e5>] ftrace_define_fields_i915_gem_object_get_fence+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e82c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
fc 81 60 f8 e0 82 8e f5 90 d9 da f5 a0 d9 da f5 ..`.............
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad990 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9a0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e82e0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
c0 82 8e f5 00 83 8e f5 b0 d9 da f5 c0 d9 da f5 ................
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9b0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9c0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8300 (size 32):
comm "modprobe", pid 2123, jiffies 4294698478
hex dump (first 32 bytes):
e0 82 8e f5 40 83 8e f5 20 83 8e f5 d0 d9 da f5 ....@... .......
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8320 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 08 00 00 58 6f 72 67 00 00 00 00 ount....Xorg....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9d0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8340 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
00 83 8e f5 60 83 8e f5 e0 d9 da f5 c0 82 bd f5 ....`...........
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9e0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82c0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
69 6e 74 00 38 cf 8b f5 int.8...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8360 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
40 83 8e f5 a0 83 8e f5 80 83 8e f5 c8 82 bd f5 @...............
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8380 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 00 00 75 a3 8a c0 bc 61 52 c0 2b dc 59 c0 h...u....aR.+.Y.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82c8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
69 6e 74 00 74 83 bd f5 int.t...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d3561>]
ftrace_define_fields_i915_gem_object_change_domain+0x10/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e83a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
60 83 8e f5 e0 83 8e f5 d0 82 bd f5 c0 83 8e f5 `...............
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d359a>]
ftrace_define_fields_i915_gem_object_change_domain+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82d0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
6f 62 6a 00 00 00 00 00 obj.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d359a>]
ftrace_define_fields_i915_gem_object_change_domain+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e83c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
73 74 72 75 63 74 20 64 72 6d 5f 67 65 6d 5f 6f struct drm_gem_o
62 6a 65 63 74 20 2a 00 c5 e2 fb ff 25 08 00 00 bject *.....%...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d359a>]
ftrace_define_fields_i915_gem_object_change_domain+0x49/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e83e0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
a0 83 8e f5 00 84 8e f5 f0 d9 da f5 d8 82 bd f5 ................
00 00 00 00 10 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d35d2>]
ftrace_define_fields_i915_gem_object_change_domain+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dad9f0 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
72 65 61 64 5f 64 6f 6d 61 69 6e 73 00 00 00 00 read_domains....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d35d2>]
ftrace_define_fields_i915_gem_object_change_domain+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82d8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
75 33 32 00 08 00 00 00 u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d35d2>]
ftrace_define_fields_i915_gem_object_change_domain+0x81/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8400 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
e0 83 8e f5 fc 81 60 f8 00 da da f5 e0 82 bd f5 ......`.........
00 00 00 00 14 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d360a>]
ftrace_define_fields_i915_gem_object_change_domain+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada00 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
77 72 69 74 65 5f 64 6f 6d 61 69 6e 00 00 00 00 write_domain....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d360a>]
ftrace_define_fields_i915_gem_object_change_domain+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82e0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
75 33 32 00 ff ff ff ff u32.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d360a>]
ftrace_define_fields_i915_gem_object_change_domain+0xb9/0xdb [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8420 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
54 82 60 f8 40 84 8e f5 10 da da f5 20 da da f5 T.`.@....... ...
00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada10 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 74 79 70 65 00 00 00 00 00 common_type.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada20 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 73 68 6f 72 74 00 00 unsigned short..
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3aff>] trace_define_common_fields+0x1d/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8440 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
20 84 8e f5 60 84 8e f5 30 da da f5 40 da da f5 ...`...0...@...
00 00 00 00 02 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada30 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 66 6c 61 67 73 00 00 00 00 common_flags....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada40 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b3b>] trace_define_common_fields+0x59/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8460 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
40 84 8e f5 a0 84 8e f5 80 84 8e f5 50 da da f5 @...........P...
00 00 00 00 03 00 00 00 01 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8480 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 70 72 65 65 6d 70 74 5f 63 common_preempt_c
6f 75 6e 74 00 00 00 00 f0 83 8e f5 08 00 00 00 ount............
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada50 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
75 6e 73 69 67 6e 65 64 20 63 68 61 72 00 00 00 unsigned char...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3b77>] trace_define_common_fields+0x95/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e84a0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
