[FS#3339] [netifd] potential kernel memory leak
OpenWrt Bugs
openwrt-bugs at lists.openwrt.org
Tue Sep 15 12:08:42 EDT 2020
THIS IS AN AUTOMATED MESSAGE, DO NOT REPLY.
A new Flyspray task has been opened. Details are below.
User who did this - n8v8R (n8v8R)
Attached to Project - OpenWrt/LEDE Project
Summary - [netifd] potential kernel memory leak
Task Type - Bug Report
Category - Base system
Status - Unconfirmed
Assigned To -
Operating System - All
Severity - Medium
Priority - Very Low
Reported Version - Trunk
Due in Version - Undecided
Due Date - Undecided
Details - * mvebu
* self-compiled kernel 5.9 with memleak detection enabled
* netifd 2020-09-12-55a7b6b7-1
----
echo clear > /sys/kernel/debug/kmemleak
echo scan > /sys/kernel/debug/kmemleak
cat /sys/kernel/debug/kmemleak
unreferenced object 0xe9400000 (size 8896):
comm "netifd", pid 2314, jiffies 4294824963 (age 12186.578s)
hex dump (first 32 bytes):
00 00 40 e9 00 00 00 00 00 00 00 00 00 00 00 00 .. at .............
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] hwbm_pool_refill+0x50/0x88
[] hwbm_pool_add+0x6c/0x11c
[] mvneta_bm_update_mtu+0x64/0x1ac
[] mvneta_change_mtu+0xa4/0x140
[] dev_set_mtu_ext+0xd8/0x198
[] dev_set_mtu+0x44/0xa4
[] dsa_slave_change_mtu+0x134/0x20c
[] dev_set_mtu_ext+0xd8/0x198
[] dev_set_mtu+0x44/0xa4
[] dev_ioctl+0x31c/0x464
[] sock_ioctl+0x2e4/0x664
[] sys_ioctl+0x90/0xbc
[] ret_fast_syscall+0x0/0x54
[] 0xbecaaad8
unreferenced object 0xea92c000 (size 8896):
comm "netifd", pid 2314, jiffies 4294824965 (age 12186.574s)
hex dump (first 32 bytes):
00 c0 92 ea 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[] hwbm_pool_refill+0x50/0x88
[] hwbm_pool_add+0x6c/0x11c
[] mvneta_bm_update_mtu+0x64/0x1ac
[] mvneta_change_mtu+0xa4/0x140
[] dev_set_mtu_ext+0xd8/0x198
[] dev_set_mtu+0x44/0xa4
[] dsa_slave_change_mtu+0x134/0x20c
[] dev_set_mtu_ext+0xd8/0x198
[] dev_set_mtu+0x44/0xa4
[] dev_ioctl+0x31c/0x464
[] sock_ioctl+0x2e4/0x664
[] sys_ioctl+0x90/0xbc
[] ret_fast_syscall+0x0/0x54
[] 0xbecaaad8
More information can be found at the following URL:
https://bugs.openwrt.org/index.php?do=details&task_id=3339
You are receiving this message because you have requested it from the Flyspray bugtracking system. If you did not expect this message or don't want to receive mails in future, you can change your notification settings at the URL shown above.
More information about the openwrt-bugs
mailing list