Return-path: Received: from mout.kundenserver.de ([212.227.126.187]:64769 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750891AbdGVNS5 (ORCPT ); Sat, 22 Jul 2017 09:18:57 -0400 Date: Sat, 22 Jul 2017 15:18:51 +0200 (CEST) From: Stefan Wahren To: arend.vanspriel@broadcom.com, hante.meuleman@broadcom.com, pieter-paul.giesberts@broadcom.com, franky.lin@broadcom.com, kvalo@codeaurora.org Cc: brcm80211-dev-list.pdl@broadcom.com, linux-wireless@vger.kernel.org Message-ID: <1442361688.41682.1500729531173@email.1und1.de> (sfid-20170722_151902_060255_EA096856) Subject: brcmfmac: Possible memleak brcmf_sdiod_sgtable_alloc MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-wireless-owner@vger.kernel.org List-ID: Hi, with enabled memleak detector on 4.13-rc1 (Raspberry Pi Zero W) i get the following: root@raspberrypi:/sys/kernel/debug# cat kmemleak unreferenced object 0xd824e400 (size 1024): comm "kworker/0:0", pid 3, jiffies 4294939822 (age 873.420s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [] kmemleak_alloc+0x60/0xc8 [] __kmalloc+0x184/0x2f4 [] sg_kmalloc+0x48/0x4c [] __sg_alloc_table+0x78/0x11c [] sg_alloc_table+0x2c/0x5c [] brcmf_sdiod_sgtable_alloc+0xc0/0x110 [brcmfmac] [] brcmf_sdio_probe+0x24c/0x970 [brcmfmac] [] brcmf_ops_sdio_probe+0x17c/0x244 [brcmfmac] [] sdio_bus_probe+0xb4/0x124 [] driver_probe_device+0x1d8/0x438 [] __driver_attach+0xa4/0x108 [] bus_for_each_dev+0x84/0x98 [] driver_attach+0x28/0x30 [] bus_add_driver+0xe4/0x24c [] driver_register+0xac/0xf0 [] sdio_register_driver+0x2c/0x34 Regards Stefan