From mboxrd@z Thu Jan 1 00:00:00 1970 From: Jiri Slaby Subject: Re: [RFC] sdhci: fix DMA leaks [was: [SHDCI] Heavy (thousands) DMA leaks] Date: Thu, 6 Aug 2015 11:06:45 +0200 Message-ID: <55C323A5.6050303@suse.cz> References: <55B9EF02.7040404@suse.cz> <55BF36D6.4080504@suse.cz> <55C1F919.4080002@suse.cz> <55C227B4.3030102@suse.cz> Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org To: Chen Bough , Ulf Hansson Cc: "linux-mmc@vger.kernel.org" , Linux kernel mailing list List-Id: linux-mmc@vger.kernel.org On 08/06/2015, 09:42 AM, Chen Bough wrote: > I read your attached log and patch, yes, dma memory leak will happen when > more than one pre_request execute. The method of ++next->cookie is not good, > your patch seems good, but I still need some time to test the patch, because > you unmap the dma in sdhci_finish_data rather than the sdhci_post_req. Hi, yes, this is not correct. We can perhaps differentiate according to the COOKIE value. Should I fix it or are you going to prepare a patch based on my RFC? thanks, -- js suse labs