From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8061B33AD9A for ; Wed, 29 Apr 2026 05:14:25 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777439667; cv=none; b=pKVoPOn598QXrki39u2Ypvre7IlUmJU9yEn3xl2+aWOsf6LdrYI8IvHB7GZ1nGlQPWfeoOz4j8WEySFdUTsgmnjffjps+5jzHlEhjE5OPIomFGfvUWKxTj+SQbK4E5r4HXHqHYyLCf6FOQTZDq9VUQCnFTHDO7RIwV9cLD4tWTY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777439667; c=relaxed/simple; bh=isNmRuNuMJx4i8ElKaXr/14tWumKpXs9Ca+p5ETyqY4=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=QvWy6GhpetU/2H2HMjhK8zqCnykxsehA5bzTOuE3+PVWZtCDUrMFJPBP4x9lFHn1+a/xbl+I6oqHjcH7yBpUnXBqoJeAB4JmFnt5gs0aPkPCQ1Uef3EhYnLr5cjYHFOYOyiq37lodrAslGFeVa50fNvmPVYr67l6IPDW9O5H9ZY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=Z6FZ++cv; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="Z6FZ++cv" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1777439664; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=isNmRuNuMJx4i8ElKaXr/14tWumKpXs9Ca+p5ETyqY4=; b=Z6FZ++cvqS/f8JfXGuePOjYhUip1TbbisQyEd8BVZEDPPsBA+t0Q4Y8mTmLi2prEKt3Li/ k13DHXjANvMQxq40AmeoPFL+LZYVNDpMDODjuKgnC8qVB68KtswutNw1K6VD7VQaX8+m4u UNQr9xjsulsrQl8VXF/dmaIJ9g7mDmA= Received: from mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (ec2-54-186-198-63.us-west-2.compute.amazonaws.com [54.186.198.63]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-587-olkNOLz3PZysue0b_2x2Eg-1; Wed, 29 Apr 2026 01:14:22 -0400 X-MC-Unique: olkNOLz3PZysue0b_2x2Eg-1 X-Mimecast-MFC-AGG-ID: olkNOLz3PZysue0b_2x2Eg_1777439661 Received: from mx-prod-int-01.mail-002.prod.us-west-2.aws.redhat.com (mx-prod-int-01.mail-002.prod.us-west-2.aws.redhat.com [10.30.177.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mx-prod-mc-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTPS id C3D4D195608B; Wed, 29 Apr 2026 05:14:20 +0000 (UTC) Received: from fedora.redhat.com (unknown [10.44.32.45]) by mx-prod-int-01.mail-002.prod.us-west-2.aws.redhat.com (Postfix) with ESMTP id 0E77C300756E; Wed, 29 Apr 2026 05:14:15 +0000 (UTC) From: Jose Ignacio Tornos Martinez To: baochen.qiang@oss.qualcomm.com Cc: ath11k@lists.infradead.org, jjohnson@kernel.org, jtornosm@redhat.com, linux-kernel@vger.kernel.org, linux-wireless@vger.kernel.org, stable@vger.kernel.org Subject: Re: [PATCH] wifi: ath11k: fix warning when unbinding Date: Wed, 29 Apr 2026 07:14:03 +0200 Message-ID: <20260429051414.6625-1-jtornosm@redhat.com> In-Reply-To: References: Precedence: bulk X-Mailing-List: linux-wireless@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.30.177.4 Hello Baochen, As I try to comment in the commit description, the warning is not at the intialization, but comes up when the device is unbinded after a problem at the initialization stage, because due to the problem the buffers were released (probe). Later after the problem, if the unbinding is commanded the buffers are released again. Setting to NUll after releasing avoids the double free. The easiest way to reproduce it is to run in a VM the default upstream kernel (that is always failing on VMs) and just unbind the device (ath11k_pci). The same problem was fixed by me for ath12k driver here ca68ce0d9f4b ("wifi: ath12k: fix warning when unbinding"), and I have seen the same problem is also happening for ath11k driver. Thanks Best regards José Ignacio