Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2563936imu; Thu, 29 Nov 2018 06:59:07 -0800 (PST) X-Google-Smtp-Source: AFSGD/WghPUKP8k+Mzj0rlayfdIW9N1PoyMZZvAVVL0eMRML7EJpXaj6TBJSHmO/qp9bCamclnBi X-Received: by 2002:a63:4926:: with SMTP id w38mr1432537pga.353.1543503546978; Thu, 29 Nov 2018 06:59:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543503546; cv=none; d=google.com; s=arc-20160816; b=Oz1QhrXZ1rE63kPhPupk5GTcRczV57dz/63Trg8tQc32i5avs1uTlUr2SEDou39T+5 EWJ1iwX7xWI/7/PPtpw13f7a0TF5do1IARG4AGwJtTvOPCkk7ZvgciBUO2MfhyPChdsD AMblZkblWntaYldX8E4HKUgwetzbws8yKX1DCKI8ZRMQZsE1CjpFa3rkBxrL9yqPk9fO /eENaaeRo1lYPw1pfoO0XYav6P1aVPLpOzc550leEDYHhl/tYE+qO2B6r4mFtpWVlrqK /zpDzQ7AKhKzQx2w4IYniAdUbfsf5FJNufo8W/wVC/W+OC0+BsxvUDeNdfUF3MF1X1SE UjUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9mI6GRWab6PeiMN/tLMDUD7e1UbSEtZAJRLDCZIvfOw=; b=cj80zCbII+hpCREZt3NydmdOul5Ba1WED/4EtkzEurn4ibzBjGDx3KXMNAnotEVF6F Bbu7y2/rtDoPXDdc7EajTNHHwOVmiuLbpgrLLCoKw+qFL1L0OUzfbzWcpsXG3hyaHMZX 7VT0R9TSSRACmSijxHs+dDaCBByW650W0nLcP78DF9ELJyTgswgNp0kcdPzlF0TO3U6D O6t4A8RndfvUL9g6cGgQEsDT3j/ZD3uynxaZOJIf40gyUvew6o6L+57D9+OSzlp0YIHi tnFITY8itVdFLJ9VFKsbid4KYt74TVf+ItqsCBLzqPEGGztnw5hOeV3iDsNtwqfU7v00 ubBg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="HL+7N80/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e8si2081770pgn.325.2018.11.29.06.58.46; Thu, 29 Nov 2018 06:59:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="HL+7N80/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731319AbeK3BZw (ORCPT + 99 others); Thu, 29 Nov 2018 20:25:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:49346 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728855AbeK3BZv (ORCPT ); Thu, 29 Nov 2018 20:25:51 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 70103205C9; Thu, 29 Nov 2018 14:20:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543501220; bh=35bDtTHkNOuH9vtegi14pWJJgSx1PrHTgLBhMKpaHqI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=HL+7N80/W4KEBhS99eRmLf1QObdGJ+5cm5zjiA3vvkvQ3uwuVUDtC3yBQwYWoQM1O sA7vWEP+RlbxrAoJGKLtBUcNuFoEdWo9eDTFc/oD2dIHkRETF+g2cNqoAi/TObqk60 5YM08cQUK5flStXjQtJn65JAKMFcrcmor8JcUs5Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sahitya Tummala , Subhash Jadavani , "Martin K. Petersen" , Amit Pundir Subject: [PATCH 4.4 76/86] scsi: ufshcd: release resources if probe fails Date: Thu, 29 Nov 2018 15:12:41 +0100 Message-Id: <20181129140116.004356968@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181129140109.832117862@linuxfoundation.org> References: <20181129140109.832117862@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Subhash Jadavani commit afa3dfd42d205b106787476647735aa1de1a5d02 upstream. If ufshcd pltfrm/pci driver's probe fails for some reason then ensure that scsi host is released to avoid memory leak but managed memory allocations (via devm_* calls) need not to be freed explicitly on probe failure as memory allocated with these functions is automatically freed on driver detach. Reviewed-by: Sahitya Tummala Signed-off-by: Subhash Jadavani Signed-off-by: Martin K. Petersen Signed-off-by: Amit Pundir Signed-off-by: Greg Kroah-Hartman --- drivers/scsi/ufs/ufshcd-pci.c | 2 ++ drivers/scsi/ufs/ufshcd-pltfrm.c | 5 +---- drivers/scsi/ufs/ufshcd.c | 3 --- 3 files changed, 3 insertions(+), 7 deletions(-) --- a/drivers/scsi/ufs/ufshcd-pci.c +++ b/drivers/scsi/ufs/ufshcd-pci.c @@ -104,6 +104,7 @@ static void ufshcd_pci_remove(struct pci pm_runtime_forbid(&pdev->dev); pm_runtime_get_noresume(&pdev->dev); ufshcd_remove(hba); + ufshcd_dealloc_host(hba); } /** @@ -147,6 +148,7 @@ ufshcd_pci_probe(struct pci_dev *pdev, c err = ufshcd_init(hba, mmio_base, pdev->irq); if (err) { dev_err(&pdev->dev, "Initialization failed\n"); + ufshcd_dealloc_host(hba); return err; } --- a/drivers/scsi/ufs/ufshcd-pltfrm.c +++ b/drivers/scsi/ufs/ufshcd-pltfrm.c @@ -161,7 +161,7 @@ static int ufshcd_populate_vreg(struct d if (ret) { dev_err(dev, "%s: unable to find %s err %d\n", __func__, prop_name, ret); - goto out_free; + goto out; } vreg->min_uA = 0; @@ -183,9 +183,6 @@ static int ufshcd_populate_vreg(struct d goto out; -out_free: - devm_kfree(dev, vreg); - vreg = NULL; out: if (!ret) *out_vreg = vreg; --- a/drivers/scsi/ufs/ufshcd.c +++ b/drivers/scsi/ufs/ufshcd.c @@ -5385,8 +5385,6 @@ void ufshcd_remove(struct ufs_hba *hba) ufshcd_disable_intr(hba, hba->intr_mask); ufshcd_hba_stop(hba); - scsi_host_put(hba->host); - ufshcd_exit_clk_gating(hba); if (ufshcd_is_clkscaling_enabled(hba)) devfreq_remove_device(hba->devfreq); @@ -5733,7 +5731,6 @@ exit_gating: ufshcd_exit_clk_gating(hba); out_disable: hba->is_irq_enabled = false; - scsi_host_put(host); ufshcd_hba_exit(hba); out_error: return err;