From: "yanjun.zhu" <yanjun.zhu@linux.dev>
To: Bart Van Assche <bvanassche@acm.org>,
Shinichiro Kawasaki <shinichiro.kawasaki@wdc.com>,
"linux-block@vger.kernel.org" <linux-block@vger.kernel.org>,
"linux-nvme@lists.infradead.org" <linux-nvme@lists.infradead.org>,
"linux-scsi@vger.kernel.org" <linux-scsi@vger.kernel.org>,
"nbd@other.debian.org" <nbd@other.debian.org>,
"linux-rdma@vger.kernel.org" <linux-rdma@vger.kernel.org>
Subject: Re: blktests failures with v6.19 kernel
Date: Fri, 13 Feb 2026 15:38:08 -0800 [thread overview]
Message-ID: <b8589b6b-504c-4fdb-b73b-83b9c97e65df@linux.dev> (raw)
In-Reply-To: <5157497a-3536-4187-883e-19a54167955a@acm.org>
On 2/13/26 9:44 AM, Bart Van Assche wrote:
> On 2/12/26 11:57 PM, Shinichiro Kawasaki wrote:
>> [5] kmemleak at nvme/061 wiht rdma transport and siw driver
>>
>> unreferenced object 0xffff888114792600 (size 32):
>> comm "kworker/2:1H", pid 66, jiffies 4295489358
>> hex dump (first 32 bytes):
>> c2 f6 83 05 00 ea ff ff 00 00 00 00 00 10 00 00 ................
>> 00 b0 fd 60 81 88 ff ff 00 10 00 00 00 00 00 00 ...`............
>> backtrace (crc 3dbac61d):
>> __kmalloc_noprof+0x62f/0x8b0
>> sgl_alloc_order+0x74/0x330
>> 0xffffffffc1b73433
>> 0xffffffffc1bc1f0d
>> 0xffffffffc1bc8064
>> __ib_process_cq+0x14f/0x3e0 [ib_core]
>> ib_cq_poll_work+0x49/0x160 [ib_core]
>> process_one_work+0x868/0x1480
>> worker_thread+0x5ee/0xfd0
>> kthread+0x3af/0x770
>> ret_from_fork+0x55c/0x810
>> ret_from_fork_asm+0x1a/0x30
>
> There are no sgl_alloc() calls in the RDMA subsystem. I think the above
> indicates a memory leak in either the RDMA NVMe target driver or in the
> NVMe target core.
3a2c32d357db RDMA/siw: reclassify sockets in order to avoid false
positives from lockdep
85cb0757d7e1 net: Convert proto_ops connect() callbacks to use
sockaddr_unsized
0e50474fa514 net: Convert proto_ops bind() callbacks to use sockaddr_unsized
There are only three commits touching the siw driver between v6.18 and
v6.19. I therefore suspect the issue is more likely in the NVMe side.
Best Regards,
Zhu Yanjun
>
>> [7] kmemleak at zbd/009
>>
>> unreferenced object 0xffff88815f1f1280 (size 32):
>> comm "mount", pid 1745, jiffies 4294866235
>> hex dump (first 32 bytes):
>> 6d 65 74 61 64 61 74 61 2d 74 72 65 65 6c 6f 67 metadata-treelog
>> 00 93 9c fb af bb ae 00 00 00 00 00 00 00 00 00 ................
>> backtrace (crc 2ee03cc2):
>> __kmalloc_node_track_caller_noprof+0x66b/0x8c0
>> kstrdup+0x42/0xc0
>> kobject_set_name_vargs+0x44/0x110
>> kobject_init_and_add+0xcf/0x140
>> btrfs_sysfs_add_space_info_type+0xf2/0x200 [btrfs]
>> create_space_info_sub_group.constprop.0+0xfb/0x1b0 [btrfs]
>> create_space_info+0x247/0x320 [btrfs]
>> btrfs_init_space_info+0x143/0x1b0 [btrfs]
>> open_ctree+0x2eed/0x43fe [btrfs]
>> btrfs_get_tree.cold+0x90/0x1da [btrfs]
>> vfs_get_tree+0x87/0x2f0
>> vfs_cmd_create+0xbd/0x280
>> __do_sys_fsconfig+0x64f/0xa30
>> do_syscall_64+0x95/0x540
>> entry_SYSCALL_64_after_hwframe+0x76/0x7e
>> unreferenced object 0xffff888128d80000 (size 16):
>> comm "mount", pid 1745, jiffies 4294866237
>> hex dump (first 16 bytes):
>> 64 61 74 61 2d 72 65 6c 6f 63 00 4b 96 f6 48 82 data-reloc.K..H.
>> backtrace (crc 1598f702):
>> __kmalloc_node_track_caller_noprof+0x66b/0x8c0
>> kstrdup+0x42/0xc0
>> kobject_set_name_vargs+0x44/0x110
>> kobject_init_and_add+0xcf/0x140
>> btrfs_sysfs_add_space_info_type+0xf2/0x200 [btrfs]
>> create_space_info_sub_group.constprop.0+0xfb/0x1b0 [btrfs]
>> create_space_info+0x211/0x320 [btrfs]
>> open_ctree+0x2eed/0x43fe [btrfs]
>> btrfs_get_tree.cold+0x90/0x1da [btrfs]
>> vfs_get_tree+0x87/0x2f0
>> vfs_cmd_create+0xbd/0x280
>> __do_sys_fsconfig+0x64f/0xa30
>> do_syscall_64+0x95/0x540
>> entry_SYSCALL_64_after_hwframe+0x76/0x7e
>
> Please report the above to the BTRFS maintainers.
>
> Thanks,
>
> Bart.
next prev parent reply other threads:[~2026-02-13 23:38 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-02-13 7:57 blktests failures with v6.19 kernel Shinichiro Kawasaki
2026-02-13 9:56 ` Daniel Wagner
2026-02-14 21:19 ` Chaitanya Kulkarni
2026-02-16 10:26 ` Daniel Wagner
2026-02-17 21:22 ` Chaitanya Kulkarni
2026-02-13 17:44 ` Bart Van Assche
2026-02-13 23:38 ` yanjun.zhu [this message]
2026-02-16 9:38 ` Nilay Shroff
2026-02-16 21:18 ` Chaitanya Kulkarni
2026-02-24 7:47 ` Johannes Thumshirn
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b8589b6b-504c-4fdb-b73b-83b9c97e65df@linux.dev \
--to=yanjun.zhu@linux.dev \
--cc=bvanassche@acm.org \
--cc=linux-block@vger.kernel.org \
--cc=linux-nvme@lists.infradead.org \
--cc=linux-rdma@vger.kernel.org \
--cc=linux-scsi@vger.kernel.org \
--cc=nbd@other.debian.org \
--cc=shinichiro.kawasaki@wdc.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox