Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1590669ybv; Thu, 20 Feb 2020 23:52:47 -0800 (PST) X-Google-Smtp-Source: APXvYqzZQg1vCCPksHGQJ34EDgbjwEp26nghUHjCO2WOzKvy86EglqCCOUBsgD84gzvc4FFU2+OO X-Received: by 2002:a9d:470a:: with SMTP id a10mr27771812otf.370.1582271567076; Thu, 20 Feb 2020 23:52:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271567; cv=none; d=google.com; s=arc-20160816; b=moUY+DG2oX3ScTSTE97/BD9RzfeVgsnXN7mucfWfLsrlxxpODxF/PpmzoxrQZcynj9 ZA+jGter1PqU3M0HYFxJaDD+UDKrXLZoK5dWPG1Vk9+yEHxvHeLtO02MIwZSNCxazbvm ebNbnOILSFHLuir7z65R79SQ0xPaH+P6uHMRV/47+TD4khQl/kekfmh978UX7f1oSsA4 9HSAKT+guBXM3+ZEEF5v3/ZlTBluxwwJggRV3TaFSil/qHB1+sD74Hh9bxfEsfrCyCFx 5rFGWXVbdgF4ab89JFzTCujgYLayssN6Hvdndp0OcB8l24qZ1pEJOJgo/rNOn4b/WT21 c9UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tfubMQcbHKjpkuIf43Hyujjip4Lyt88z8t2QkbaRpOs=; b=zRa6zY3vuZugNTyV58SkZupXUaTDd4TC+vMBZz2hIRSPnaEZU/ll7k0Q3OjkR++Xqo plnuzuLtVwA2nG5uJ+Qz6gecjN7hbrv5EYkn9uD6xPB90ers8pjzmKgus/+TyP1DhJ41 Y2r0XTqUprJJuO0WC9f3VFoggf/pKVvoJCqb8ZXUluegNNtJNMNFnNA7/n51xs0t7bkI r1CYLnp9oW3nw439+0SIvJcpsNN20qtSSXFl8G6jGUahj/RiuX/r5yNyDD0r3FIr7wq4 JxLlpXewJXcCPYz/ujXa4VkUEgi6YHUVQ3iIJLMpoNh5dMVwxNs0cKHe9ydFZbO5anLe 6N9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="vTbhc/JN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15si1074061otm.263.2020.02.20.23.52.35; Thu, 20 Feb 2020 23:52:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="vTbhc/JN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729771AbgBUHve (ORCPT + 99 others); Fri, 21 Feb 2020 02:51:34 -0500 Received: from mail.kernel.org ([198.145.29.99]:48886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729326AbgBUHvc (ORCPT ); Fri, 21 Feb 2020 02:51:32 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AA8A120801; Fri, 21 Feb 2020 07:51:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271491; bh=Cnisj9RKGQR/FA7XIim+1rtIYd3BMtJlvkxzs51h6yw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vTbhc/JNDPIfUf29GP/E/sm+8O9fOiVV/RngVp5FdkxuJzZoH2aKSsAMKIj+YmJSa avT1qY61+5mG9LRgZa4ocJdwVUJUGlVYvHwjNwhfN+XKlZRXd3RrpiucmZ5Tg3DXJn 8SfC+JszwZoGNYifwk/uRWB8AULVAcG5KeXiTp/Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sascha Hauer , Robin Gong , Vinod Koul , Sasha Levin Subject: [PATCH 5.5 185/399] dmaengine: imx-sdma: Fix memory leak Date: Fri, 21 Feb 2020 08:38:30 +0100 Message-Id: <20200221072420.786249017@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sascha Hauer [ Upstream commit 02939cd167095f16328a1bd5cab5a90b550606df ] The current descriptor is not on any list of the virtual DMA channel. Once sdma_terminate_all() is called when a descriptor is currently in flight then this one is forgotten to be freed. We have to call vchan_terminate_vdesc() on this descriptor to re-add it to the lists. Now that we also free the currently running descriptor we can (and actually have to) remove the current descriptor from its list also for the cyclic case. Signed-off-by: Sascha Hauer Reviewed-by: Robin Gong Tested-by: Robin Gong Link: https://lore.kernel.org/r/20191216105328.15198-10-s.hauer@pengutronix.de Signed-off-by: Vinod Koul Signed-off-by: Sasha Levin --- drivers/dma/imx-sdma.c | 19 +++++++++++-------- 1 file changed, 11 insertions(+), 8 deletions(-) diff --git a/drivers/dma/imx-sdma.c b/drivers/dma/imx-sdma.c index c27e206a764c3..66f1b2ac5cde4 100644 --- a/drivers/dma/imx-sdma.c +++ b/drivers/dma/imx-sdma.c @@ -760,12 +760,8 @@ static void sdma_start_desc(struct sdma_channel *sdmac) return; } sdmac->desc = desc = to_sdma_desc(&vd->tx); - /* - * Do not delete the node in desc_issued list in cyclic mode, otherwise - * the desc allocated will never be freed in vchan_dma_desc_free_list - */ - if (!(sdmac->flags & IMX_DMA_SG_LOOP)) - list_del(&vd->node); + + list_del(&vd->node); sdma->channel_control[channel].base_bd_ptr = desc->bd_phys; sdma->channel_control[channel].current_bd_ptr = desc->bd_phys; @@ -1071,7 +1067,6 @@ static void sdma_channel_terminate_work(struct work_struct *work) spin_lock_irqsave(&sdmac->vc.lock, flags); vchan_get_all_descriptors(&sdmac->vc, &head); - sdmac->desc = NULL; spin_unlock_irqrestore(&sdmac->vc.lock, flags); vchan_dma_desc_free_list(&sdmac->vc, &head); sdmac->context_loaded = false; @@ -1080,11 +1075,19 @@ static void sdma_channel_terminate_work(struct work_struct *work) static int sdma_disable_channel_async(struct dma_chan *chan) { struct sdma_channel *sdmac = to_sdma_chan(chan); + unsigned long flags; + + spin_lock_irqsave(&sdmac->vc.lock, flags); sdma_disable_channel(chan); - if (sdmac->desc) + if (sdmac->desc) { + vchan_terminate_vdesc(&sdmac->desc->vd); + sdmac->desc = NULL; schedule_work(&sdmac->terminate_worker); + } + + spin_unlock_irqrestore(&sdmac->vc.lock, flags); return 0; } -- 2.20.1