lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <bdd72f43-c28d-4bfa-69f1-b0693732f9f6@gmail.com>
Date:   Thu, 7 Jun 2018 08:58:47 -0700
From:   David Ahern <dsahern@...il.com>
To:     Paul Menzel <pmenzel+linux-netdev@...gen.mpg.de>,
        "David S. Miller" <davem@...emloft.net>,
        Alexey Kuznetsov <kuznet@....inr.ac.ru>,
        Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>
Cc:     netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: kmemleak reports unreferenced object 0xf2bee080 (size 96)

On 6/7/18 8:54 AM, Paul Menzel wrote:
> $ dmesg
> […]
> [  677.139874] PM: suspend exit
> [  678.490993] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
> [  679.517022] r8169 0000:03:00.0 enp3s0: link up
> […]
> $ sudo more /sys/kernel/debug/kmemleak
> unreferenced object 0xf2bee080 (size 96):
>   comm "systemd-network", pid 209, jiffies 4294894477 (age 851.812s)
>   hex dump (first 32 bytes):
>     00 00 00 00 dc 05 00 00 00 00 00 00 00 00 00 00  ................
>     00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
>   backtrace:
>     [<fb9b1020>] kmem_cache_alloc_trace+0x195/0x3a0
>     [<bbe5d9f4>] ip6_convert_metrics+0x4a/0xe0
>     [<4d869f67>] ip6_route_info_create+0x294/0xd10
>     [<2f08c8d0>] ip6_route_add+0x1d/0x90
>     [<304de076>] inet6_rtm_newroute+0x72/0x80
>     [<f9e280dd>] rtnetlink_rcv_msg+0x2df/0x4f0
>     [<9287c3cf>] netlink_rcv_skb+0x8f/0x130
>     [<fbddd35b>] rtnetlink_rcv+0x12/0x20
>     [<60ffd06b>] netlink_unicast+0x1ab/0x2b0
>     [<4260e680>] netlink_sendmsg+0x2b5/0x5c0
>     [<ec0cda7b>] sock_sendmsg+0x5a/0xa0
>     [<08adf1a5>] __sys_sendto+0xea/0x170
>     [<93e4f4e1>] sys_socketcall+0x1f4/0x380
>     [<dcd25cae>] do_fast_syscall_32+0xd3/0x360
>     [<0ce0c28f>] entry_SYSENTER_32+0x4e/0x7c
>     [<2324e043>] 0xffffffff
> ```
> 


I'll take a look. Thanks for the report.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