Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp1713352ybg; Sat, 19 Oct 2019 00:54:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqxIhxQlY7l9BNKlrE/WgwZbzkxiWFvt2WGRjNq84lOc0aPh7KyPQmljmMLY6V/I8AvHJZ/F X-Received: by 2002:a17:906:181b:: with SMTP id v27mr12772389eje.117.1571471673835; Sat, 19 Oct 2019 00:54:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571471673; cv=none; d=google.com; s=arc-20160816; b=CHcz+//QnwODCh3ucUdEHJRaIe5K8vvwo7WCkyCLfE6n+OjVxZvFNCKDl5p5sZILPh o6ze0UNYzqoKcvyzsehrk9NPMhm+0C8YI3sqdM5MzamZ8XcxuE4ClkTvnmDMblOVLEOc 0LWT9Eqt20pwEUm/+3VwdWczsgW+n6y85J9MHhu7D9apjNCshHwGPk+oCzks0odKai1u ybMIbdbHLfcBgFcAsH4EZzhwchAVntj6jU01x9BcKGt/9/MBrBoabGt4V68poKGsJUeV SgTEtCmjgth75V6iDNRKDnIioH2VzWB7qmK6hK8RZK2VFHyuqhxXVDJ6fY8aI9CfYyvN swCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=HsXiWb0X74K6PlgnWc/J7S8C321FwbGGe+u8vjhldks=; b=TeMiLp78iNrAOLimfWyvfCfyL+LNCthiSFETnbFRxHSmfBzCOrk92Zhj/TBbDpWu2c bPYdLtpO1qF3A71m1Z3++vHRkw7VJPQDNUpLcayAPwWz+OMtNL9duSjFe/rE/LAYoK97 H0zQf/5tEKamSKC/l6iDpKKa0X1kilo3Z3xyVbVC6xfKB8BRFn0USVS/AVBorA9+XrJ/ +kKG6r5pASqusqErlt7b/GXPXFxKEQ/43KIaBX4J+VP1VZc3vahtdZDI4QY1QkNBgwyX /DHUIbh7tfspsq+Gas6XM4b4cskfChM9qV9//zB2dr5UKWFJOY4zdsUBMl53xmJmYvAS G7TQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jruileM5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id pw26si127736ejb.88.2019.10.19.00.54.10; Sat, 19 Oct 2019 00:54:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=jruileM5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405397AbfJRH7A (ORCPT + 99 others); Fri, 18 Oct 2019 03:59:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:38358 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728064AbfJRH7A (ORCPT ); Fri, 18 Oct 2019 03:59:00 -0400 Received: from localhost (unknown [106.200.243.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DED7D21897; Fri, 18 Oct 2019 07:58:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1571385539; bh=r9mIGNyICLZKduhVIr2wJ2+qRiOFioKTV4sTZSUNf3A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=jruileM5WG9ou5fFTu2c50e/SsvPW9vAVRA2x9RoEOb9Xpg7VC5on6WTuJSFi6umb /X4BOrkAB4MfipWflUnbeusBocDcFdDOqwKHMdbsFc65EFdd49YwfygMv/1RpTh/6H zB06aBSif9CCW1lX9f4mdX4IMw7fniSfNJh8AEUw= Date: Fri, 18 Oct 2019 13:28:55 +0530 From: Vinod Koul To: Jeffrey Hugo Cc: agross@kernel.org, bjorn.andersson@linaro.org, dan.j.williams@intel.com, linux-arm-msm@vger.kernel.org, dmaengine@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] dmaengine: qcom: bam_dma: Fix resource leak Message-ID: <20191018075855.GP2654@vkoul-mobl> References: <20191017152606.34120-1-jeffrey.l.hugo@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191017152606.34120-1-jeffrey.l.hugo@gmail.com> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 17-10-19, 08:26, Jeffrey Hugo wrote: > bam_dma_terminate_all() will leak resources if any of the transactions are > committed to the hardware (present in the desc fifo), and not complete. > Since bam_dma_terminate_all() does not cause the hardware to be updated, > the hardware will still operate on any previously committed transactions. > This can cause memory corruption if the memory for the transaction has been > reassigned, and will cause a sync issue between the BAM and its client(s). > > Fix this by properly updating the hardware in bam_dma_terminate_all(). Applied and marked stable, thanks -- ~Vinod