Message ID | 1695973360-14369-1-git-send-email-quic_ekangupt@quicinc.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:cae8:0:b0:403:3b70:6f57 with SMTP id r8csp3857891vqu; Fri, 29 Sep 2023 01:08:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHePzw9Nl7t9/AgAI6/oqcxTGBgl4u+b8DjaeEyo29H9T/0rnv9AgubKGqVOfvYp1yhrsnQ X-Received: by 2002:a05:6a21:3d8b:b0:14d:7b6:cf2f with SMTP id bj11-20020a056a213d8b00b0014d07b6cf2fmr3996260pzc.47.1695974923806; Fri, 29 Sep 2023 01:08:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695974923; cv=none; d=google.com; s=arc-20160816; b=c6myDpDv3joKK7GEoH01KwEgKv2F3VbMXu31Y/X1cQhLyGikqpThtKbWt6kXwl6jKO G0QGlrL/GnlR3Qeu6WEWDn/qGjNEgVRbjtDf51wg6ZtT5cSTqLmh1duK1ycuM2q+VFom 6oSqA6oLDUkQ/5ahRyVtf/PvlHhBJ5p3Mf3ZW30tRInzEm5by95B5BGCjVIF58bZEWIb ZWrAiQEsG77rghZ/7jr/9oITBIuRM5Q0UF4p5aVEVgiiChLI7dGomN1f16yqZLOJ3jeC W3gu6i10YWb+A892wGsyBSUX38i0+QaM5FqOQb0zM8n8b2h6QNt0B5D8RXs5yjjFYHDH 1EbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from :dkim-signature; bh=Zz59mZdc5Pusdp8B04rBQ0gXnQBxG2lAxGu36E4tWrg=; fh=IQ68kbvYFCSlyXdHKXkbdUfoRSl+ok1hAWwFRWAAo5U=; b=VB97kY/8zumqCuDvL+jUo0gvi0woJziaIAB0sRb+J5ZSW6jYTgi05XC6AZbyJas5ew qCxrKoM626k0k00wgubI3u9mY8m/mxbmyvFE8Ju91UCJQUef4dMRTHekcTcmLRMccqPE YB8sK5xIVMCbf6/K/gxCl4tv/Jj4hb3zIKkTgc0Vly3RT2ClSx28qUnWduM0omp/sxY0 o5v8DxkkC/boR/3Uy9rZmNLCRyAxJRSNPWCKZ2coHKUjbdsxDcuK1U7ArZNgb4l6xmDQ o6JiWoCeCPkW/nsnVgLslwVsnXoZEXakGGTRza9u5WNSqvrk8Aj0g1cazzksonqPZptg 3uZA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=BC1Eo1LQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id k190-20020a6384c7000000b005859ed0e6f4si1191601pgd.471.2023.09.29.01.08.43 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 29 Sep 2023 01:08:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=BC1Eo1LQ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id C5669804921C; Fri, 29 Sep 2023 00:42:57 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232621AbjI2Hmy (ORCPT <rfc822;pwkd43@gmail.com> + 20 others); Fri, 29 Sep 2023 03:42:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42852 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229754AbjI2Hmw (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 29 Sep 2023 03:42:52 -0400 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 482FE180; Fri, 29 Sep 2023 00:42:50 -0700 (PDT) Received: from pps.filterd (m0279873.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 38T7DfW1028785; Fri, 29 Sep 2023 07:42:48 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=qcppdkim1; bh=Zz59mZdc5Pusdp8B04rBQ0gXnQBxG2lAxGu36E4tWrg=; b=BC1Eo1LQv/2rtGVZK4yDnETXmeV7pl7bCz7gEPrQwXFRHtOc0DjjfyCn7lQW+hDak5Vt u+CL+2w4w75gEQTlwiqphso3Vc+G+/i5G0et/EyxFEqTY7VvnrEMntJgWlNI3831atjA OkBaJgBYNkxM0Z9k+7cr5t5wZIhBKkmPjzGFaDOhmQDxMb03oIRjabmM7IwuDAam78V4 ujzr0D1H7oeHJ1geVvB6MfG3jV2flPT/arbSGp6sw5Ioc+zDyN8dvxRnxfaZ8SlsHNGk gzAj1u18wyDDnV3btu11d7f4Vt8F6Ye6m/DVoxaY/PWGZumPzrxyhDAce/lXoJ/6Lt/i +g== Received: from nalasppmta02.qualcomm.com (Global_NAT1.qualcomm.com [129.46.96.20]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3td24uast9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Sep 2023 07:42:48 +0000 Received: from nalasex01b.na.qualcomm.com (nalasex01b.na.qualcomm.com [10.47.209.197]) by NALASPPMTA02.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 38T7glQV021063 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 29 Sep 2023 07:42:47 GMT Received: from ekangupt-linux.qualcomm.com (10.80.80.8) by nalasex01b.na.qualcomm.com (10.47.209.197) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.36; Fri, 29 Sep 2023 00:42:44 -0700 From: Ekansh Gupta <quic_ekangupt@quicinc.com> To: <srinivas.kandagatla@linaro.org>, <linux-arm-msm@vger.kernel.org> CC: Ekansh Gupta <quic_ekangupt@quicinc.com>, <ekangupt@qti.qualcomm.com>, <gregkh@linuxfoundation.org>, <linux-kernel@vger.kernel.org>, <fastrpc.upstream@qti.qualcomm.com> Subject: [PATCH v1 0/3] Add fixes for FastRPC driver Date: Fri, 29 Sep 2023 13:12:37 +0530 Message-ID: <1695973360-14369-1-git-send-email-quic_ekangupt@quicinc.