Return-Path: Sender: Larry Finger Subject: Re: Memory (skb) leak in kernel 4.8-rc2 To: Marcel Holtmann References: Cc: "Gustavo F. Padovan" , Johan Hedberg , Linux Bluetooth mailing list , LKML From: Larry Finger Message-ID: <8c4d8931-7ebf-0357-6992-ac5551593ed3@lwfinger.net> Date: Sat, 20 Aug 2016 11:24:23 -0500 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=windows-1252; format=flowed List-ID: On 08/20/2016 01:01 AM, Marcel Holtmann wrote: > Hi Larry, > > I can not see a leak. Maybe Johan has an idea. Marcel and Johan, The hardware in question is an Intel device with USB ID 8087:07dc, which is part of an Intel Wireless 7260. The kmemleak backtraces for the two kinds of leaks are: unreferenced object 0xffff8801e182e000 (size 1024): comm "hardirq", pid 0, jiffies 4312467853 (age 61.716s) hex dump (first 32 bytes): 00 84 82 e1 01 88 ff ff 0e 04 01 10 20 00 20 00 ............ . . 05 06 02 00 00 05 00 00 40 00 40 00 00 00 00 00 ........@.@..... backtrace: [] kmemleak_alloc+0x4a/0xa0 [] __kmalloc_node_track_caller+0x178/0x270 [] __kmalloc_reserve.isra.35+0x31/0x90 [] __alloc_skb+0x7e/0x280 [] btusb_recv_intr+0x12b/0x170 [btusb] [] btusb_intr_complete+0xc5/0x130 [btusb] [] __usb_hcd_giveback_urb+0x85/0x110 [usbcore] [] usb_hcd_giveback_urb+0x3f/0x130 [usbcore] [] handle_tx_event+0x4ca/0x13c0 [xhci_hcd] [] xhci_irq+0x272/0xa30 [xhci_hcd] [] xhci_msi_irq+0x11/0x20 [xhci_hcd] [] __handle_irq_event_percpu+0x3f/0x1d0 [] handle_irq_event_percpu+0x23/0x60 [] handle_irq_event+0x3c/0x60 [] handle_edge_irq+0x9b/0x160 [] handle_irq+0x20/0x30 unreferenced object 0xffff88010ccbd200 (size 256): comm "kworker/u17:2", pid 684, jiffies 4312467853 (age 61.716s) hex dump (first 32 bytes): 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 1e c6 5f 75 10 90 6c 14 00 00 00 00 00 00 00 00 .._u..l......... backtrace: [] kmemleak_alloc+0x4a/0xa0 [] kmem_cache_alloc+0xc4/0x1f0 [] skb_clone+0x4c/0xa0 [] hci_event_packet+0xb8/0x30b0 [bluetooth] [] hci_rx_work+0x18d/0x380 [bluetooth] [] process_one_work+0x14b/0x430 [] worker_thread+0x12b/0x490 [] kthread+0xc9/0xe0 [] ret_from_fork+0x1f/0x40 [] 0xffffffffffffffff I will attempt a bisection. Larry