public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Possible regression in drm/i915 driver: memleak
@ 2022-12-20 14:33 Mirsad Todorovac
  2022-12-20 15:22 ` srinivas pandruvada
  0 siblings, 1 reply; 14+ messages in thread
From: Mirsad Todorovac @ 2022-12-20 14:33 UTC (permalink / raw)
  To: LKML; +Cc: Thorsten Leemhuis, srinivas pandruvada

[-- Attachment #1: Type: text/plain, Size: 2050 bytes --]

Hi all,

I have been unsuccessful to find any particular Intel i915 maintainer 
emails, so my best bet is to post here, as you will must assuredly 
already know them.

The problem is a kernel memory leak that is repeatedly occurring 
triggered during the execution of Chrome browser under the latest 6.1.0+ 
kernel of this morning and Almalinux 8.6 on a Lenovo desktop box
with Intel(R) Core(TM) i5-8400 CPU @ 2.80GHz CPU.

The build is with KMEMLEAK, KASAN and MGLRU turned on during the build, 
on a vanilla mainline kernel from Mr. Torvalds' tree.

The leaks look like this one:

unreferenced object 0xffff888131754880 (size 64):
   comm "chrome", pid 13058, jiffies 4298568878 (age 3708.084s)
   hex dump (first 32 bytes):
     01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
     00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
   backtrace:
     [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
     [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
     [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
     [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
     [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
     [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
     [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
     [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
     [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
     [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
     [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc

The complete list of leaks in attachment, but they seem similar or the same.

Please find attached lshw and kernel build config file.

I will probably check the same parms on my laptop at home, which is also 
Lenovo, but a different hw config and Ubuntu 22.10.

Thanks,
Mirsad

-- 
Mirsad Goran Todorovac
Sistem inženjer
Grafički fakultet | Akademija likovnih umjetnosti
Sveučilište u Zagrebu
-- 
System engineer
Faculty of Graphic Arts | Academy of Fine Arts
University of Zagreb, Republic of Croatia

[-- Attachment #2: 6.1.0+-kmemleak-chrome-i915-drm.log --]
[-- Type: text/x-log, Size: 30198 bytes --]

