From: Catalin Marinas <catalin.marinas@arm.com>
To: Christoph Hellwig <hch@lst.de>
Cc: linux-block@vger.kernel.org, linux-kernel@vger.kernel.org,
Jens Axboe <axboe@fb.com>
Subject: kmemleak report after 9082e87bfbf8 ("block: remove struct bio_batch")
Date: Mon, 6 Jun 2016 12:26:20 +0100 [thread overview]
Message-ID: <20160606112620.GA29910@e104818-lin.cambridge.arm.com> (raw)
Hi Christoph,
I tried enabling kmemleak on 4.7-rc2 on an x86 host (macbook pro running
Debian sid) and I get some kmemleak reports every few minutes coming
from the block layer. Reverting commit 9082e87bfbf8 ("block: remove
struct bio_batch") makes them go away:
unreferenced object 0xffff880077859c00 (size 256):
comm "upowerd", pid 1185, jiffies 4295046823 (age 1874.852s)
hex dump (first 32 bytes):
80 39 08 00 00 ea ff ff 00 10 00 00 00 00 00 00 .9..............
00 00 00 00 00 00 00 00 00 e4 21 49 02 88 ff ff ..........!I....
backtrace:
[<ffffffff811d244e>] kmem_cache_alloc+0xfe/0x250
[<ffffffff812dc8b7>] bvec_alloc+0x57/0xe0
[<ffffffff812dcaaf>] bio_alloc_bioset+0x16f/0x240
[<ffffffff812eca7f>] next_bio+0x1f/0x50
[<ffffffff812ecf1a>] blkdev_issue_zeroout+0xea/0x1d0
[<ffffffffc025b610>] ext4_issue_zeroout+0x40/0x50 [ext4]
[<ffffffffc028c58d>] ext4_ext_map_blocks+0x144d/0x1bb0 [ext4]
[<ffffffff811839f4>] release_pages+0x254/0x310
[<ffffffff8118437a>] __pagevec_release+0x2a/0x40
[<ffffffffc025b297>] mpage_prepare_extent_to_map+0x227/0x2c0 [ext4]
[<ffffffffc025b793>] ext4_map_blocks+0x173/0x5d0 [ext4]
[<ffffffffc025f1d0>] ext4_writepages+0x700/0xd40 [ext4]
[<ffffffff8121312e>] legitimize_mnt+0xe/0x50
[<ffffffff811d244e>] kmem_cache_alloc+0xfe/0x250
[<ffffffff81173fd5>] __filemap_fdatawrite_range+0xc5/0x100
[<ffffffff81174113>] filemap_write_and_wait_range+0x33/0x70
It's coming from various processes, not just upowerd. I haven't got the
chance to dig further but you may have a better idea.
Thanks.
--
Catalin
next reply other threads:[~2016-06-06 11:26 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-06-06 11:26 Catalin Marinas [this message]
2016-06-06 14:13 ` kmemleak report after 9082e87bfbf8 ("block: remove struct bio_batch") Christoph Hellwig
2016-06-06 16:12 ` Catalin Marinas
2016-06-06 17:09 ` Shaun Tancheff
2016-06-06 17:27 ` Christoph Hellwig
2016-06-06 17:35 ` Catalin Marinas
2016-06-06 18:15 ` Jens Axboe
2016-06-07 9:39 ` Catalin Marinas
2016-06-07 14:18 ` Larry Finger
2016-06-07 15:43 ` David Drysdale
2016-06-07 4:06 ` Larry Finger
2016-06-07 6:36 ` Christoph Hellwig
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160606112620.GA29910@e104818-lin.cambridge.arm.com \
--to=catalin.marinas@arm.com \
--cc=axboe@fb.com \
--cc=hch@lst.de \
--cc=linux-block@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).