Return-Path: Sender: Larry Finger Message-ID: <55638D99.5000704@lwfinger.net> Date: Mon, 25 May 2015 16:01:13 -0500 From: Larry Finger MIME-Version: 1.0 To: Marcel Holtmann , Gustavo Padovan , Johan Hedberg CC: Linux Bluetooth mailing list Subject: Memory leak in btusb Content-Type: text/plain; charset=utf-8; format=flowed List-ID: Hi, While using kmemleak to check for memory leaks in a wireless driver, I noticed the following stack traceback for a leak in btusb: ] __alloc_skb+0x7e/0x2b0 [] btusb_recv_intr+0x136/0x180 [btusb] [] btusb_intr_complete+0xb8/0x150 [btusb] [] __usb_hcd_giveback_urb+0x72/0x120 To eliminate a false positive, I unloaded the driver and got the following for the virtual address: [] __alloc_skb+0x7e/0x2b0 [] 0xffffffffa06029d6 [] 0xffffffffa0602ad8 [] __usb_hcd_giveback_urb+0x72/0x120 The source is from wireless-drivers-next.git with pulls from bluetooth-next.git and Torvalds mainline git repo that were done on May 25. The source includes commit 04b8c8143d46453a443ac32bfcd76ec952605765 with the subject "Bluetooth: btusb: fix Realtek suspend/resume". The Bluetooth device in use is made by Intel with USB ID 8087:07dc. Thanks, Larry