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nalasex01b.na.qualcomm.com (10.47.209.197) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: SL3U3ePJ8NltjpQzUqSf-gSqcW-DcBvT X-Proofpoint-ORIG-GUID: SL3U3ePJ8NltjpQzUqSf-gSqcW-DcBvT X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.267,Aquarius:18.0.980,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-09-29_05,2023-09-28_03,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 clxscore=1015 malwarescore=0 suspectscore=0 impostorscore=0 lowpriorityscore=0 spamscore=0 priorityscore=1501 mlxscore=0 mlxlogscore=799 adultscore=0 bulkscore=0 phishscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2309180000 definitions=main-2309290064 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_BLOCKED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Fri, 29 Sep 2023 00:42:57 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778358601698151266 X-GMAIL-MSGID: 1778358601698151266 |
Series | Add fixes for FastRPC driver | |
Message
Ekansh Gupta
Sept. 29, 2023, 7:42 a.m. UTC
This patchset carries the following fixes. - Reset metadata buffer to avoid incorrect fd getting freed - Free DMA handles for remote calls with no arguments - Clean buffers on remote call failures Ekansh Gupta (3): misc: fastrpc: Reset metadata buffer to avoid incorrect free misc: fastrpc: Free DMA handles for RPC calls with no arguments misc: fastrpc: Clean buffers on remote invocation failures drivers/misc/fastrpc.c | 26 ++++++++++++-------------- 1 file changed, 12 insertions(+), 14 deletions(-)
Comments
On 29/09/2023 08:42, Ekansh Gupta wrote: > This patchset carries the following fixes. > - Reset metadata buffer to avoid incorrect fd getting freed > - Free DMA handles for remote calls with no arguments > - Clean buffers on remote call failures Bit of a nit pick here, but you should try and use the cover letter to explain the necessary context and justification for your series. An overview of the commits is already included below by b4 or git-send-email. It would be good to establish if these fixes are all related in some way (ie to enable a specific usecase), or if it's just a few random things that folks have discovered. Although it's almost always useful for maintainers to know how these issues where discovered as it could expose a gap in testing. Regards, > > Ekansh Gupta (3): > misc: fastrpc: Reset metadata buffer to avoid incorrect free > misc: fastrpc: Free DMA handles for RPC calls with no arguments > misc: fastrpc: Clean buffers on remote invocation failures > > drivers/misc/fastrpc.c | 26 ++++++++++++-------------- > 1 file changed, 12 insertions(+), 14 deletions(-) >
On Fri, 29 Sep 2023 13:12:37 +0530, Ekansh Gupta wrote: > This patchset carries the following fixes. > - Reset metadata buffer to avoid incorrect fd getting freed > - Free DMA handles for remote calls with no arguments > - Clean buffers on remote call failures > > Ekansh Gupta (3): > misc: fastrpc: Reset metadata buffer to avoid incorrect free > misc: fastrpc: Free DMA handles for RPC calls with no arguments > misc: fastrpc: Clean buffers on remote invocation failures > > [...] Applied, thanks! [1/3] misc: fastrpc: Reset metadata buffer to avoid incorrect free commit: c44e396924d307ba11974b5f131e956b789a6844 [2/3] misc: fastrpc: Free DMA handles for RPC calls with no arguments commit: 3f01aaeb9fd387108c04c4803b949b8cd84d43ff [3/3] misc: fastrpc: Clean buffers on remote invocation failures commit: 9fffb8240581927a71ed0ae46a5e269dbc0f3e3f Best regards,