On Tue, Mar 4, 2014 at 2:11 PM, Nelson, Shannon <shannon.nelson@xxxxxxxxx> wrote: >> From: Bjorn Helgaas [mailto:bhelgaas@xxxxxxxxxx] >> >> On Tue, Mar 4, 2014 at 8:55 AM, Daniel Borkmann <dborkman@xxxxxxxxxx> >> wrote: >> > Hi all, I'm not very familiar with the e1000 code, but on the latest >> > net.git kernel I get reliably the following (not sure if it's actually >> > caused by e1000 though): >> >> Thanks a lot for the report. What kernel is this exactly (URL and >> SHA-1 hash)? We have fixes for a couple leaks already queued up [1, >> 2], so possibly you're seeing those leaks. If you already have those >> fixes in net.git, then we should investigate further. >> >> Bjorn > > > FYI - I've recently seen similar kmemleak reports from ixgbe and i40e drivers, all seemly pointing to the msix allocations. I didn't have a chance to track them down, but they were seen in variations of net-next 3.14.0-rc3. I don't think that has the leak fixes in it yet. I'm looking here: http://git.kernel.org/cgit/linux/kernel/git/davem/net-next.git/log/drivers/pci/msi.c which does not contain the fixes from 2014-02-13 that are listed here: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/log/drivers/pci/msi.c In particular, these two look related: PCI/MSI: Fix leak of msi_attrs PCI/MSI: Check kmalloc() return value, fix leak of name So if you do look into them further, make sure you pick up these fixes first, and let me know if you still see issues. Bjorn -- To unsubscribe from this list: send the line "unsubscribe linux-pci" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html