EXPERIMENTAL kmemleak reported some memory leaks! Due to the way kmemleak works, the leak might be from an earlier test, or something totally unrelated. unreferenced object 0xffff8881f646e940 (size 576): comm "mount", pid 695, jiffies 4294917533 (age 38.508s) hex dump (first 32 bytes): 06 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 68 2a 19 e0 81 88 ff ff 58 e9 46 f6 81 88 ff ff h*......X.F..... backtrace: [<00000000dff11222>] radix_tree_node_alloc.constprop.0+0xd7/0x160 [<000000000d1e18ac>] radix_tree_insert+0x117/0x2c0 [<00000000d19a3dbb>] alloc_extent_buffer+0x56a/0x6d0 [btrfs] [<0000000018b71b0f>] read_tree_block+0x15/0x60 [btrfs] [<0000000010a55e05>] open_ctree+0x137c/0x277a [btrfs] [<0000000036160822>] btrfs_mount_root.cold+0x12/0xec [btrfs] [<00000000388e9139>] legacy_get_tree+0x6b/0xa0 [<00000000e21e39e7>] vfs_get_tree+0x42/0xf0 [<000000002689bf53>] fc_mount+0xa/0x40 [<000000002a92a0e8>] vfs_kern_mount.part.0+0x6c/0x80 [<0000000069d5b91e>] btrfs_mount+0x1ba/0x5d0 [btrfs] [<00000000388e9139>] legacy_get_tree+0x6b/0xa0 [<00000000e21e39e7>] vfs_get_tree+0x42/0xf0 [<0000000041afc687>] do_mount+0xa90/0xe00 [<00000000e2f69bd0>] __x64_sys_mount+0xb9/0xf0 [<00000000667f0b0a>] do_syscall_64+0x5e/0x1c0 unreferenced object 0xffff8881cad8ec00 (size 576): comm "fsstress", pid 723, jiffies 4294921132 (age 24.112s) hex dump (first 32 bytes): 00 1b 02 00 00 00 00 00 40 e9 46 f6 81 88 ff ff ........@.F..... 68 2a 19 e0 81 88 ff ff 18 ec d8 ca 81 88 ff ff h*.............. backtrace: [<00000000dff11222>] radix_tree_node_alloc.constprop.0+0xd7/0x160 [<000000000d1e18ac>] radix_tree_insert+0x117/0x2c0 [<00000000d19a3dbb>] alloc_extent_buffer+0x56a/0x6d0 [btrfs] [<00000000e36da7fe>] btrfs_init_new_buffer+0x3e/0x3b0 [btrfs] [<00000000a40b3d56>] btrfs_alloc_tree_block+0x1f7/0x4b0 [btrfs] [<00000000d37cefa6>] alloc_tree_block_no_bg_flush+0xba/0xe0 [btrfs] [<0000000049aac05e>] __btrfs_cow_block+0x22f/0x840 [btrfs] [<000000004b88f003>] btrfs_cow_block+0x1f1/0x290 [btrfs] [<000000008f1ed34a>] btrfs_search_slot+0x878/0xef0 [btrfs] [<0000000066c12130>] btrfs_insert_empty_items+0x77/0xd0 [btrfs] [<0000000002f3d164>] btrfs_new_inode+0x52c/0x9c0 [btrfs] [<00000000741f8f60>] btrfs_create+0x171/0x310 [btrfs] [<00000000ed9bffe6>] path_openat+0x840/0x1510 [<000000002e5e9c08>] do_filp_open+0x10c/0x180 [<0000000035e673af>] do_sys_openat2+0x28f/0x370 [<000000007e6b0b42>] do_sys_open+0x75/0xb0