Hello
Bellow kmemleak was observed after running the ndctl test suite on the
latest linux tree,
pls help check it and let me know if you need any testing/info about it, thanks.
# dmesg | grep kmemleak
[ 1508.068668] kmemleak: 28 new suspected memory leaks (see
/sys/kernel/debug/kmemleak)
[ 1955.149091] kmemleak: 1 new suspected memory leaks (see
/sys/kernel/debug/kmemleak)
# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff8883297984c0 (size 32):
comm "ndctl", pid 9449, jiffies 4295135511 (age 1283.953s)
hex dump (first 32 bytes):
00 b0 fe 0b 01 00 00 00 00 01 00 00 00 00 00 00 ................
30 c9 14 99 82 88 ff ff 90 3d 1b 08 93 88 ff ff 0........=......
backtrace:
[<ffffffff8617a677>] kmalloc_trace+0x27/0xe0
[<ffffffffc0ebf875>] badrange_add+0x65/0x1c0 [libnvdimm]
[<ffffffffc176b9b8>] __kstrtabns_cxl_core_test+0x82b1/0x13491 [cxl_core]
[<ffffffffc0e9dc78>] __nd_ioctl+0xaa8/0xe70 [libnvdimm]
[<ffffffffc0e9e1e5>] nd_ioctl+0x195/0x2b0 [libnvdimm]
[<ffffffff864231d8>] __x64_sys_ioctl+0x128/0x1a0
[<ffffffff87db91b9>] do_syscall_64+0x59/0x90
[<ffffffff87e000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888230c1d6c0 (size 32):
comm "modprobe", pid 10241, jiffies 4295239448 (age 1180.362s)
hex dump (first 32 bytes):
03 00 00 00 a0 0a 00 00 00 a0 6e 00 00 c9 ff ff ..........n.....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff8617a677>] kmalloc_trace+0x27/0xe0
[<ffffffffc176a499>] __kstrtabns_cxl_core_test+0x6d92/0x13491 [cxl_core]
[<ffffffff86fa2d9c>] platform_probe+0x9c/0x150
[<ffffffff86f9b76f>] really_probe+0x3df/0xb50
[<ffffffff86f9c07a>] __driver_probe_device+0x18a/0x450
[<ffffffff86f9c399>] driver_probe_device+0x49/0x120
[<ffffffff86f9c8e0>] __driver_attach+0x1e0/0x4a0
[<ffffffff86f95b70>] bus_for_each_dev+0xf0/0x170
[<ffffffff86f98f0d>] bus_add_driver+0x29d/0x570
[<ffffffff86f9f093>] driver_register+0x133/0x460
[<ffffffffc1652509>] _sub_I_65535_1+0x219/0xd10 [dax_cxl]
[<ffffffff85802829>] do_one_initcall+0xf9/0x4d0
[<ffffffff85cab233>] do_init_module+0x233/0x730
[<ffffffff85caf67b>] load_module+0x165b/0x2140
[<ffffffff85cb0622>] __do_sys_finit_module+0x102/0x190
[<ffffffff87db91b9>] do_syscall_64+0x59/0x90
unreferenced object 0xffff8882321f3340 (size 32):
comm "modprobe", pid 11392, jiffies 4295321086 (age 1098.726s)
hex dump (first 32 bytes):
03 00 00 00 a0 0a 00 00 00 a0 6e 00 00 c9 ff ff ..........n.....
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<ffffffff8617a677>] kmalloc_trace+0x27/0xe0
[<ffffffffc1a92499>] 0xffffffffc1a92499
[<ffffffff86fa2d9c>] platform_probe+0x9c/0x150
[<ffffffff86f9b76f>] really_probe+0x3df/0xb50
[<ffffffff86f9c07a>] __driver_probe_device+0x18a/0x450
[<ffffffff86f9c399>] driver_probe_device+0x49/0x120
[<ffffffff86f9c8e0>] __driver_attach+0x1e0/0x4a0
[<ffffffff86f95b70>] bus_for_each_dev+0xf0/0x170
[<ffffffff86f98f0d>] bus_add_driver+0x29d/0x570
[<ffffffff86f9f093>] driver_register+0x133/0x460
[<ffffffffc071d509>] 0xffffffffc071d509
[<ffffffff85802829>] do_one_initcall+0xf9/0x4d0
[<ffffffff85cab233>] do_init_module+0x233/0x730
[<ffffffff85caf67b>] load_module+0x165b/0x2140
[<ffffffff85cb0622>] __do_sys_finit_module+0x102/0x190
[<ffffffff87db91b9>] do_syscall_64+0x59/0x90
--
Best Regards,
Yi Zhang