Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2872829imu; Fri, 23 Nov 2018 16:27:50 -0800 (PST) X-Google-Smtp-Source: AFSGD/XYostUDZX3ulo1mbrBxXAvCF3bVjYFNOnrO5J7aZi9kQpkmcbHHbI302j+1LoUBCTceGvq X-Received: by 2002:a17:902:64c1:: with SMTP id y1mr17721112pli.64.1543019270100; Fri, 23 Nov 2018 16:27:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543019270; cv=none; d=google.com; s=arc-20160816; b=YWq91YEFnB4frdP+1bkypnJXyizwxP4QdwJEr2fNbBP/ZyBLZs3yNcU89sRMZrx3cy 064yLeATk7LZ/XoFIqcp/ltIzebcsjxgwqTJy/3YIrA4dQnQ5C3bCGGppMekkqKsX6sO pQ07iE5RarodTAvRebY6avZHUiG21248FKKNndfapx4CW08z45reZzUb2tpolSkJC55a 6Y0ZKN77uu7LreSj2P2VoYHvfp/B42Lb3uhSNYeJlSAUbBhKPmEHgr4gwq0ptVxfdJgr Lk3oFKbd2x1c8nn8KD/ohzTpwDOvAZm88erpPvrjEjZnz120QQ80ZQNfxkfzpECt4hcT FXOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:subject:cc:to:from:message-id:date; bh=SsoudJGaNBwS4gPugS4gn2XKB3PWTC4XR2PO4agYvZs=; b=sURnO7/4ERTuIusHXwfyFeMbWUxaulCYBB00oHxElDncf7Ews9k8ke8LEqt66oSJ+b OoM2pvl7KIegDpf7SnN4TpgfxJNOzQBOtYiuI54nP81DWZj3w3/FFNMhCcrhD/vSe/PI Q/EyDX3aL6AuTn9qtT2QupsV8b/Ot/lStsJ43vJYsbmANSCxqMsouvZqn5o2uiB025Or UpvLXovl9VgFMw6b7zgyyx5KqyJAM7uZypdvTvmLlMVbXTxypgu6mxBEbe9ZSvBwQFLg gtAFYINqjmwuYdHt4ugVB72ibFPu2QcMgH5Dvlf0Mqti5/kL6wgb6JkUYikYHMGFqQqh U2Vw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 133si8632209pfw.64.2018.11.23.16.27.35; Fri, 23 Nov 2018 16:27:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405861AbeKWC1K (ORCPT + 99 others); Thu, 22 Nov 2018 21:27:10 -0500 Received: from mx2.suse.de ([195.135.220.15]:53174 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728825AbeKWC1K (ORCPT ); Thu, 22 Nov 2018 21:27:10 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id DF9C0AC52; Thu, 22 Nov 2018 15:47:14 +0000 (UTC) Date: Thu, 22 Nov 2018 16:47:14 +0100 Message-ID: From: Takashi Iwai To: Oleksandr Andrushchenko Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org, dri-devel@lists.freedesktop.org, alsa-devel@alsa-project.org, jgross@suse.com, boris.ostrovsky@oracle.com, Oleksandr Andrushchenko Subject: Re: [alsa-devel] [Xen-devel][PATCH 3/3] ALSA: xen-front: Use Xen common shared buffer implementation In-Reply-To: <20181122100230.14976-3-andr2000@gmail.com> References: <20181122100230.14976-1-andr2000@gmail.com> <20181122100230.14976-3-andr2000@gmail.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI/1.14.6 (Maruoka) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 Emacs/26 (x86_64-suse-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI 1.14.6 - "Maruoka") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 22 Nov 2018 11:02:30 +0100, Oleksandr Andrushchenko wrote: > > @@ -214,12 +221,19 @@ static void stream_clear(struct xen_snd_front_pcm_stream_info *stream) > stream->out_frames = 0; > atomic_set(&stream->hw_ptr, 0); > xen_snd_front_evtchnl_pair_clear(stream->evt_pair); > - xen_snd_front_shbuf_clear(&stream->sh_buf); > + memset(&stream->shbuf, 0, sizeof(stream->shbuf)); > + stream->buffer = NULL; > + stream->buffer_sz = 0; > + stream->pages = NULL; > + stream->num_pages = 0; > } > > static void stream_free(struct xen_snd_front_pcm_stream_info *stream) > { > - xen_snd_front_shbuf_free(&stream->sh_buf); > + xen_front_pgdir_shbuf_unmap(&stream->shbuf); > + xen_front_pgdir_shbuf_free(&stream->shbuf); > + free_pages_exact(stream->buffer, stream->buffer_sz); > + kfree(stream->pages); > stream_clear(stream); > } > > @@ -421,10 +435,34 @@ static int alsa_close(struct snd_pcm_substream *substream) > return 0; > } > > +static int shbuf_setup_backstore(struct xen_snd_front_pcm_stream_info *stream, > + size_t buffer_sz) > +{ > + int i; > + > + stream->buffer_sz = buffer_sz; > + stream->buffer = alloc_pages_exact(stream->buffer_sz, GFP_KERNEL); > + if (!stream->buffer) > + return -ENOMEM; This keeps the NULL stream->buffer, and then the caller goes to the error path via stream_free() which will lead to an Oops due to the unconditional call of free_pages_exact(). thanks, Takashi