====================================== | make: Leaving directory '/home/virtme/testing/wt-25/tools/testing/selftests' | xx__-> echo $? | 0 | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak | xx__-> echo scan > /sys/kernel/debug/kmemleak && cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88800a4364c0 (size 216): comm "iperf3", pid 4228, jiffies 4295554924 hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 80 de 07 80 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace (crc 7ab9bd15): kmem_cache_alloc_node_noprof (./include/linux/kmemleak.h:44 mm/slub.c:4184 mm/slub.c:4229 mm/slub.c:4281) __alloc_skb (net/core/skbuff.c:660) __tcp_send_ack.part.0 (./include/linux/skbuff.h:1377 net/ipv4/tcp_output.c:4264) tcp_recvmsg_locked (net/ipv4/tcp.c:2631) tcp_recvmsg (net/ipv4/tcp.c:2924) inet6_recvmsg (net/ipv6/af_inet6.c:680 (discriminator 2)) sock_read_iter (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/sock.h:304 net/socket.c:1069 net/socket.c:1087 net/socket.c:1157) vfs_read (fs/read_write.c:491 fs/read_write.c:572) ksys_read (fs/read_write.c:715) do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94) Finger prints: kmem_cache_alloc_node_noprof:__alloc_skb:tcp_recvmsg_locked:tcp_recvmsg:inet6_recvmsg