I have limited network access at the moment, if no one looks into it this week I'll take a look next week. -- paul moore www.paul-moore.com On August 13, 2020 12:32:00 PM Stephen Smalley <stephen.smalley.work@xxxxxxxxx> wrote: > I noticed this in /sys/kernel/debug/kmemleak while testing other > patches. This is on 5.8.0-rc1 but may be older. > > unreferenced object 0xffff888158b40380 (size 32): > comm "netlabelctl", pid 2982, jiffies 4295212079 (age 3234.561s) > hex dump (first 32 bytes): > 80 03 b4 58 81 88 ff ff 80 03 b4 58 81 88 ff ff ...X.......X.... > 90 03 b4 58 81 88 ff ff 90 03 b4 58 81 88 ff ff ...X.......X.... > backtrace: > [<000000009fe161a4>] netlbl_mgmt_add_common+0x2df/0x9b0 > [<00000000816cc1d9>] netlbl_mgmt_adddef+0x133/0x190 > [<00000000f060e456>] genl_rcv_msg+0x2dd/0x490 > [<000000001c733400>] netlink_rcv_skb+0xd0/0x200 > [<00000000c42f6f58>] genl_rcv+0x24/0x40 > [<000000005421c040>] netlink_unicast+0x2b4/0x3e0 > [<00000000ab107bba>] netlink_sendmsg+0x3a6/0x660 > [<00000000643024bd>] sock_sendmsg+0x96/0xa0 > [<00000000ba78e5a6>] ____sys_sendmsg+0x404/0x440 > [<000000006f3de0f5>] ___sys_sendmsg+0xd8/0x140 > [<000000009b8c70ea>] __sys_sendmsg+0xa3/0x110 > [<00000000e65194c3>] do_syscall_64+0x52/0xb0 > [<00000000367aebc6>] entry_SYSCALL_64_after_hwframe+0x44/0xa9