[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHj4cs-CWX0nFzq=ZnhE_Cj_ZSw8-3c+aUXeexpCs=9pEa2rGA@mail.gmail.com>
Date: Fri, 13 Jun 2025 09:17:47 +0800
From: Yi Zhang <yi.zhang@...hat.com>
To: netdev@...r.kernel.org
Subject: [bug report] tg3: kmemleak observed after system boots up
Hi
I found the kmemleak issue after the system boots up with kernel
6.16.0-rc1. Please help check it and let me know if you need any
info/test for it, thanks.
# dmesg | grep "suspected memory"
[ 1489.395283] kmemleak: 2 new suspected memory leaks (see
/sys/kernel/debug/kmemleak)
# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff8881703d4500 (size 232):
comm "softirq", pid 0, jiffies 4294869720
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 c0 ed 09 82 88 ff ff 00 00 00 00 00 00 00 00 ................
backtrace (crc 549bb074):
kmem_cache_alloc_node_noprof+0x3e9/0x4b0
__alloc_skb+0x205/0x2d0
__netdev_alloc_skb+0x3f/0x720
tg3_rx+0x5bc/0x1990 [tg3]
tg3_poll_work+0x1e3/0x570 [tg3]
tg3_poll_msix+0xb1/0x7d0 [tg3]
__napi_poll.constprop.0+0xa3/0x440
net_rx_action+0x8b7/0xd50
handle_softirqs+0x1fc/0x920
__irq_exit_rcu+0x11b/0x270
irq_exit_rcu+0xa/0x30
common_interrupt+0xb8/0xd0
asm_common_interrupt+0x22/0x40
unreferenced object 0xffff88820bca9a00 (size 704):
comm "softirq", pid 0, jiffies 4294869720
hex dump (first 32 bytes):
40 75 3d 70 81 88 ff ff df 02 00 00 88 02 12 00 @u=p............
53 59 53 54 4d 3a 30 30 2f 4c 4e 58 53 59 42 55 SYSTM:00/LNXSYBU
backtrace (crc 8f8d581b):
kmem_cache_alloc_node_noprof+0x3e9/0x4b0
kmalloc_reserve+0x143/0x240
__alloc_skb+0x10c/0x2d0
__netdev_alloc_skb+0x3f/0x720
tg3_rx+0x5bc/0x1990 [tg3]
tg3_poll_work+0x1e3/0x570 [tg3]
tg3_poll_msix+0xb1/0x7d0 [tg3]
__napi_poll.constprop.0+0xa3/0x440
net_rx_action+0x8b7/0xd50
handle_softirqs+0x1fc/0x920
__irq_exit_rcu+0x11b/0x270
irq_exit_rcu+0xa/0x30
common_interrupt+0xb8/0xd0
asm_common_interrupt+0x22/0x40
Powered by blists - more mailing lists