lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5d7376e2-d936-38ed-3419-262fc64f6a40@molgen.mpg.de>
Date:   Thu, 7 Jun 2018 17:54:26 +0200
From:   Paul Menzel <pmenzel+linux-netdev@...gen.mpg.de>
To:     "David S. Miller" <davem@...emloft.net>,
        Alexey Kuznetsov <kuznet@....inr.ac.ru>,
        Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>
Cc:     netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: kmemleak reports unreferenced object 0xf2bee080 (size 96)

Dear Linux folks,


With Linux 4.17+, Linux reports the memory leak below on an ASRock E350M1.

```
$ git describe
v4.17-6625-g1c8c5a9d38f6
$ dmesg
[…]
[  677.139874] PM: suspend exit
[  678.490993] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
[  679.517022] r8169 0000:03:00.0 enp3s0: link up
[…]
$ sudo more /sys/kernel/debug/kmemleak
unreferenced object 0xf2bee080 (size 96):
  comm "systemd-network", pid 209, jiffies 4294894477 (age 851.812s)
  hex dump (first 32 bytes):
    00 00 00 00 dc 05 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<fb9b1020>] kmem_cache_alloc_trace+0x195/0x3a0
    [<bbe5d9f4>] ip6_convert_metrics+0x4a/0xe0
    [<4d869f67>] ip6_route_info_create+0x294/0xd10
    [<2f08c8d0>] ip6_route_add+0x1d/0x90
    [<304de076>] inet6_rtm_newroute+0x72/0x80
    [<f9e280dd>] rtnetlink_rcv_msg+0x2df/0x4f0
    [<9287c3cf>] netlink_rcv_skb+0x8f/0x130
    [<fbddd35b>] rtnetlink_rcv+0x12/0x20
    [<60ffd06b>] netlink_unicast+0x1ab/0x2b0
    [<4260e680>] netlink_sendmsg+0x2b5/0x5c0
    [<ec0cda7b>] sock_sendmsg+0x5a/0xa0
    [<08adf1a5>] __sys_sendto+0xea/0x170
    [<93e4f4e1>] sys_socketcall+0x1f4/0x380
    [<dcd25cae>] do_fast_syscall_32+0xd3/0x360
    [<0ce0c28f>] entry_SYSENTER_32+0x4e/0x7c
    [<2324e043>] 0xffffffff
```

Please find the Linux messages attached.


Kind regards,

Paul

View attachment "20180607–linux_4.17+–dmesg.txt" of type "text/plain" (94779 bytes)

Download attachment "smime.p7s" of type "application/pkcs7-signature" (5174 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