Query regarding Kmemleak
Jeff Haran
jharan at bytemobile.com
Tue Jan 31 19:30:40 EST 2012
> -----Original Message-----
> From: kernelnewbies-bounces at kernelnewbies.org [mailto:kernelnewbies-
> bounces at kernelnewbies.org] On Behalf Of Smital Desai
> Sent: Tuesday, January 31, 2012 4:02 PM
> To: Kernel Newbies
> Subject: Query regarding Kmemleak
>
> Hello ,
>
> I am just trying to understand Kmemleak support.
>
> In a test program , allocating some memory using and vmalloc
() and
> freeing it in exit () routine.
> But when i run a kmemleak , It reports this as a leak.
>
> But isn't it a generic reuirement to allocate something for
the lifetime of
> the module and free when we remove the module. ? Can somebody
> explain ?
>
> I have provided the kmemleak output and my test program
below.
>
> Thanks,
> Smital Desai
>
>
> ==========================================================
> =======================
>
> cat /sys/kernel/debug/memleak
>
> unreferenced object 0xe1b18000 (size 512):
> comm "insmod", pid 1066, jiffies 4294953148 (age 54.630s)
> hex dump (first 32 bytes):
> 36 1c 00 00 02 16 00 00 3c 1c 00 00 02 16 00 00 6.......<.......
> 43 1c 00 00 02 16 00 00 4f 1c 00 00 02 16 00 00 C.......O.......
> backtrace:
> [<c0234ecc>] __vmalloc_node_range+0x1a8/0x1d0
> [<c0234f2c>] __vmalloc_node+0x38/0x44
> [<c023507c>] vmalloc+0x28/0x30
> [<bf00200c>] 0xbf00200c
> [<c0100458>] do_one_initcall+0x94/0x164
> [<c01d639c>] sys_init_module+0x70/0x190
> [<c0105d60>] ret_fast_syscall+0x0/0x30
> [<ffffffff>] 0xffffffff
> unreferenced object 0xe1b1a000 (size 512):
> comm "insmod", pid 1066, jiffies 4294953148 (age 54.630s)
> hex dump (first 32 bytes):
> 00 00 00 00 00 2c 00 00 00 00 00 00 2a 03 00 00 .....,......*...
> 00 00 00 00 00 2c 00 00 bc 00 00 00 02 2e 00 00 .....,..........
> backtrace:
> [<c0234ecc>] __vmalloc_node_range+0x1a8/0x1d0
> [<c0234f2c>] __vmalloc_node+0x38/0x44
> [<c023507c>] vmalloc+0x28/0x30
> [<bf00201c>] 0xbf00201c
> [<c0100458>] do_one_initcall+0x94/0x164
> [<c01d639c>] sys_init_module+0x70/0x190
> [<c0105d60>] ret_fast_syscall+0x0/0x30
> [<ffffffff>] 0xffffffff
> ==========================================================
> ===========================
>
>
>
> "test.c"
> ==========================================================
> ========================
> #include <linux/init.h>
> #include <linux/kernel.h>
> #include <linux/module.h>
> #include <linux/kmemleak.h>
>
> char *ptr1, *ptr2;
>
> /*
> * Some very simple testing. This function needs to be extended for
> * proper testing.
> */
> static int __init kmemleak_test_init(void)
> {
> ptr1 = vmalloc(512);
> ptr2 = vmalloc(512);
>
> return 0;
> }
> module_init(kmemleak_test_init);
>
> static void __exit kmemleak_test_exit(void)
> {
> vfree(ptr1);
> vfree(ptr2);
> }
> module_exit(kmemleak_test_exit);
>
> MODULE_LICENSE("GPL");
> ==========================================================
> ========================
>
>
>
> Thanks and Regard
> Smital Desai
>
> The contents of this e-mail and any attachment(s) may contain
confidential
> or privileged information for the intended recipient(s). Unintended
> recipients are prohibited from taking action on the basis of
information in this
> e-mail and using or disseminating the information, and must notify
the
> sender and delete it from their system. L&T Infotech will not accept
> responsibility or liability for the accuracy or completeness of, or
the presence
> of any virus or disabling code in this e-mail"
>
> _______________________________________________
> Kernelnewbies mailing list
> Kernelnewbies at kernelnewbies.org
> http://lists.kernelnewbies.org/mailman/listinfo/kernelnewbies
Just to be clear:
Did you rmmod your module before doing the cat on
/sys/kernel/debug/memleak?
If not, I think the above output of memleak is what would be expected.
Jeff Haran
More information about the Kernelnewbies
mailing list