Received: by 2002:a05:7412:1703:b0:e2:908c:2ebd with SMTP id dm3csp3986040rdb; Wed, 30 Aug 2023 11:49:37 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH3UZt2vYoykIOvLWdXj8Qxtz271v2xmOiCe2hicMhAgEFAdMUA3kT1lsykptVEynH5OTPt X-Received: by 2002:a17:90b:1291:b0:263:f72f:491 with SMTP id fw17-20020a17090b129100b00263f72f0491mr2944324pjb.43.1693421377625; Wed, 30 Aug 2023 11:49:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1693421377; cv=none; d=google.com; s=arc-20160816; b=O20zE+/PD2Rl+WesHFdMLinh2CdJNnxGW6EFj/AlrGALSZSoe16mvZcLXhd2Tb4jj1 EHKUfWQJj06OPPC5mWeb1Xo0y0sz0pThxs82LtUxeJzv7O1ksAgFfcTw6FPGtxJIEpAq NDoLXW4l+S0ENTyxVPk665sQpx30w9Od3fbCK7QqVpi6RShBeLxMF/kzM9QMT1EfkkYJ KfsVFWY2PwODUZOgVE8fgrHxJOcGKj7WRka1xX2w8kIxLfQfq8S4DinQpsp6A3zk0QDr WyN1A6SLsc+rFHR6i9KtEbt1jJwbUml8bQ1mIUzwF0I10hmHsSrfQuuN7PRYiNfSQtMe 2CHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:message-id:date:subject :cc:to:from:dkim-signature; bh=bWjFUrDX2r4q1kAWMHztp7x3l/jr6HtHPaGejxBSTjo=; fh=aeGWW8v5QjpIfhWrnLdmLpuklimBEHqwmLCNM8bvYhw=; b=nbOJJwVoa6F01Aw4g7x6wL2Mgx3AmJASbBEuB5lNyyEVZGV37ZwuYjZwN9sjkdI69o PSgWBlHrSqO3WgWKMUobOfE11PTHj3mHdCGXTkInzkQ08DdMB7/+Y01KTkXNbTMvLC2p GhzTRpHwJ7ZOnL4rFfkj2t7ZIcb1H5zq9rQFKPUQYfr7aNahOetiJ7QVcfWLwXYRB1/p FQeHw+dakjYe3NpMPzg0oNv+ltt00JZ/K1jyhrYMd6fve1ZH4L/4rx2kiRRhSpUELdvJ 8YvPGqfSufNUGZ+us/l5cRUCaK+DTquWhJgBFxK+7gGCmE3YKTXVsVIAqv1FqGbx5l4s mlaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NgYUZygm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mi1-20020a17090b4b4100b002683f507990si2408889pjb.109.2023.08.30.11.49.09; Wed, 30 Aug 2023 11:49:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=NgYUZygm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239438AbjH3Sk1 (ORCPT + 99 others); Wed, 30 Aug 2023 14:40:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39226 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242720AbjH3JVm (ORCPT ); Wed, 30 Aug 2023 05:21:42 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 69F1BCCF; Wed, 30 Aug 2023 02:21:39 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 07A126068B; Wed, 30 Aug 2023 09:21:39 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 241C4C433C8; Wed, 30 Aug 2023 09:21:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1693387298; bh=siIZODpxnuFofigGdK4dwZYoGFyU6ZVlCj0AGqstUXY=; h=From:To:Cc:Subject:Date:From; b=NgYUZygmBVLwFbvipWgScmV9bhRY4kEtxv+LxE1ZR+6xyl9Ra9l+OKjTkwsKUnCLD beOWKm9nyL1Va+AILsLgv0NtwJ2QtqXMLv8ynDEuGiIwgZVZMt16SIOHzWgxPuZsVN xeLpsiLkB27M4lZ/rwqit+jHi9YByXMQjBcgdZxxb19C2y+hzqxYHKYG7Sd6rgWYJB K58+CwM9JjdL3H3y/i5yaHv7FD8sfAfdnK17j8OSiwPXnt7bFmP5S7jI+0rEoCdy1F nppDZS0xW0zmchJck+DBVrBKJVLogG9rnkW+0dtk7EMGUAWgGLjnalXMzHZwviC1QH wy9DkZFZ+4FVw== From: Kalle Valo To: Ross Lagerwall , Bjorn Helgaas Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, ath11k@lists.infradead.org, regressions@lists.linux.dev Subject: [regression v6.5-rc1] PCI: comm "swapper/0" leaking memory Date: Wed, 30 Aug 2023 12:21:34 +0300 Message-ID: <878r9sga1t.fsf@kernel.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/28.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, I noticed that starting from v6.5-rc1 my ath11k tests reported several memory leaks from swapper/0: unreferenced object 0xffff88810a02b7a8 (size 96): comm "swapper/0", pid 1, jiffies 4294671838 (age 98.120s) hex dump (first 32 bytes): 80 b8 02 0a 81 88 ff ff b8 72 07 00 00 c9 ff ff .........r...... c8 b7 02 0a 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: unreferenced object 0xffff88810a02b880 (size 96): comm "swapper/0", pid 1, jiffies 4294671838 (age 98.120s) hex dump (first 32 bytes): 58 b9 02 0a 81 88 ff ff a8 b7 02 0a 81 88 ff ff X............... a0 b8 02 0a 81 88 ff ff 00 00 00 00 00 00 00 00 ................ backtrace: unreferenced object 0xffff88810a02b958 (size 96): comm "swapper/0", pid 1, jiffies 4294671838 (age 98.120s) hex dump (first 32 bytes): 30 ba 02 0a 81 88 ff ff 80 b8 02 0a 81 88 ff ff 0............... 78 b9 02 0a 81 88 ff ff 00 00 00 00 00 00 00 00 x............... backtrace: unreferenced object 0xffff88810a02ba30 (size 96): comm "swapper/0", pid 1, jiffies 4294671838 (age 98.120s) hex dump (first 32 bytes): 08 bb 02 0a 81 88 ff ff 58 b9 02 0a 81 88 ff ff ........X....... 50 ba 02 0a 81 88 ff ff 00 00 00 00 00 00 00 00 P............... backtrace: unreferenced object 0xffff88810a02bb08 (size 96): comm "swapper/0", pid 1, jiffies 4294671838 (age 98.120s) hex dump (first 32 bytes): e0 bb 02 0a 81 88 ff ff 30 ba 02 0a 81 88 ff ff ........0....... 28 bb 02 0a 81 88 ff ff 00 00 00 00 00 00 00 00 (............... backtrace: I can easily reproduce this by doing a simple insmod and rmmod of ath11k and it's dependencies (mac80211, MHI etc). I can reliability reproduce the leaks but I only see them once after a boot, I need to reboot the host to see the leaks again. v6.4 has no leaks. I did a bisect and found the commit below. I verified reverting the commit makes the leaks go away. commit e54223275ba1bc6f704a6bab015fcd2ae4f72572 Author: Ross Lagerwall AuthorDate: Thu May 25 16:32:48 2023 +0100 Commit: Bjorn Helgaas CommitDate: Fri Jun 9 15:06:16 2023 -0500 PCI: Release resource invalidated by coalescing Kalle