All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
From: Selvin Xavier <selvin.xavier@broadcom.com>
To: Yi Zhang <yi.zhang@redhat.com>
Cc: RDMA mailing list <linux-rdma@vger.kernel.org>
Subject: Re: [bug report] kmemleak observed on bnxt_re
Date: Tue, 26 Mar 2024 14:10:25 +0530	[thread overview]
Message-ID: <CA+sbYW0sNPtPFUTDHTA6qJL_D1M_zB0VE6ePjoV8Swc=u6gAPQ@mail.gmail.com> (raw)
In-Reply-To: <CAHj4cs-8vJNVA48BHKQ=cvNB7=aO2_XE2zp_0Fus44ea8wL2Ew@mail.gmail.com>

[-- Attachment #1: Type: text/plain, Size: 9015 bytes --]

Thanks Yi Zhang for reporting. We will analyze it and get back.

Thanks,
Selvin Xavier

On Tue, Mar 26, 2024 at 12:21 PM Yi Zhang <yi.zhang@redhat.com> wrote:
>
> Hello
>
> I found this kmemleak issue after system boots up with the latest
> linux tree, please help check it and let me know if you need any info,
> thanks.
>
> (gdb) l *(bnxt_re_alloc_pd+0x3d0)
> 0x22160 is in bnxt_re_alloc_pd (drivers/infiniband/hw/bnxt_re/ib_verbs.c:678).
> 673 goto dbfail;
> 674 }
> 675 }
> 676
> 677 if (!udata)
> 678 if (bnxt_re_create_fence_mr(pd))
> 679 ibdev_warn(&rdev->ibdev,
> 680    "Failed to create Fence-MR\n");
> 681 active_pds = atomic_inc_return(&rdev->stats.res.pd_count);
> 682 if (active_pds > rdev->stats.res.pd_watermark)
>
>
> unreferenced object 0xffffc90006a41000 (size 4096):
>   comm "systemd-udevd", pid 1233, jiffies 4294779228
>   hex dump (first 32 bytes):
>     00 e0 43 80 81 88 ff ff 2a 3e 03 00 00 00 00 00  ..C.....*>......
>     ea 7b 06 00 00 00 00 00 0a 00 00 00 30 00 00 00  .{..........0...
>   backtrace (crc cd29ebd4):
>     [<ffffffff8a9bf425>] kmemleak_vmalloc+0x95/0x160
>     [<ffffffff88cf35bc>] __vmalloc_node_range+0x3fc/0x540
>     [<ffffffff88cf37c4>] __vmalloc_node+0xb4/0x150
>     [<ffffffffc2152f89>] __alloc_pbl+0x199/0x960 [bnxt_re]
>     [<ffffffffc2154cc9>] bnxt_qplib_alloc_init_hwq+0xec9/0x1c20 [bnxt_re]
>     [<ffffffffc2163d65>] bnxt_qplib_reg_mr+0x245/0x630 [bnxt_re]
>     [<ffffffffc2150509>] bnxt_re_create_fence_mr+0x419/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
> unreferenced object 0xffffc90006a71000 (size 4096):
>   comm "systemd-udevd", pid 1233, jiffies 4294779229
>   hex dump (first 32 bytes):
>     00 e0 43 80 01 00 00 00 00 00 00 00 00 00 00 00  ..C.............
>     01 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00  ..>.............
>   backtrace (crc f97dda8f):
>     [<ffffffff8a9bf425>] kmemleak_vmalloc+0x95/0x160
>     [<ffffffff88cf35bc>] __vmalloc_node_range+0x3fc/0x540
>     [<ffffffff88cf37c4>] __vmalloc_node+0xb4/0x150
>     [<ffffffffc2152fc7>] __alloc_pbl+0x1d7/0x960 [bnxt_re]
>     [<ffffffffc2154cc9>] bnxt_qplib_alloc_init_hwq+0xec9/0x1c20 [bnxt_re]
>     [<ffffffffc2163d65>] bnxt_qplib_reg_mr+0x245/0x630 [bnxt_re]
>     [<ffffffffc2150509>] bnxt_re_create_fence_mr+0x419/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
> unreferenced object 0xffff8882b5c5bc00 (size 512):
>   comm "systemd-udevd", pid 1233, jiffies 4294779229
>   hex dump (first 32 bytes):
>     00 00 c0 43 82 88 ff ff 00 00 00 00 00 00 00 00  ...C............
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace (crc 754e43ab):
>     [<ffffffff88d24b7d>] kmalloc_trace+0x30d/0x3b0
>     [<ffffffffc214f923>] bnxt_re_alloc_mw+0x73/0x280 [bnxt_re]
>     [<ffffffffc215058b>] bnxt_re_create_fence_mr+0x49b/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
>     [<ffffffff89b075e0>] auxiliary_bus_probe+0xa0/0x110
>     [<ffffffff89ae7630>] really_probe+0x1e0/0x920
>     [<ffffffff89ae7f0a>] __driver_probe_device+0x18a/0x3d0