60 84 8e f5 c0 84 8e f5 60 da da f5 e8 82 bd f5 `.......`.......
00 00 00 00 04 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5dada60 (size 16):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 16 bytes):
63 6f 6d 6d 6f 6e 5f 70 69 64 00 00 00 00 00 00 common_pid......
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82e8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
69 6e 74 00 75 a3 8a c0 int.u...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3baf>] trace_define_common_fields+0xcd/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e84c0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
a0 84 8e f5 00 85 8e f5 e0 84 8e f5 f0 82 bd f5 ................
00 00 00 00 08 00 00 00 04 00 00 00 01 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e84e0 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
63 6f 6d 6d 6f 6e 5f 6c 6f 63 6b 5f 64 65 70 74 common_lock_dept
68 00 52 c0 31 c2 52 c0 d8 41 40 c0 ff ff ff ff h.R.1.R..A@.....
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82f0 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
69 6e 74 00 2b dc 59 c0 int.+.Y.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<c04d3be7>] trace_define_common_fields+0x105/0x12a
[<f85d34fa>] ftrace_define_fields_i915_gem_object_clflush+0x10/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8500 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
c0 84 8e f5 54 82 60 f8 f8 82 bd f5 20 85 8e f5 ....T.`..... ...
00 00 00 00 0c 00 00 00 04 00 00 00 00 00 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c04d3973>] trace_define_field+0x23/0x192
[<f85d352f>] ftrace_define_fields_i915_gem_object_clflush+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf5bd82f8 (size 8):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 8 bytes):
6f 62 6a 00 71 fd 52 c0 obj.q.R.
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a0c>] trace_define_field+0xbc/0x192
[<f85d352f>] ftrace_define_fields_i915_gem_object_clflush+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8520 (size 32):
comm "modprobe", pid 2123, jiffies 4294698479
hex dump (first 32 bytes):
73 74 72 75 63 74 20 64 72 6d 5f 67 65 6d 5f 6f struct drm_gem_o
62 6a 65 63 74 20 2a 00 00 00 00 00 00 00 00 00 bject *.........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
[<c04ff2ac>] kstrdup+0x43/0x7b
[<c04d3a33>] trace_define_field+0xe3/0x192
[<f85d352f>] ftrace_define_fields_i915_gem_object_clflush+0x45/0x67 [i915]
[<c04d3069>] event_create_dir+0x3d7/0x45a
[<c04d33f3>] trace_module_notify+0x307/0x568
[<c08c89d8>] notifier_call_chain+0x30/0x7f
[<c0479958>] __blocking_notifier_call_chain+0x52/0x67
[<c047997e>] blocking_notifier_call_chain+0x11/0x13
[<c0493009>] sys_init_module+0xd9/0x273
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8c80 (size 32):
comm "Xorg", pid 2085, jiffies 4294698492
hex dump (first 32 bytes):
69 39 31 35 40 70 63 69 3a 30 30 30 30 3a 30 30 i915@pci:0000:00
3a 30 32 2e 30 00 00 00 00 00 00 00 00 00 00 00 :02.0...........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c05261bc>] __kmalloc+0x29d/0x31a
[<f82a4fd5>] drm_setversion+0x20f/0x331 [drm]
[<f82a2b99>] drm_ioctl+0x328/0x3f9 [drm]
[<c0542019>] vfs_ioctl+0xb7/0xd0
[<c0542935>] do_vfs_ioctl+0x81b/0x837
[<c05429c4>] sys_ioctl+0x73/0xb1
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xed8fd2c0 (size 64):
comm "gdm-simple-slav", pid 3178, jiffies 4294726331
hex dump (first 32 bytes):
02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 f4 ad b9 f5 a6 09 47 c0 6b 0c 00 00 ..........G.k...
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c0525147>] kmem_cache_alloc+0x184/0x20a
[<c0470278>] alloc_pid+0x1e/0x495
[<c044fd34>] copy_process+0x105c/0x17bf
[<c04506ed>] do_fork+0x256/0x556
[<c0402444>] sys_clone+0x49/0x51
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf58e8e60 (size 32):
comm "Xorg", pid 3179, jiffies 4294727166
hex dump (first 32 bytes):
69 39 31 35 40 70 63 69 3a 30 30 30 30 3a 30 30 i915@pci:0000:00
3a 30 32 2e 30 00 e8 f5 72 b7 47 c0 00 02 20 00 :02.0...r.G... .
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c05261bc>] __kmalloc+0x29d/0x31a
[<f82a4fd5>] drm_setversion+0x20f/0x331 [drm]
[<f82a2b99>] drm_ioctl+0x328/0x3f9 [drm]
[<c0542019>] vfs_ioctl+0xb7/0xd0
[<c0542935>] do_vfs_ioctl+0x81b/0x837
[<c05429c4>] sys_ioctl+0x73/0xb1
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf4ad8000 (size 2048):
comm "Xorg", pid 3277, jiffies 4294796035
hex dump (first 32 bytes):
60 ce 8d c1 00 00 00 00 00 10 00 00 00 30 ff 34 `............0.4
00 10 00 00 80 ce 8d c1 00 00 00 00 00 10 00 00 ................
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c05261bc>] __kmalloc+0x29d/0x31a
[<c067c9ff>] sg_kmalloc+0x40/0x45
[<c067c2c0>] __sg_alloc_table+0x6a/0x143
[<c067c469>] sg_alloc_table+0x1a/0x5f
[<c0734f8f>] intel_agp_map_memory+0x21/0x1ad
[<c072fdbc>] agp_bind_memory+0xa0/0x124
[<c072e401>] agp_ioctl+0x58d/0x624
[<c0541fbe>] vfs_ioctl+0x5c/0xd0
[<c0542935>] do_vfs_ioctl+0x81b/0x837
[<c05429c4>] sys_ioctl+0x73/0xb1
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xf06e0400 (size 1024):
comm "Xorg", pid 3277, jiffies 4294796147
hex dump (first 32 bytes):
40 d1 85 c1 00 00 00 00 00 10 00 00 00 a0 00 31 @..............1
00 10 00 00 60 d1 85 c1 00 00 00 00 00 10 00 00 ....`...........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c05261bc>] __kmalloc+0x29d/0x31a
[<c067c9ff>] sg_kmalloc+0x40/0x45
[<c067c2c0>] __sg_alloc_table+0x6a/0x143
[<c067c469>] sg_alloc_table+0x1a/0x5f
[<c0734f8f>] intel_agp_map_memory+0x21/0x1ad
[<c072fdbc>] agp_bind_memory+0xa0/0x124
[<c072e401>] agp_ioctl+0x58d/0x624
[<c0541fbe>] vfs_ioctl+0x5c/0xd0
[<c0542935>] do_vfs_ioctl+0x81b/0x837
[<c05429c4>] sys_ioctl+0x73/0xb1
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff
unreferenced object 0xee100000 (size 2048):
comm "Xorg", pid 3277, jiffies 4294796253
hex dump (first 32 bytes):
c0 cc 7e c1 00 00 00 00 00 10 00 00 00 60 7e 2d ..~..........`~-
00 10 00 00 e0 cc 7e c1 00 00 00 00 00 10 00 00 ......~.........
backtrace:
[<c08aa375>] kmemleak_alloc+0x100/0x13e
[<c05261bc>] __kmalloc+0x29d/0x31a
[<c067c9ff>] sg_kmalloc+0x40/0x45
[<c067c2c0>] __sg_alloc_table+0x6a/0x143
[<c067c469>] sg_alloc_table+0x1a/0x5f
[<c0734f8f>] intel_agp_map_memory+0x21/0x1ad
[<c072fdbc>] agp_bind_memory+0xa0/0x124
[<c072e401>] agp_ioctl+0x58d/0x624
[<c0541fbe>] vfs_ioctl+0x5c/0xd0
[<c0542935>] do_vfs_ioctl+0x81b/0x837
[<c05429c4>] sys_ioctl+0x73/0xb1
[<c04041d8>] sysenter_do_call+0x12/0x2d
[<ffffffff>] 0xffffffff

