[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <bdd72f43-c28d-4bfa-69f1-b0693732f9f6@gmail.com>
Date: Thu, 7 Jun 2018 08:58:47 -0700
From: David Ahern <dsahern@...il.com>
To: Paul Menzel <pmenzel+linux-netdev@...gen.mpg.de>,
"David S. Miller" <davem@...emloft.net>,
Alexey Kuznetsov <kuznet@....inr.ac.ru>,
Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: kmemleak reports unreferenced object 0xf2bee080 (size 96)
On 6/7/18 8:54 AM, Paul Menzel wrote:
> $ dmesg
> […]
> [ 677.139874] PM: suspend exit
> [ 678.490993] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
> [ 679.517022] r8169 0000:03:00.0 enp3s0: link up
> […]
> $ sudo more /sys/kernel/debug/kmemleak
> unreferenced object 0xf2bee080 (size 96):
> comm "systemd-network", pid 209, jiffies 4294894477 (age 851.812s)
> hex dump (first 32 bytes):
> 00 00 00 00 dc 05 00 00 00 00 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<fb9b1020>] kmem_cache_alloc_trace+0x195/0x3a0
> [<bbe5d9f4>] ip6_convert_metrics+0x4a/0xe0
> [<4d869f67>] ip6_route_info_create+0x294/0xd10
> [<2f08c8d0>] ip6_route_add+0x1d/0x90
> [<304de076>] inet6_rtm_newroute+0x72/0x80
> [<f9e280dd>] rtnetlink_rcv_msg+0x2df/0x4f0
> [<9287c3cf>] netlink_rcv_skb+0x8f/0x130
> [<fbddd35b>] rtnetlink_rcv+0x12/0x20
> [<60ffd06b>] netlink_unicast+0x1ab/0x2b0
> [<4260e680>] netlink_sendmsg+0x2b5/0x5c0
> [<ec0cda7b>] sock_sendmsg+0x5a/0xa0
> [<08adf1a5>] __sys_sendto+0xea/0x170
> [<93e4f4e1>] sys_socketcall+0x1f4/0x380
> [<dcd25cae>] do_fast_syscall_32+0xd3/0x360
> [<0ce0c28f>] entry_SYSENTER_32+0x4e/0x7c
> [<2324e043>] 0xffffffff
> ```
>
I'll take a look. Thanks for the report.
Powered by blists - more mailing lists