From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-alma10-1.taild15c8.ts.net [100.103.45.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id BEE3037754D; Wed, 20 May 2026 17:27:55 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=100.103.45.18 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779298076; cv=none; b=ODx3BYbywcXA4Uv4kTwQq8hVwdWgTSwa1wieJ+wLf9mrt9dRORNrl5T7TTw2txuLreXMt4ikEfRmc4Oc0pLX8G29kFVVGTqGqAsMwIhkVE+0op45ko/7mk9cuNhdHg58M3Tql9GF6dWht63zLc/dsiWTDPe3rt34bBDOZIB1WDg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779298076; c=relaxed/simple; bh=LE98jFH8+ICaKGEzqQ0fZ4TtVx6Qe9DhYn5NMhXNSis=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=AxqGBifTvPYJIxVlBMhr5BY4JE5jmobNuHudw+OmUKl3c1B3kzmFjYwY3Z0eeDnv+c4YtVXgQ74ZVM2bj/5juaCZtzzXAkGFE1W9mDkPTY//hNBrtVWHCW9jVzhBRXHDYhA5ZU7xpjWGT/Vx286IdPqQGF+ArQBPX2VeSbFbtso= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=sfP5VEAj; arc=none smtp.client-ip=100.103.45.18 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="sfP5VEAj" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 2BB321F00893; Wed, 20 May 2026 17:27:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linuxfoundation.org; s=korg; t=1779298075; bh=GZ+ObSHamVwxpV6air7yEHlaoTbH8fzE/fnjyWMTr3M=; h=From:To:Cc:Subject:Date:In-Reply-To:References; b=sfP5VEAjpzk0rgomTVSP8iYdgwNxkSesvbjqOqXqlYA770AfvcNcKVG/WU7ol7P6e 4UbE1VISdZNXzveC4HGE0Ew4F0n1OxrE/TNpYZ6a7doI/KYRYeSOnMVa+jAebosTsX +dS7IsZXqmwmps1lAhFF3oV6i3fwrXKQafujOfdA= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Victoria Brekenfeld , Rob Clark , Sasha Levin Subject: [PATCH 6.18 274/957] drm/msm: Fix VM_BIND UNMAP locking Date: Wed, 20 May 2026 18:12:37 +0200 Message-ID: <20260520162140.484448708@linuxfoundation.org> X-Mailer: git-send-email 2.54.0 In-Reply-To: <20260520162134.554764788@linuxfoundation.org> References: <20260520162134.554764788@linuxfoundation.org> User-Agent: quilt/0.69 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: patches@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Rob Clark [ Upstream commit 85042c2cd970a6b0e686329387096fe19989ae62 ] Wrong argument meant that the objs involved in UNMAP ops were not always getting locked. Since _NO_SHARE objs share a common resv with the VM (which is always locked) this would only show up with non-_NO_SHARE BOs. Reported-by: Victoria Brekenfeld Fixes: 2e6a8a1fe2b2 ("drm/msm: Add VM_BIND ioctl") Closes: https://gitlab.freedesktop.org/drm/msm/-/issues/94 Signed-off-by: Rob Clark Patchwork: https://patchwork.freedesktop.org/patch/713898/ Message-ID: <20260324220519.1221471-2-robin.clark@oss.qualcomm.com> Signed-off-by: Sasha Levin --- drivers/gpu/drm/msm/msm_gem_vma.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/gpu/drm/msm/msm_gem_vma.c b/drivers/gpu/drm/msm/msm_gem_vma.c index 44bcc2b291e47..9016ef978be5e 100644 --- a/drivers/gpu/drm/msm/msm_gem_vma.c +++ b/drivers/gpu/drm/msm/msm_gem_vma.c @@ -1232,7 +1232,7 @@ vm_bind_job_lock_objects(struct msm_vm_bind_job *job, struct drm_exec *exec) case MSM_VM_BIND_OP_UNMAP: ret = drm_gpuvm_sm_unmap_exec_lock(job->vm, exec, op->iova, - op->obj_offset); + op->range); break; case MSM_VM_BIND_OP_MAP: case MSM_VM_BIND_OP_MAP_NULL: { -- 2.53.0