====================================== | make: Leaving directory '/home/virtme/testing-25/tools/testing/selftests' | xx__-> echo $? | 0 | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800851dcc0 (size 216): comm "iperf3", pid 6360, jiffies 4295853229 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 20 ad 07 80 88 ff ff 00 00 00 00 00 00 00 00 . .............. backtrace (crc 5d563716): kmem_cache_alloc_node_noprof (./include/linux/kmemleak.h:44 mm/slub.c:4152 mm/slub.c:4197 mm/slub.c:4249) __alloc_skb (net/core/skbuff.c:659) __tcp_send_ack.part.0 (./include/linux/skbuff.h:1336 net/ipv4/tcp_output.c:4259) tcp_recvmsg_locked (net/ipv4/tcp.c:2613) tcp_recvmsg (net/ipv4/tcp.c:2906) inet6_recvmsg (net/ipv6/af_inet6.c:680 (discriminator 2)) sock_read_iter (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/sock.h:304 net/socket.c:1069 net/socket.c:1087 net/socket.c:1157) vfs_read (fs/read_write.c:491 fs/read_write.c:572) ksys_read (fs/read_write.c:715) do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) Finger prints: kmem_cache_alloc_node_noprof:__alloc_skb:tcp_recvmsg_locked:tcp_recvmsg:inet6_recvmsg