and the .config is here (only those "debug" and "kmemleak" extracted):

CONFIG_ARCH_SUPPORTS_DEBUG_PAGEALLOC=y
CONFIG_DEBUG_PERF_USE_VMALLOC=y
CONFIG_SLUB_DEBUG=y
CONFIG_HAVE_DMA_API_DEBUG=y
CONFIG_X86_DEBUGCTLMSR=y
CONFIG_PM_DEBUG=y
CONFIG_CPU_FREQ_DEBUG=y
CONFIG_MAC80211_DEBUGFS=y
CONFIG_DEBUG_DEVRES=y
CONFIG_PNP_DEBUG_MESSAGES=y
CONFIG_AIC7XXX_DEBUG_MASK=0
CONFIG_AIC79XX_DEBUG_MASK=0
CONFIG_SCSI_MVSAS_DEBUG=y
CONFIG_SCSI_DEBUG=m
CONFIG_DM_DEBUG=y
CONFIG_FIREWIRE_OHCI_DEBUG=y
CONFIG_MLX4_DEBUG=y
CONFIG_LIBERTAS_DEBUG=y
CONFIG_ATH5K_DEBUG=y
CONFIG_IWLWIFI_DEBUG=y
CONFIG_IWLWIFI_DEBUGFS=y
CONFIG_B43_DEBUG=y
CONFIG_B43LEGACY_DEBUG=y
CONFIG_SND_DEBUG=y
CONFIG_SND_PCM_XRUN_DEBUG=y
CONFIG_USB_SERIAL_DEBUG=m
CONFIG_MEMSTICK_DEBUG=y
CONFIG_INFINIBAND_MTHCA_DEBUG=y
CONFIG_INFINIBAND_IPOIB_DEBUG=y
CONFIG_INFINIBAND_IPOIB_DEBUG_DATA=y
CONFIG_JBD_DEBUG=y
CONFIG_JBD2_DEBUG=y
CONFIG_JFFS2_FS_DEBUG=0
CONFIG_UFS_DEBUG=y
CONFIG_DLM_DEBUG=y
CONFIG_DEBUG_FS=y
CONFIG_DEBUG_KERNEL=y
CONFIG_DEBUG_SHIRQ=y
CONFIG_SCHED_DEBUG=y
CONFIG_DEBUG_OBJECTS=y
CONFIG_DEBUG_OBJECTS_SELFTEST=y
CONFIG_DEBUG_OBJECTS_FREE=y
CONFIG_DEBUG_OBJECTS_ENABLE_DEFAULT=1
CONFIG_DEBUG_KMEMLEAK=y
CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE=400
CONFIG_DEBUG_KMEMLEAK_TEST=y
CONFIG_DEBUG_SPINLOCK_SLEEP=y
CONFIG_DEBUG_HIGHMEM=y
CONFIG_DEBUG_BUGVERBOSE=y
CONFIG_DEBUG_INFO=y
CONFIG_DEBUG_MEMORY_INIT=y
CONFIG_DEBUG_LIST=y
CONFIG_DYNAMIC_DEBUG=y
CONFIG_DMA_API_DEBUG=y
CONFIG_DEBUG_RODATA=y
CONFIG_DEBUG_BOOT_PARAMS=y
CONFIG_KEYS_DEBUG_PROC_KEYS=y
CONFIG_DEBUG_KMEMLEAK=y
CONFIG_DEBUG_KMEMLEAK_EARLY_LOG_SIZE=400
CONFIG_DEBUG_KMEMLEAK_TEST=y
CONFIG_HAVE_ARCH_KMEMCHECK=y

> a few times, do they disappear? I think the debug_objects reports are
> false positives but couldn't figure why kmemleak cannot track
> them. I'll look again at them and maybe add an annotation
> (kmemleak_not_leak).

yes, i just read the above in Documentation/kmemleak.txt - which is a
form of whitelisting all the API known not to be leaking. perhaps
the above errors can be used as the starting point ?? :-).

>
> --
> Catalin
>



--
Regards,
Peter Teoh

2009-10-16 09:49:35

by Catalin Marinas

[permalink] [raw]
Subject: Re: kmemleak errors

On Fri, 2009-10-16 at 13:39 +0800, Peter Teoh wrote:
> sorry, i have overwritten the kernel image to follow up on another
> kernel bugzilla report. but on another (32bit Fedora Core10) the
> following is the kmemleak output (scan > /sys/kernel/debug/kmemleak is
> done at least thrice) and the following output remained exactly not
> changed - not even a single byte modified:
>
> unreferenced object 0xf70320a0 (size 32):
> comm "swapper", pid 0, jiffies 4294667388
> hex dump (first 32 bytes):
> 01 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<c08aa375>] kmemleak_alloc+0x100/0x13e
> [<c0525ea9>] __kmalloc_track_caller+0x29f/0x315
> [<c04ff1a8>] kmemdup+0x22/0x5a
> [<c0624ad2>] selinux_cred_prepare+0x18/0x41
> [<c0613437>] security_prepare_creds+0x15/0x18
> [<c047af05>] prepare_creds+0xc4/0xeb
> [<c047b537>] copy_creds+0x8a/0x2c5
> [<c044eff6>] copy_process+0x31e/0x17bf
> [<c04506ed>] do_fork+0x256/0x556
> [<c04024d1>] kernel_thread+0x85/0x8d
> [<c08a85ea>] rest_init+0x1e/0x5a
> [<c0d34b5c>] start_kernel+0x383/0x388
> [<c0d340ae>] i386_start_kernel+0xae/0xb3
> [<ffffffff>] 0xffffffff

Possibly real leak. I cc'ed David Howells since he seems to be touching
this code more frequently.

> unreferenced object 0xf7253200 (size 32):
> comm "swapper", pid 1, jiffies 4294669642
> hex dump (first 32 bytes):
> a0 36 25 f7 00 00 00 00 00 00 00 00 00 00 00 00 .6%.............
> 00 00 00 00 44 5f 25 f6 72 b7 47 c0 00 00 00 00 ....D_%.r.G.....
> backtrace:
> [<c08aa375>] kmemleak_alloc+0x100/0x13e
> [<c0525147>] kmem_cache_alloc+0x184/0x20a
> [<c0d5cb39>] kmemleak_test_init+0x25/0x6e8
> [<c040116a>] do_one_initcall+0x78/0x1fb
> [<c0d343e6>] kernel_init+0x160/0x1dd
> [<c0404e33>] kernel_thread_helper+0x7/0x10
> [<ffffffff>] 0xffffffff

Please disable the kmemleak testing module as it introduces leaks
explicitly for testing kmemleak.

> unreferenced object 0xf5c16270 (size 16):
> comm "swapper", pid 1, jiffies 4294673952
> hex dump (first 16 bytes):
> 01 00 00 00 01 00 00 00 03 00 00 00 00 00 00 00 ................
> backtrace:
> [<c08aa375>] kmemleak_alloc+0x100/0x13e
> [<c0525147>] kmem_cache_alloc+0x184/0x20a
> [<c0620df4>] selinux_file_alloc_security+0x34/0xdd
> [<c06132ed>] security_file_alloc+0x14/0x16
> [<c0530b97>] get_empty_filp+0x10d/0x21d
> [<c053f964>] do_filp_open+0x15d/0xebc
> [<c052c10e>] do_sys_open+0x93/0x16a
> [<c052c231>] sys_open+0x23/0x2b
> [<c0401322>] init_post+0x35/0x18f
> [<c0d34459>] kernel_init+0x1d3/0x1dd
> [<c0404e33>] kernel_thread_helper+0x7/0x10
> [<ffffffff>] 0xffffffff

Some of these could be triggered by an earlier leak, so resolving the
first one would automatically make the rest disappear. It could also be
that they are just false positive - pointers to them are stored in an
area not scanned by kmemleak (like the one below).

> unreferenced object 0xf58067c0 (size 32):
> comm "modprobe", pid 2123, jiffies 4294698474
> hex dump (first 32 bytes):
> 34 7e 60 f8 c0 6f 80 f5 50 d5 da f5 60 d5 da f5 4~`..o..P...`...
> 00 00 00 00 00 00 00 00 02 00 00 00 00 00 00 00 ................
> backtrace:
> [<c08aa375>] kmemleak_alloc+0x100/0x13e
> [<c0525147>] kmem_cache_alloc+0x184/0x20a
> [<c04d3973>] trace_define_field+0x23/0x192
> [<c04d3aff>] trace_define_common_fields+0x1d/0x12a
> [<f85d3c7e>] ftrace_define_fields_i915_ring_wait_end+0x10/0x67 [i915]
> [<c04d3069>] event_create_dir+0x3d7/0x45a
> [<c04d33f3>] trace_module_notify+0x307/0x568
> [<c08c89d8>] notifier_call_chain+0x30/0x7f
> [<c0479958>] __blocking_notifier_call_chain+0x52/0x67
> [<c047997e>] blocking_notifier_call_chain+0x11/0x13
> [<c0493009>] sys_init_module+0xd9/0x273
> [<c04041d8>] sysenter_do_call+0x12/0x2d
> [<ffffffff>] 0xffffffff

These look like false positives since kmemleak doesn't scan all the
sections in a module. I proposed a patch here:

http://lkml.org/lkml/2009/10/15/155

But it doesn't seem to fix it. I'll send another.

--
Catalin