Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp4001106imm; Mon, 14 May 2018 00:45:48 -0700 (PDT) X-Google-Smtp-Source: AB8JxZouu6VKrQF5djFLv9NS0DG9gw7ChdrqWnUJqi/WmXz/C0QPaHLkFYNjBspIzPuguYVB2dBT X-Received: by 2002:a17:902:14d:: with SMTP id 71-v6mr8726979plb.275.1526283948222; Mon, 14 May 2018 00:45:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526283948; cv=none; d=google.com; s=arc-20160816; b=w1IU3YVIHrPih8dvfu+xsnRBY5yS9TD5z9IVihwK73vDs3fcg+uTw85N6nmJC70GbX 18Y9UueaQsuWFPCT1aQnrQxgvQisDHssPGorc3dMyGdFjYnfCMnMkXB2QgVDRlTWXExW +TzFcyzYIUabQy5mTUAzZ8LpE6BI4XdiwJ62bEA7aKwURdRuBZC27J3zRsYfXTAjQ5vR q8WM/4EbO/dpDJ994NvdlZ0bEPRqDVMJvYhDpFs+aaOxr6MS7eRWbJua9qHW/3gQzLPq RikeaSQ/1rvLGuV75h1Oz2y1E6yYcdeVj9cg3JFq/5smpSKzfLn60BjbmL0Hry5H+mnr Hn2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=FmJX+tzWI5hox0QQQgRHLzfsJ4WGv4JSKpqsv/apHUs=; b=IxRhYXyiWWA+Udosn3AaYBnbHJCi3p34fcTBPILS9g8QD3+TQmDIFHTowc0dhgxfct vYwd+7HFX/R0QE8585BJEpWZfwuc4oOBDGppl+rRHUexeq+dOlcEYExeDDep9kDUomqP 41a+HRL/3ohsdy6LqcErEUzBYl4/NTokQsmjtptb8IYWTksNxtQgyW2w0mOvLty6Wbvi RNw6P3U8CFVUzP+utB4uPUuB5cCa6RvArIdYw8pbTrH/opMwuBaaHCm236tm4SBwryyg s+i29dae8poGlncWJm9aLHDqXDltqv7CNJRRFcJd7aRj/oMMIIAFjwEctYbrB6VdYl94 yD9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HEuYfq7k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d65-v6si9158396pfa.263.2018.05.14.00.45.33; Mon, 14 May 2018 00:45:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=HEuYfq7k; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752604AbeENHno (ORCPT + 99 others); Mon, 14 May 2018 03:43:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:58274 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752173AbeENGvl (ORCPT ); Mon, 14 May 2018 02:51:41 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 39D1221771; Mon, 14 May 2018 06:51:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1526280700; bh=5zKG5aVudGoLpiG7+6jrL0/QqoqQhORaLDze7EnP9Ss=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HEuYfq7ks+F3WiyIKp8Zz4EfuQIBz/Su5Rl/wMaliLOCVozxsFnWn7sWPvRKo83it +P/K5NCFgCb/r6kvJ0ut9rMcpkdQpSk6ox3NDHJsyS3CFmEQpsu/MLK75CNVa/0y7D gMtJ17yGOPPPzGRZxpAIBZeqm8SMQ17GSyZ4qkz0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thomas Hellstrom , Deepak Rawat , Sinclair Yeh Subject: [PATCH 4.4 24/56] drm/vmwgfx: Fix a buffer object leak Date: Mon, 14 May 2018 08:48:29 +0200 Message-Id: <20180514064757.216460871@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180514064754.853201981@linuxfoundation.org> References: <20180514064754.853201981@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Thomas Hellstrom commit 13f149d47392782baafd96d54d4e65f3b5ca342f upstream. A buffer object leak was introduced when fixing a premature buffer object release. Fix this. Cc: Fixes: 73a88250b709 ("Fix a destoy-while-held mutex problem.") Signed-off-by: Thomas Hellstrom Reviewed-by: Deepak Rawat Reviewed-by: Sinclair Yeh Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/vmwgfx/vmwgfx_kms.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/gpu/drm/vmwgfx/vmwgfx_kms.c +++ b/drivers/gpu/drm/vmwgfx/vmwgfx_kms.c @@ -1991,6 +1991,7 @@ void vmw_kms_helper_resource_finish(stru vmw_kms_helper_buffer_finish(res->dev_priv, NULL, ctx->buf, out_fence, NULL); + vmw_dmabuf_unreference(&ctx->buf); vmw_resource_unreserve(res, false, NULL, 0); mutex_unlock(&res->dev_priv->cmdbuf_mutex); }