Re: kmemleak reports unreferenced object 0xf2bee080 (size 96)

From: David Ahern
Date: Thu Jun 07 2018 - 11:58:57 EST


On 6/7/18 8:54 AM, Paul Menzel wrote:
> $ dmesg
> [â]
> [ 677.139874] PM: suspend exit
> [ 678.490993] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
> [ 679.517022] r8169 0000:03:00.0 enp3s0: link up
> [â]
> $ sudo more /sys/kernel/debug/kmemleak
> unreferenced object 0xf2bee080 (size 96):
> comm "systemd-network", pid 209, jiffies 4294894477 (age 851.812s)
> hex dump (first 32 bytes):
> 00 00 00 00 dc 05 00 00 00 00 00 00 00 00 00 00 ................
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<fb9b1020>] kmem_cache_alloc_trace+0x195/0x3a0
> [<bbe5d9f4>] ip6_convert_metrics+0x4a/0xe0
> [<4d869f67>] ip6_route_info_create+0x294/0xd10
> [<2f08c8d0>] ip6_route_add+0x1d/0x90
> [<304de076>] inet6_rtm_newroute+0x72/0x80
> [<f9e280dd>] rtnetlink_rcv_msg+0x2df/0x4f0
> [<9287c3cf>] netlink_rcv_skb+0x8f/0x130
> [<fbddd35b>] rtnetlink_rcv+0x12/0x20
> [<60ffd06b>] netlink_unicast+0x1ab/0x2b0
> [<4260e680>] netlink_sendmsg+0x2b5/0x5c0
> [<ec0cda7b>] sock_sendmsg+0x5a/0xa0
> [<08adf1a5>] __sys_sendto+0xea/0x170
> [<93e4f4e1>] sys_socketcall+0x1f4/0x380
> [<dcd25cae>] do_fast_syscall_32+0xd3/0x360
> [<0ce0c28f>] entry_SYSENTER_32+0x4e/0x7c
> [<2324e043>] 0xffffffff
> ```
>


I'll take a look. Thanks for the report.