====================================== | make: Leaving directory '/home/virtme/testing/wt-25/tools/testing/selftests' | xx__-> echo $? | 0 | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800d9767c0 (size 216): comm "iperf3", pid 6752, jiffies 4296099427 hex dump (first 32 bytes): c0 6d 97 0d 80 88 ff ff 00 00 00 00 00 00 00 00 .m.............. 00 00 a8 07 80 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 2e395d7b): kmem_cache_alloc_node_noprof (./include/linux/kmemleak.h:44 mm/slub.c:4184 mm/slub.c:4229 mm/slub.c:4281) __alloc_skb (net/core/skbuff.c:659) __tcp_send_ack.part.0 (./include/linux/skbuff.h:1377 net/ipv4/tcp_output.c:4260) tcp_recvmsg_locked (net/ipv4/tcp.c:2613) tcp_recvmsg (net/ipv4/tcp.c:2906) inet6_recvmsg (net/ipv6/af_inet6.c:680 (discriminator 2)) sock_read_iter (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/sock.h:304 net/socket.c:1069 net/socket.c:1087 net/socket.c:1157) vfs_read (fs/read_write.c:491 fs/read_write.c:572) ksys_read (fs/read_write.c:715) do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) Finger prints: kmem_cache_alloc_node_noprof:__alloc_skb:tcp_recvmsg_locked:tcp_recvmsg:inet6_recvmsg