>     [<ffffffff89ae81a9>] driver_probe_device+0x49/0x120
> unreferenced object 0xffffc90006d4e000 (size 4096):
>   comm "systemd-udevd", pid 1233, jiffies 4294822916
>   hex dump (first 32 bytes):
>     00 c0 44 b8 82 88 ff ff 00 00 00 00 00 00 00 00  ..D.............
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace (crc 48b8bc5a):
>     [<ffffffff8a9bf425>] kmemleak_vmalloc+0x95/0x160
>     [<ffffffff88cf35bc>] __vmalloc_node_range+0x3fc/0x540
>     [<ffffffff88cf37c4>] __vmalloc_node+0xb4/0x150
>     [<ffffffffc2152f89>] __alloc_pbl+0x199/0x960 [bnxt_re]
>     [<ffffffffc2154cc9>] bnxt_qplib_alloc_init_hwq+0xec9/0x1c20 [bnxt_re]
>     [<ffffffffc2163d65>] bnxt_qplib_reg_mr+0x245/0x630 [bnxt_re]
>     [<ffffffffc2150509>] bnxt_re_create_fence_mr+0x419/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
> unreferenced object 0xffffc90006d59000 (size 4096):
>   comm "systemd-udevd", pid 1233, jiffies 4294822916
>   hex dump (first 32 bytes):
>     00 c0 44 b8 02 00 00 00 00 00 00 00 00 00 00 00  ..D.............
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace (crc 1bc211ce):
>     [<ffffffff8a9bf425>] kmemleak_vmalloc+0x95/0x160
>     [<ffffffff88cf35bc>] __vmalloc_node_range+0x3fc/0x540
>     [<ffffffff88cf37c4>] __vmalloc_node+0xb4/0x150
>     [<ffffffffc2152fc7>] __alloc_pbl+0x1d7/0x960 [bnxt_re]
>     [<ffffffffc2154cc9>] bnxt_qplib_alloc_init_hwq+0xec9/0x1c20 [bnxt_re]
>     [<ffffffffc2163d65>] bnxt_qplib_reg_mr+0x245/0x630 [bnxt_re]
>     [<ffffffffc2150509>] bnxt_re_create_fence_mr+0x419/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
> unreferenced object 0xffff888295670400 (size 512):
>   comm "systemd-udevd", pid 1233, jiffies 4294822916
>   hex dump (first 32 bytes):
>     00 00 c0 33 81 88 ff ff 00 00 00 00 00 00 00 00  ...3............
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace (crc 5378fcd7):
>     [<ffffffff88d24b7d>] kmalloc_trace+0x30d/0x3b0
>     [<ffffffffc214f923>] bnxt_re_alloc_mw+0x73/0x280 [bnxt_re]
>     [<ffffffffc215058b>] bnxt_re_create_fence_mr+0x49b/0xc90 [bnxt_re]
>     [<ffffffffc2151160>] bnxt_re_alloc_pd+0x3d0/0x540 [bnxt_re]
>     [<ffffffffc1ec133c>] __ib_alloc_pd+0xfc/0x5b0 [ib_core]
>     [<ffffffffc1f131a5>] ib_mad_port_open+0x685/0xfb0 [ib_core]
>     [<ffffffffc1f13bd1>] ib_mad_init_device+0xf1/0x370 [ib_core]
>     [<ffffffffc1edce6d>] add_client_context+0x2ed/0x440 [ib_core]
>     [<ffffffffc1edd17a>] enable_device_and_get+0x1aa/0x340 [ib_core]
>     [<ffffffffc1ede5c8>] ib_register_device+0x1c8/0x3a0 [ib_core]
>     [<ffffffffc2134f61>] bnxt_re_ib_init+0x401/0x6a0 [bnxt_re]
>     [<ffffffffc2137dbc>] bnxt_re_probe+0x4bc/0x710 [bnxt_re]
>     [<ffffffff89b075e0>] auxiliary_bus_probe+0xa0/0x110
>     [<ffffffff89ae7630>] really_probe+0x1e0/0x920
>     [<ffffffff89ae7f0a>] __driver_probe_device+0x18a/0x3d0
>     [<ffffffff89ae81a9>] driver_probe_device+0x49/0x120
>
> --
> Best Regards,
>   Yi Zhang
>

[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 4224 bytes --]

  reply	other threads:[~2024-03-26  8:40 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-03-26  6:50 [bug report] kmemleak observed on bnxt_re Yi Zhang
2024-03-26  8:40 ` Selvin Xavier [this message]
2024-03-29  3:27 ` Kalesh Anakkur Purayil

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CA+sbYW0sNPtPFUTDHTA6qJL_D1M_zB0VE6ePjoV8Swc=u6gAPQ@mail.gmail.com' \
    --to=selvin.xavier@broadcom.com \
    --cc=linux-rdma@vger.kernel.org \
    --cc=yi.zhang@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.