Return-Path: Received: from cam-admin0.cambridge.arm.com ([217.140.96.50]:56579 "EHLO cam-admin0.cambridge.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754871Ab0KJSMV (ORCPT ); Wed, 10 Nov 2010 13:12:21 -0500 Subject: Memory leak via nfs_readdir_make_qstr From: Catalin Marinas To: Bryan Schumaker , Trond Myklebust Cc: linux-nfs@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Date: Wed, 10 Nov 2010 18:12:17 +0000 Message-ID: <1289412737.4513.80.camel@e102109-lin.cambridge.arm.com> Sender: linux-nfs-owner@vger.kernel.org List-ID: MIME-Version: 1.0 Hi, I tested the 2.6.37-rc1 on an ARM platform with nfsroot filesystem. Kmemleak reports quite a lot (> 150) of leaks like below. You seem to have made changes recently to this area. unreferenced object 0xef3aa600 (size 32): comm "modprobe", pid 480, jiffies 4294938128 (age 1250.660s) hex dump (first 32 bytes): 2e 2e 3a ef 00 01 10 00 00 02 20 00 60 f3 93 ef ..:....... .`... e0 be 82 ef e0 01 00 00 a1 85 48 39 1d 08 44 bb ..........H9..D. backtrace: [] create_object+0xbd/0x1bc [] kmemleak_alloc+0x21/0x40 [] __kmalloc_track_caller+0x81/0xc4 [] kmemdup+0x11/0x20 [] nfs_readdir_page_filler+0xef/0x360 [] nfs_readdir_xdr_to_array+0x1f7/0x2e4 [] nfs_readdir_filler+0x11/0x58 [] do_read_cache_page+0x47/0xd8 [] read_cache_page_async+0x15/0x18 [] read_cache_page+0x7/0xc [] nfs_readdir+0xd5/0x398 [] vfs_readdir+0x5f/0x74 [] sys_getdents+0x49/0x74 [] ret_fast_syscall+0x1/0x44 Any quick thoughts? I'll have a look tomorrow as well. Thanks, Catalin