lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHj4cs-CWX0nFzq=ZnhE_Cj_ZSw8-3c+aUXeexpCs=9pEa2rGA@mail.gmail.com>
Date: Fri, 13 Jun 2025 09:17:47 +0800
From: Yi Zhang <yi.zhang@...hat.com>
To: netdev@...r.kernel.org
Subject: [bug report] tg3: kmemleak observed after system boots up

Hi

I found the kmemleak issue after the system boots up with kernel
6.16.0-rc1. Please help check it and let me know if you need any
info/test for it, thanks.

# dmesg | grep "suspected memory"
[ 1489.395283] kmemleak: 2 new suspected memory leaks (see
/sys/kernel/debug/kmemleak)

# cat /sys/kernel/debug/kmemleak
unreferenced object 0xffff8881703d4500 (size 232):
  comm "softirq", pid 0, jiffies 4294869720
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 c0 ed 09 82 88 ff ff 00 00 00 00 00 00 00 00  ................
  backtrace (crc 549bb074):
    kmem_cache_alloc_node_noprof+0x3e9/0x4b0
    __alloc_skb+0x205/0x2d0
    __netdev_alloc_skb+0x3f/0x720
    tg3_rx+0x5bc/0x1990 [tg3]
    tg3_poll_work+0x1e3/0x570 [tg3]
    tg3_poll_msix+0xb1/0x7d0 [tg3]
    __napi_poll.constprop.0+0xa3/0x440
    net_rx_action+0x8b7/0xd50
    handle_softirqs+0x1fc/0x920
    __irq_exit_rcu+0x11b/0x270
    irq_exit_rcu+0xa/0x30
    common_interrupt+0xb8/0xd0
    asm_common_interrupt+0x22/0x40
unreferenced object 0xffff88820bca9a00 (size 704):
  comm "softirq", pid 0, jiffies 4294869720
  hex dump (first 32 bytes):
    40 75 3d 70 81 88 ff ff df 02 00 00 88 02 12 00  @u=p............
    53 59 53 54 4d 3a 30 30 2f 4c 4e 58 53 59 42 55  SYSTM:00/LNXSYBU
  backtrace (crc 8f8d581b):
    kmem_cache_alloc_node_noprof+0x3e9/0x4b0
    kmalloc_reserve+0x143/0x240
    __alloc_skb+0x10c/0x2d0
    __netdev_alloc_skb+0x3f/0x720
    tg3_rx+0x5bc/0x1990 [tg3]
    tg3_poll_work+0x1e3/0x570 [tg3]
    tg3_poll_msix+0xb1/0x7d0 [tg3]
    __napi_poll.constprop.0+0xa3/0x440
    net_rx_action+0x8b7/0xd50
    handle_softirqs+0x1fc/0x920
    __irq_exit_rcu+0x11b/0x270
    irq_exit_rcu+0xa/0x30
    common_interrupt+0xb8/0xd0
    asm_common_interrupt+0x22/0x40


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