Bug 1464311

Summary: kmemleak for mdadm
Product: Red Hat Enterprise Linux 7 Reporter: Zhang Yi <yizhan>
Component: mdadmAssignee: Kernel Drivers <hwkernel-mgr>
Status: CLOSED NOTABUG QA Contact: guazhang <guazhang>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.4CC: dledford, xni, yizhan
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-06-23 05:18:28 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
output for /sys/kernel/debug/kmemleak none

Description Zhang Yi 2017-06-23 04:12:15 UTC
Created attachment 1290880 [details]
output for /sys/kernel/debug/kmemleak

Description of problem:
mdadm kmemleak

Version-Release number of selected component (if applicable):
mdadm-4.0-5.el7.ppc64
3.10.0-686.el7.ppc64.debug

How reproducible:


Steps to Reproduce:
run mdadm grow-add-disk case

here is the beaker job:
https://beaker.engineering.redhat.com/jobs/1919619

Actual results:


Expected results:


Additional info:

unreferenced object 0xc0000003df1b0d40 (size 64):
  comm "mdadm", pid 30429, jiffies 4295287850 (age 1492.800s)
  hex dump (first 32 bytes):
    c0 00 00 03 df 1b 0d 40 c0 00 00 03 df 1b 0d 40  .......@.......@
    c0 00 00 00 01 ad 2c 00 00 00 00 00 00 00 00 00  ......,.........
  backtrace:
    [<c0000000006bdedc>] .devres_alloc_node+0x2c/0x70
    [<c00000000002a578>] .arch_dma_init+0x58/0x70
    [<c0000000006b2d54>] .device_add+0x184/0xaa0
    [<c0000000005391d4>] .add_disk+0x244/0x630
    [<c000000000814bd8>] .md_probe+0x218/0x360
    [<c0000000006bdc5c>] .kobj_lookup+0x13c/0x1f0
    [<c00000000053822c>] .get_gendisk+0x4c/0x210
    [<c0000000003ed9b0>] .blkdev_get+0x80/0x440
    [<c000000000373ae4>] .vfs_open+0x2b4/0x480
    [<c00000000039151c>] .do_last+0x48c/0x11b0
    [<c000000000396284>] .path_openat+0x274/0xd30
    [<c000000000398130>] .do_filp_open+0x40/0xb0
    [<c000000000376078>] .SyS_open+0x128/0x270
    [<c00000000000a190>] system_call+0x38/0xb4