root@raspberrypi-rdk-mc:~# cat /sys/kernel/debug/kmemleak unreferenced object 0x8a1529c0 (size 184): comm "testapp", pid 14318, jiffies 85759 (age 5131.620s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 10 a9 0a 83 60 26 b7 89 ............`&.. f0 e9 b1 89 c0 58 b1 80 00 00 00 00 00 00 00 00 .....X.......... backtrace: [<88ecddc0>] kmem_cache_alloc+0x270/0x5b4 [] __alloc_file+0x30/0xf0 [<960f7f4b>] alloc_empty_file+0x68/0x130 [] path_openat+0x58/0xfe0 [<0f3b9822>] do_filp_open+0x88/0xfc [<56eb39f2>] file_open_name+0x114/0x210 [<774fc8d3>] filp_open+0x38/0x50 [<5e006868>] fscrypt_ioctl_read_data+0x130/0x324 [] __ext4_ioctl+0x21c/0x1d08 [<52ba9d41>] ext4_ioctl+0x38/0x4c [<219f3377>] sys_ioctl+0x11c/0x930 [] __sys_trace_return+0x0/0x1c [] 0x7ebca9b4 unreferenced object 0x8b133490 (size 12): comm "testapp", pid 14318, jiffies 85759 (age 5131.620s) hex dump (first 12 bytes): 00 00 00 00 94 07 81 81 00 00 00 00 ............ backtrace: [<88ecddc0>] kmem_cache_alloc+0x270/0x5b4 [<5d357835>] security_file_alloc+0x3c/0x9c [<473f7a12>] __alloc_file+0x6c/0xf0 [<960f7f4b>] alloc_empty_file+0x68/0x130 [] path_openat+0x58/0xfe0 [<0f3b9822>] do_filp_open+0x88/0xfc [<56eb39f2>] file_open_name+0x114/0x210 [<774fc8d3>] filp_open+0x38/0x50 [<5e006868>] fscrypt_ioctl_read_data+0x130/0x324 [] __ext4_ioctl+0x21c/0x1d08 [<52ba9d41>] ext4_ioctl+0x38/0x4c [<219f3377>] sys_ioctl+0x11c/0x930 [] __sys_trace_return+0x0/0x1c [] 0x7ebca9b4 unreferenced object 0x8b1b3c00 (size 184): comm "testapp", pid 14318, jiffies 235929 (age 3629.940s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 10 a9 0a 83 70 67 91 89 ............pg.. 78 e0 8e 89 c0 58 b1 80 00 00 00 00 00 00 00 00 x....X.......... backtrace: [<88ecddc0>] kmem_cache_alloc+0x270/0x5b4 [] __alloc_file+0x30/0xf0 [<960f7f4b>] alloc_empty_file+0x68/0x130 [] path_openat+0x58/0xfe0 [<0f3b9822>] do_filp_open+0x88/0xfc [<56eb39f2>] file_open_name+0x114/0x210 [<774fc8d3>] filp_open+0x38/0x50 [] fscrypt_ioctl_write_data+0x198/0x2e8 [<63f43525>] __ext4_ioctl+0x12c0/0x1d08 [<52ba9d41>] ext4_ioctl+0x38/0x4c [<219f3377>] sys_ioctl+0x11c/0x930 [] __sys_trace_return+0x0/0x1c [] 0x7ebca9b4 unreferenced object 0x8c5e68c0 (size 12): comm "testapp", pid 14318, jiffies 235929 (age 3629.940s) hex dump (first 12 bytes): 00 00 00 00 94 07 81 81 00 00 00 00 ............ backtrace: [<88ecddc0>] kmem_cache_alloc+0x270/0x5b4 [<5d357835>] security_file_alloc+0x3c/0x9c [<473f7a12>] __alloc_file+0x6c/0xf0 [<960f7f4b>] alloc_empty_file+0x68/0x130 [] path_openat+0x58/0xfe0 [<0f3b9822>] do_filp_open+0x88/0xfc [<56eb39f2>] file_open_name+0x114/0x210 [<774fc8d3>] filp_open+0x38/0x50 [] fscrypt_ioctl_write_data+0x198/0x2e8 [<63f43525>] __ext4_ioctl+0x12c0/0x1d08 [<52ba9d41>] ext4_ioctl+0x38/0x4c [<219f3377>] sys_ioctl+0x11c/0x930 [] __sys_trace_return+0x0/0x1c [] 0x7ebca9b4 unreferenced object 0x83a47b40 (size 184): comm "testapp", pid 14318, jiffies 243155 (age 3557.680s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 10 a9 0a 83 20 22 b8 89 ............ ".. 88 0d b4 89 c0 58 b1 80 00 00 00 00 00 00 00 00 .....X.......... backtrace: [<88ecddc0>] kmem_cache_alloc+0x270/0x5b4 [] __alloc_file+0x30/0xf0 [<960f7f4b>] alloc_empty_file+0x68/0x130 [] path_openat+0x58/0xfe0 [<0f3b9822>] do_filp_open+0x88/0xfc [<56eb39f2>] file_open_name+0x114/0x210 [<774fc8d3>] filp_open+0x38/0x50 [<5e006868>] fscrypt_ioctl_read_data+0x130/0x324 [] __ext4_ioctl+0x21c/0x1d08 [<52ba9d41>] ext4_ioctl+0x38/0x4c [<219f3377>] sys_ioctl+0x11c/0x930 [] __sys_trace_return+0x0/0x1c [] 0x7ebca9b4