[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] domU v3.10.x kmemleak
Hello, I have activated kmemleak on a v3.10.x domU (x86_64) running on a dom0 v3.4.x (x86_32) and xen hypervisor v4.1.x This domU is leaking pages, among other things I found this output in kmemleak: unreferenced object 0xffff88005c9b3498 (size 560): comm "blkid", pid 572, jiffies 4294893852 (age 1912.348s) hex dump (first 32 bytes): 02 00 00 00 00 00 00 00 c0 2d 76 59 00 88 ff ff .........-vY.... 00 2f 24 81 ff ff ff ff 00 00 00 00 00 00 00 00 ./$............. backtrace: [<ffffffff81243aa0>] radix_tree_preload+0x30/0x90 [<ffffffff81243aa0>] radix_tree_preload+0x30/0x90 [<ffffffff810f6518>] kmem_cache_alloc+0x138/0x230 [<ffffffff81243aa0>] radix_tree_preload+0x30/0x90 [<ffffffff810bbb9b>] add_to_page_cache_locked+0x7b/0x140 [<ffffffff810bbc71>] add_to_page_cache_lru+0x11/0x40 [<ffffffff810c5946>] __do_page_cache_readahead+0x236/0x250 [<ffffffff8100680b>] xen_make_pte+0x1b/0x50 [<ffffffff810c5baf>] force_page_cache_readahead+0x8f/0xc0 [<ffffffff810bd076>] generic_file_aio_read+0x4c6/0x6c0 [<ffffffff81004739>] __raw_callee_save_xen_pmd_val+0x11/0x1e [<ffffffff8110b78a>] do_sync_read+0x6a/0xa0 [<ffffffff8110c670>] vfs_read+0xa0/0x180 [<ffffffff8110c901>] SyS_read+0x51/0xb0 [<ffffffff81395369>] system_call_fastpath+0x16/0x1b [<ffffffffffffffff>] 0xffffffffffffffff unreferenced object 0xffff88005af24bc0 (size 192): comm "softirq", pid 0, jiffies 4294894408 (age 2246.916s) hex dump (first 32 bytes): b0 d0 e6 50 00 88 ff ff 70 72 2f 81 ff ff ff ff ...P....pr/..... 00 00 00 00 00 00 00 00 00 50 f9 5b 00 88 ff ff .........P.[.... backtrace: [<ffffffff812d1ea6>] dst_alloc+0x56/0x180 [<ffffffff812d1ea6>] dst_alloc+0x56/0x180 [<ffffffff810f6518>] kmem_cache_alloc+0x138/0x230 [<ffffffff812d1ea6>] dst_alloc+0x56/0x180 [<ffffffff812f9b9e>] ip_route_input_noref+0x11e/0xbf0 [<ffffffff81186ad1>] ext4_end_bio+0x251/0x2d0 [<ffffffff810f5729>] poison_obj+0x29/0x40 [<ffffffff812fc274>] ip_rcv_finish+0x184/0x360 [<ffffffff812ca033>] __netif_receive_skb_core+0x5e3/0x7d0 [<ffffffff812ca434>] netif_receive_skb+0x24/0x80 [<ffffffff812cb7e8>] napi_gro_receive+0x98/0xd0 [<ffffffff8129de37>] xennet_poll+0x797/0xce0 [<ffffffff8107e91f>] clockevents_program_event+0x6f/0x110 [<ffffffff810a7043>] handle_irq_event_percpu+0x83/0x140 [<ffffffff812ca734>] net_rx_action+0x104/0x1c0 [<ffffffff81042056>] __do_softirq+0xd6/0x1b0 Do you have any idea where this could come from? Thanks, -- William _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |