Find the answer to your Linux question:
Results 1 to 2 of 2
Hi, I'm developing custom kernel for Android smartphone. I've already made some tweaks and now I want to check if are there any bugs in kernel. Here's output from kmemleak ...
Enjoy an ad free experience by logging in. Not a member yet? Register.
  1. #1
    Just Joined!
    Join Date
    Aug 2012
    Posts
    3

    Help with find out if are these memory leaks?


    Hi, I'm developing custom kernel for Android smartphone.
    I've already made some tweaks and now I want to check if are there any bugs in kernel.
    Here's output from kmemleak
    Code:
    unreferenced object 0xe66d5700 (size 32):
      comm "swapper", pid 1, jiffies 4294937432 (age 538.020s)
      hex dump (first 32 bytes):
        de 5e 76 bc 24 67 df 11 8e 12 ec db df d7 20 85  .^v.$g........ .
        5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a a5  ZZZZZZZZZZZZZZZ.
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1c88>] kmem_cache_alloc_trace+0x130/0x218
        [<c07266bc>] teec_open_session+0x84/0x10c
        [<c00125bc>] product_detect+0x7c/0x274
        [<c02f584c>] do_one_initcall+0x128/0x190
        [<c0008bb4>] kernel_init+0x98/0x144
        [<c02fd288>] kernel_thread_exit+0x0/0x8
        [<ffffffff>] 0xffffffff
    unreferenced object 0xe4fcb840 (size 32):
      comm "modem_log_relay", pid 1687, jiffies 4294941522 (age 497.160s)
      hex dump (first 32 bytes):
        de 5e 76 bc 24 67 df 11 8e 12 ec db df d7 20 85  .^v.$g........ .
        5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a a5  ZZZZZZZZZZZZZZZ.
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1c88>] kmem_cache_alloc_trace+0x130/0x218
        [<c0725cf8>] tee_write+0xe4/0xa24
        [<c03f7dcc>] vfs_write+0xb8/0x148
        [<c03f8064>] sys_write+0x4c/0x78
        [<c02fc740>] ret_fast_syscall+0x0/0x30
        [<ffffffff>] 0xffffffff
    unreferenced object 0xcd34f380 (size 96):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.270s)
      hex dump (first 32 bytes):
        00 00 00 00 fc b8 50 c0 88 b6 50 c0 e0 b6 50 c0  ......P...P...P.
        d0 d1 50 c0 04 a9 50 c0 c0 f2 34 cd 10 00 00 00  ..P...P...4.....
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
        [<c0408544>] do_vfs_ioctl+0x90/0x574
        [<c0408a70>] sys_ioctl+0x48/0x6c
        [<c02fc740>] ret_fast_syscall+0x0/0x30
        [<ffffffff>] 0xffffffff
    unreferenced object 0xcd34f2c0 (size 96):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.270s)
      hex dump (first 32 bytes):
        00 00 00 00 fc b8 50 c0 88 b6 50 c0 e0 b6 50 c0  ......P...P...P.
        00 00 00 00 00 00 00 00 c0 f2 34 cd 10 00 00 00  ..........4.....
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c050b968>] skcipher_geniv_init+0x2c/0x54
        [<c050cd68>] eseqiv_init+0x50/0x54
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
        [<c0408544>] do_vfs_ioctl+0x90/0x574
        [<c0408a70>] sys_ioctl+0x48/0x6c
        [<c02fc740>] ret_fast_syscall+0x0/0x30
    unreferenced object 0xcd152000 (size 8192):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.270s)
      hex dump (first 32 bytes):
        00 00 00 00 24 7e 50 c0 d0 7d 50 c0 7c 7d 50 c0  ....$~P..}P.|}P.
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c0511dc0>] crypto_cbc_init_tfm+0x2c/0x44
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c050b968>] skcipher_geniv_init+0x2c/0x54
        [<c050cd68>] eseqiv_init+0x50/0x54
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
    unreferenced object 0xcd34fa40 (size 96):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.290s)
      hex dump (first 32 bytes):
        00 00 00 00 fc b8 50 c0 88 b6 50 c0 e0 b6 50 c0  ......P...P...P.
        d0 d1 50 c0 04 a9 50 c0 60 f8 34 cd 10 00 00 00  ..P...P.`.4.....
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
        [<c0408544>] do_vfs_ioctl+0x90/0x574
        [<c0408a70>] sys_ioctl+0x48/0x6c
        [<c02fc740>] ret_fast_syscall+0x0/0x30
        [<ffffffff>] 0xffffffff
    unreferenced object 0xcd34f860 (size 96):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.290s)
      hex dump (first 32 bytes):
        00 00 00 00 fc b8 50 c0 88 b6 50 c0 e0 b6 50 c0  ......P...P...P.
        00 00 00 00 00 00 00 00 60 f8 34 cd 10 00 00 00  ........`.4.....
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c050b968>] skcipher_geniv_init+0x2c/0x54
        [<c050cd68>] eseqiv_init+0x50/0x54
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
        [<c0408544>] do_vfs_ioctl+0x90/0x574
        [<c0408a70>] sys_ioctl+0x48/0x6c
        [<c02fc740>] ret_fast_syscall+0x0/0x30
    unreferenced object 0xcd154000 (size 8192):
      comm "vold", pid 1878, jiffies 4294946316 (age 449.290s)
      hex dump (first 32 bytes):
        00 00 00 00 24 7e 50 c0 d0 7d 50 c0 7c 7d 50 c0  ....$~P..}P.|}P.
        00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c0507988>] __crypto_alloc_tfm+0x4c/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c0511dc0>] crypto_cbc_init_tfm+0x2c/0x44
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c05086b8>] crypto_spawn_tfm+0x78/0xcc
        [<c050b968>] skcipher_geniv_init+0x2c/0x54
        [<c050cd68>] eseqiv_init+0x50/0x54
        [<c05079dc>] __crypto_alloc_tfm+0xa0/0x140
        [<c050aee0>] crypto_alloc_ablkcipher+0x68/0xa8
        [<c06b8284>] crypt_ctr+0x294/0x8a0
        [<c06b08dc>] dm_table_add_target+0x10c/0x234
        [<c06b3fd0>] table_load+0x114/0x2c4
        [<c06b37a8>] dm_ctl_ioctl+0x1d0/0x2cc
    unreferenced object 0xe4598e00 (size 512):
      comm "kworker/0:1", pid 47, jiffies 4294946318 (age 449.280s)
      hex dump (first 32 bytes):
        5a 5a 5a 5a 5a 5a 5a 5a f8 6f 6b c0 e0 8e 59 e4  ZZZZZZZZ.ok...Y.
        c0 f2 34 cd 00 06 00 00 00 02 00 00 10 8f 59 e4  ..4...........Y.
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c03c0f10>] mempool_kmalloc+0x24/0x28
        [<c03c1088>] mempool_alloc+0x50/0x120
        [<c06b74f8>] crypt_convert+0x3f0/0x400
        [<c06b7870>] kcryptd_crypt+0x368/0x4c0
        [<c0352f84>] process_one_work+0x13c/0x4b0
        [<c035348c>] worker_thread+0x194/0x3e0
        [<c0357e70>] kthread+0x94/0x9c
        [<c02fd288>] kernel_thread_exit+0x0/0x8
        [<ffffffff>] 0xffffffff
    unreferenced object 0xcd2f0600 (size 512):
      comm "kworker/1:0", pid 9, jiffies 4294946418 (age 448.300s)
      hex dump (first 32 bytes):
        5a 5a 5a 5a 5a 5a 5a 5a f8 6f 6b c0 e0 06 2f cd  ZZZZZZZZ.ok.../.
        60 f8 34 cd 00 06 00 00 00 02 00 00 10 07 2f cd  `.4.........../.
      backtrace:
        [<c03f4a00>] create_object+0x10c/0x24c
        [<c08e99c4>] kmemleak_alloc+0x6c/0xd0
        [<c03f1a54>] __kmalloc+0x178/0x27c
        [<c03c0f10>] mempool_kmalloc+0x24/0x28
        [<c03c1088>] mempool_alloc+0x50/0x120
        [<c06b74f8>] crypt_convert+0x3f0/0x400
        [<c06b7870>] kcryptd_crypt+0x368/0x4c0
        [<c0352f84>] process_one_work+0x13c/0x4b0
        [<c035348c>] worker_thread+0x194/0x3e0
        [<c0357e70>] kthread+0x94/0x9c
        [<c02fd288>] kernel_thread_exit+0x0/0x8
        [<ffffffff>] 0xffffffff
    There are 10 entries. Is it possible that manufacturer (in this case Samsung) made so many bugs?

    Greetings.

  2. #2
    Trusted Penguin
    Join Date
    May 2011
    Posts
    4,353
    hi,

    have you tried recompiling the kernel w/o making any tweaks? if you don't get any of those leaks then you know your tweaks are related, if you still get the leaks then maybe it is in your tool-chain compiler or something like that?

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •