Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1721855pxb; Thu, 4 Nov 2021 07:21:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDOYcHodPXGbxlp20GJS6+Ml2G1PbnrwAlPSqhN2EKVcb7xAIDzOoipAMPiGKE2Z9KHCfX X-Received: by 2002:a17:907:160a:: with SMTP id hb10mr30413532ejc.83.1636035704602; Thu, 04 Nov 2021 07:21:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1636035704; cv=none; d=google.com; s=arc-20160816; b=xesfyRIV3+tu8m6bZ90B9C/DofR68gxfqmu97eUv3AJ5MJ1rA92iPgSNydp+4h8wM4 s0B7EEUQYw8GCMRq55PV8Dz8grblP+gHDXfSRdArcvZKCCniJDuyvfVq6de1ONlO2Fqa 6mR729PjZqJQ9A8Y1MlCNnqLXmkf34GorYbMaGeWBkZPKRMlR5QaistbC0fGUeqjEAAt BZOrudy5OcVWclMpTzX2crArweq/2iz3pP4Ry/gHMAKpuKK7Fen4GLBx6n+RkzW5q1Xe zK7Tw0Z5UO6k1ecc6r0JpXdFrDonLbdwL6MVx6QZbYKRCTHlNupBPZWGptwQIPmKws77 hi4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XkskE8hzrxR9WaR3jhdl+jyBA7rkCoH7UcvMEp+UYjc=; b=aVnyaFsNigiRHK0uUz+k1oqgQLo+RHoPnZmChVzbk2PCn+bBuJSREnfsAqWlDpURMh I9XMUzkd61DKAjj1Bw8aH7Q5B1VbHuIZDPd7d17fabnF7i3w9w3bQOPfO0pUeLqua60a gawX1eBNJa49jQWWXH15PwnAfp3tLQvNXpdsJCEEowFaNf3SInxZKqoTU7vdoFzq96o5 bhxRQGS+X75GmJXS3qKIM8G8Rec0HT/t4UTNW78YxXQVMRFmURStclZaEKo1Gzo9Xlyn 0dYjVb6oriol4EqdEvfnaFJ09R7T+c/wXXefrrEPiLPcUhWLCDYgD18WQLVhiRKUIVbQ C8aA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1l3s7IIj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si9207170eje.551.2021.11.04.07.21.19; Thu, 04 Nov 2021 07:21:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=1l3s7IIj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232178AbhKDOS5 (ORCPT + 99 others); Thu, 4 Nov 2021 10:18:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:46942 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231907AbhKDOSH (ORCPT ); Thu, 4 Nov 2021 10:18:07 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A84A2611C1; Thu, 4 Nov 2021 14:15:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1636035329; bh=KBS5cCcDri9mNnZSvPHaeLczQvE7qpM6WuPZRPxtSuY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1l3s7IIjd4UhAs3Om/TxImw6X0brxBl4VkNdTGnJgk9epKUR+TYd21WhK99QT2ZFp FfsgHfQBCNLg49Y/7qNQpoCaiAY44gGCywJlz2dKDywpQn/M41EIbUCn1sciFD2ZpU gJcsCkvjtEuymzxZUFk5zxw72vSaWHCzToxpR+cs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Christian=20K=C3=B6nig?= , "Erhard F." , Huang Rui Subject: [PATCH 5.10 12/16] Revert "drm/ttm: fix memleak in ttm_transfered_destroy" Date: Thu, 4 Nov 2021 15:12:51 +0100 Message-Id: <20211104141159.995038999@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211104141159.561284732@linuxfoundation.org> References: <20211104141159.561284732@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Greg Kroah-Hartman This reverts commit c21b4002214c1c7e7b627b9b53375612f7aab6db which is commit 0db55f9a1bafbe3dac750ea669de9134922389b5 upstream. Seems that the older kernels can not handle this fix because, to quote Christian: The problem is this memory leak could potentially happen with 5.10 as wel, just much much much less likely. But my guess is that 5.10 is so buggy that when the leak does NOT happen we double free and obviously causing a crash. So it needs to be reverted. Link: https://lore.kernel.org/r/1a1cc125-9314-f569-a6c4-40fc4509a377@amd.com Cc: Christian König Cc: Erhard F. Cc: Erhard F. Cc: Huang Rui Signed-off-by: Greg Kroah-Hartman --- drivers/gpu/drm/ttm/ttm_bo_util.c | 1 - 1 file changed, 1 deletion(-) --- a/drivers/gpu/drm/ttm/ttm_bo_util.c +++ b/drivers/gpu/drm/ttm/ttm_bo_util.c @@ -322,7 +322,6 @@ static void ttm_transfered_destroy(struc struct ttm_transfer_obj *fbo; fbo = container_of(bo, struct ttm_transfer_obj, base); - dma_resv_fini(&fbo->base.base._resv); ttm_bo_put(fbo->bo); kfree(fbo); }