unreferenced object 0xffff888106801200 (size 16):
  comm "kworker/u12:6", pid 353, jiffies 4294902874 (age 15169.560s)
  hex dump (first 16 bytes):
    6d 65 6d 73 74 69 63 6b 30 00 00 00 00 00 00 00  memstick0.......
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f8175>] __kmalloc_node_track_caller+0x55/0x160
    [<ffffffff9e8e34a6>] kstrdup+0x36/0x60
    [<ffffffff9e8e3508>] kstrdup_const+0x28/0x30
    [<ffffffff9eed0757>] kvasprintf_const+0x97/0xd0
    [<ffffffff9fa9cdf4>] kobject_set_name_vargs+0x34/0xc0
    [<ffffffff9f30289b>] dev_set_name+0x9b/0xd0
    [<ffffffffc11a1201>] memstick_check+0x181/0x639 [memstick]
    [<ffffffff9e56e1d6>] process_one_work+0x4e6/0x7e0
    [<ffffffff9e56e556>] worker_thread+0x76/0x770
    [<ffffffff9e57b468>] kthread+0x168/0x1a0
    [<ffffffff9e404c99>] ret_from_fork+0x29/0x50
unreferenced object 0xffff888106801480 (size 16):
  comm "kworker/u12:6", pid 353, jiffies 4294902879 (age 15169.540s)
  hex dump (first 16 bytes):
    6d 65 6d 73 74 69 63 6b 30 00 00 00 00 00 00 00  memstick0.......
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f8175>] __kmalloc_node_track_caller+0x55/0x160
    [<ffffffff9e8e34a6>] kstrdup+0x36/0x60
    [<ffffffff9e8e3508>] kstrdup_const+0x28/0x30
    [<ffffffff9eed0757>] kvasprintf_const+0x97/0xd0
    [<ffffffff9fa9cdf4>] kobject_set_name_vargs+0x34/0xc0
    [<ffffffff9f30289b>] dev_set_name+0x9b/0xd0
    [<ffffffffc11a1201>] memstick_check+0x181/0x639 [memstick]
    [<ffffffff9e56e1d6>] process_one_work+0x4e6/0x7e0
    [<ffffffff9e56e556>] worker_thread+0x76/0x770
    [<ffffffff9e57b468>] kthread+0x168/0x1a0
    [<ffffffff9e404c99>] ret_from_fork+0x29/0x50
unreferenced object 0xffff888125a4b080 (size 64):
  comm "chrome", pid 13058, jiffies 4296358343 (age 9347.816s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888110e67b80 (size 64):
  comm "chrome", pid 13058, jiffies 4296360724 (age 9338.296s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88812c4aa880 (size 64):
  comm "chrome", pid 13058, jiffies 4296363186 (age 9328.504s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8882cf8e6980 (size 64):
  comm "chrome", pid 13058, jiffies 4296364091 (age 9324.888s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888348679780 (size 64):
  comm "chrome", pid 13058, jiffies 4296364716 (age 9322.388s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8881296f0980 (size 64):
  comm "chrome", pid 13058, jiffies 4296364730 (age 9322.336s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888184070e00 (size 64):
  comm "chrome", pid 13058, jiffies 4296369494 (age 9303.340s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888118adde80 (size 64):
  comm "chrome", pid 13058, jiffies 4296369636 (age 9302.772s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888112a4f100 (size 64):
  comm "chrome", pid 13058, jiffies 4296369649 (age 9302.720s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88826d5af280 (size 64):
  comm "chrome", pid 13058, jiffies 4296403460 (age 9167.480s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88819c897580 (size 64):
  comm "chrome", pid 13058, jiffies 4296405918 (age 9157.708s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888158992e00 (size 64):
  comm "chrome", pid 13058, jiffies 4296413631 (age 9126.860s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8881aa860c00 (size 64):
  comm "chrome", pid 13058, jiffies 4296489224 (age 8824.488s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88815e52c380 (size 64):
  comm "chrome", pid 13058, jiffies 4296496255 (age 8796.368s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88801024fb80 (size 64):
  comm "chrome", pid 13058, jiffies 4296497014 (age 8793.392s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8881309b4a80 (size 64):
  comm "chrome", pid 13058, jiffies 4296506150 (age 8756.848s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888003918600 (size 64):
  comm "chrome", pid 13058, jiffies 4296508245 (age 8748.472s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88833a40f680 (size 64):
  comm "chrome", pid 13058, jiffies 4296535101 (age 8641.048s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888339826f00 (size 64):
  comm "chrome", pid 13058, jiffies 4297560865 (age 4538.084s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888339826080 (size 64):
  comm "chrome", pid 13058, jiffies 4297560865 (age 4538.084s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888129064400 (size 64):
  comm "chrome", pid 13058, jiffies 4297582297 (age 4452.360s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8881120e0a00 (size 64):
  comm "chrome", pid 13058, jiffies 4297818388 (age 3508.020s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88828d467080 (size 64):
  comm "chrome", pid 13058, jiffies 4297864465 (age 3323.796s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff8880024bcd80 (size 64):
  comm "chrome", pid 13058, jiffies 4297869778 (age 3302.544s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88825f3dd500 (size 64):
  comm "chrome", pid 13058, jiffies 4297887950 (age 3229.860s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888134770980 (size 64):
  comm "chrome", pid 13058, jiffies 4297899648 (age 3183.068s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88807d624d00 (size 64):
  comm "chrome", pid 13058, jiffies 4297989777 (age 2822.632s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888103ce3b00 (size 64):
  comm "chrome", pid 13058, jiffies 4298005178 (age 2761.032s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff888129650e00 (size 64):
  comm "chrome", pid 13058, jiffies 4298008798 (age 2746.552s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc
unreferenced object 0xffff88828124a780 (size 64):
  comm "chrome", pid 13058, jiffies 4298022534 (age 2691.608s)
  hex dump (first 32 bytes):
    01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 80 1e 3e 83 88 ff ff  ...........>....
  backtrace:
    [<ffffffff9e9b5542>] slab_post_alloc_hook+0xb2/0x340
    [<ffffffff9e9bbf5f>] __kmem_cache_alloc_node+0x1bf/0x2c0
    [<ffffffff9e8f767a>] kmalloc_trace+0x2a/0xb0
    [<ffffffffc08dfde5>] drm_vma_node_allow+0x45/0x150 [drm]
    [<ffffffffc0b33315>] __assign_mmap_offset_handle+0x615/0x820 [i915]
    [<ffffffffc0b34057>] i915_gem_mmap_offset_ioctl+0x77/0x110 [i915]
    [<ffffffffc08bc5e1>] drm_ioctl_kernel+0x181/0x280 [drm]
    [<ffffffffc08bc9cd>] drm_ioctl+0x2dd/0x6a0 [drm]
    [<ffffffff9ea54744>] __x64_sys_ioctl+0xc4/0x100
    [<ffffffff9fbc0178>] do_syscall_64+0x58/0x80
    [<ffffffff9fc000aa>] entry_SYSCALL_64_after_hwframe+0x72/0xdc

[-- Attachment #3: lshw.txt.xz --]
[-- Type: application/x-xz, Size: 4628 bytes --]

[-- Attachment #4: config-6.1.0+.xz --]
[-- Type: application/x-xz, Size: 57168 bytes --]

^ permalink raw reply	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2023-01-16  6:25 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-12-20 14:33 Possible regression in drm/i915 driver: memleak Mirsad Todorovac
2022-12-20 15:22 ` srinivas pandruvada
2022-12-20 15:52   ` Tvrtko Ursulin
2022-12-20 17:20     ` Mirsad Goran Todorovac
2022-12-20 19:34     ` LOOKS GOOD: " Mirsad Todorovac
2022-12-21  7:15       ` Mirsad Goran Todorovac
2022-12-22  0:12       ` LOOKS GOOD: " Mirsad Goran Todorovac
2022-12-22  8:04         ` Tvrtko Ursulin
2022-12-22 15:21           ` Mirsad Goran Todorovac
2022-12-23 12:18             ` Tvrtko Ursulin
2022-12-25 21:11               ` Mirsad Goran Todorovac
2022-12-25 22:48           ` Mirsad Goran Todorovac
2023-01-09 15:00             ` Tvrtko Ursulin
2023-01-16  6:25               ` Mirsad Todorovac

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox