Tool/software: Linux
I am using the TI AM57xx Sitara board. But after running the kmemleak, I am getting the following memory leaks in the kernel. The Linux kernel version is 4.9.28 and TI SDK is ti-processor-sdk-linux-am57xx-evm-04.00.00.04 . What is the reason for this leaks and how to remove them?
root@am57xx-evm:~# cat /sys/kernel/debug/kmemleak unreferenced object 0xedc16e00 (size 64): comm "swapper/0", pid 1, jiffies 4294937364 (age 455.870s) hex dump (first 32 bytes): 44 18 05 c1 00 00 00 00 01 00 00 00 01 00 00 00 D............... 00 00 00 00 44 18 05 c1 cc d3 01 c1 cc d3 01 c1 ....D........... backtrace: [<c031d590>] __kmalloc+0x194/0x210 [<c0391438>] __register_sysctl_table+0x58/0x630 [<c0391a30>] register_sysctl+0x20/0x24 [<c0e132a4>] user_namespace_sysctl_init+0x1c/0x48 [<c02017bc>] do_one_initcall+0x4c/0x178 [<c0e00f68>] kernel_init_freeable+0x1d8/0x268 [<c08c6550>] kernel_init+0x10/0x110 [<c0207c88>] ret_from_fork+0x14/0x2c [<ffffffff>] 0xffffffff unreferenced object 0xd5650000 (size 1024): comm "kworker/0:0", pid 4, jiffies 4294938272 (age 446.860s) hex dump (first 32 bytes): 01 00 00 52 01 00 00 52 01 00 00 52 01 00 00 52 ...R...R...R...R 01 00 00 52 01 00 00 52 01 00 00 52 01 00 00 52 ...R...R...R...R backtrace: [<c031d9c4>] kmem_cache_alloc+0x174/0x1d8 [<c05b8214>] iopte_alloc+0x5c/0xc8 [<c05b888c>] iopte_alloc_large+0x34/0xb4 [<c05b8160>] omap_iommu_map+0x1a0/0x1f8 [<c05b559c>] iommu_map+0x10c/0x180 [<bf0354b8>] rproc_handle_devmem+0x7c/0x12c [remoteproc] [<bf035890>] rproc_handle_resources+0x64/0xe8 [remoteproc] [<bf036cac>] __rproc_boot+0x1c4/0x5bc [remoteproc] [<bf0370d0>] rproc_auto_boot_callback+0x18/0x24 [remoteproc] [<c0637a90>] request_firmware_work_func+0x44/0x6c [<c024483c>] process_one_work+0x1dc/0x3f8 [<c0245494>] worker_thread+0x58/0x574 [<c024a7cc>] kthread+0x100/0x118 [<c0207c88>] ret_from_fork+0x14/0x2c [<ffffffff>] 0xffffffff unreferenced object 0xd5650800 (size 1024): comm "kworker/0:0", pid 4, jiffies 4294938272 (age 446.860s) hex dump (first 32 bytes): 01 00 00 52 01 00 00 52 01 00 00 52 01 00 00 52 ...R...R...R...R 01 00 00 52 01 00 00 52 01 00 00 52 01 00 00 52 ...R...R...R...R backtrace: [<c031d9c4>] kmem_cache_alloc+0x174/0x1d8 [<c05b8214>] iopte_alloc+0x5c/0xc8 [<c05b888c>] iopte_alloc_large+0x34/0xb4 [<c05b8160>] omap_iommu_map+0x1a0/0x1f8 [<c05b559c>] iommu_map+0x10c/0x180 [<bf0354b8>] rproc_handle_devmem+0x7c/0x12c [remoteproc] [<bf035890>] rproc_handle_resources+0x64/0xe8 [remoteproc] [<bf036cac>] __rproc_boot+0x1c4/0x5bc [remoteproc] [<bf0370d0>] rproc_auto_boot_callback+0x18/0x24 [remoteproc] [<c0637a90>] request_firmware_work_func+0x44/0x6c [<c024483c>] process_one_work+0x1dc/0x3f8 [<c0245494>] worker_thread+0x58/0x574 [<c024a7cc>] kthread+0x100/0x118 [<c0207c88>] ret_from_fork+0x14/0x2c [<ffffffff>] 0xffffffff unreferenced object 0xd5651000 (size 1024): comm "kworker/0:0", pid 4, jiffies 4294938272 (age 446.860s) hex dump (first 32 bytes): 01 00 30 40 01 00 30 40 01 00 30 40 01 00 30 40 ..0@..0@..0@..0@ 01 00 30 40 01 00 30 40 01 00 30 40 01 00 30 40 ..0@..0@..0@..0@ backtrace: [<c031d9c4>] kmem_cache_alloc+0x174/0x1d8 [<c05b8214>] iopte_alloc+0x5c/0xc8 [<c05b888c>] iopte_alloc_large+0x34/0xb4