[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5d7376e2-d936-38ed-3419-262fc64f6a40@molgen.mpg.de>
Date: Thu, 7 Jun 2018 17:54:26 +0200
From: Paul Menzel <pmenzel+linux-netdev@...gen.mpg.de>
To: "David S. Miller" <davem@...emloft.net>,
Alexey Kuznetsov <kuznet@....inr.ac.ru>,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: kmemleak reports unreferenced object 0xf2bee080 (size 96)
Dear Linux folks,
With Linux 4.17+, Linux reports the memory leak below on an ASRock E350M1.
```
$ git describe
v4.17-6625-g1c8c5a9d38f6
$ dmesg
[…]
[ 677.139874] PM: suspend exit
[ 678.490993] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[ 679.517022] r8169 0000:03:00.0 enp3s0: link up
[…]
$ sudo more /sys/kernel/debug/kmemleak
unreferenced object 0xf2bee080 (size 96):
comm "systemd-network", pid 209, jiffies 4294894477 (age 851.812s)
hex dump (first 32 bytes):
00 00 00 00 dc 05 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<fb9b1020>] kmem_cache_alloc_trace+0x195/0x3a0
[<bbe5d9f4>] ip6_convert_metrics+0x4a/0xe0
[<4d869f67>] ip6_route_info_create+0x294/0xd10
[<2f08c8d0>] ip6_route_add+0x1d/0x90
[<304de076>] inet6_rtm_newroute+0x72/0x80
[<f9e280dd>] rtnetlink_rcv_msg+0x2df/0x4f0
[<9287c3cf>] netlink_rcv_skb+0x8f/0x130
[<fbddd35b>] rtnetlink_rcv+0x12/0x20
[<60ffd06b>] netlink_unicast+0x1ab/0x2b0
[<4260e680>] netlink_sendmsg+0x2b5/0x5c0
[<ec0cda7b>] sock_sendmsg+0x5a/0xa0
[<08adf1a5>] __sys_sendto+0xea/0x170
[<93e4f4e1>] sys_socketcall+0x1f4/0x380
[<dcd25cae>] do_fast_syscall_32+0xd3/0x360
[<0ce0c28f>] entry_SYSENTER_32+0x4e/0x7c
[<2324e043>] 0xffffffff
```
Please find the Linux messages attached.
Kind regards,
Paul
View attachment "20180607–linux_4.17+–dmesg.txt" of type "text/plain" (94779 bytes)
Download attachment "smime.p7s" of type "application/pkcs7-signature" (5174 bytes)
Powered by blists - more mailing lists