Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1122204ybe; Fri, 13 Sep 2019 11:22:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqzoMXEzVtxgHrQpJxIkZkwjOpxC7TdFVwTO/RAqhjc/kpuw7h6LaMT6Vh/rcUhQG7FsTiqW X-Received: by 2002:a17:906:a416:: with SMTP id l22mr39406174ejz.302.1568398926715; Fri, 13 Sep 2019 11:22:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568398926; cv=none; d=google.com; s=arc-20160816; b=MjpB6dydtE93I8KuV3RTlnemfVsx/zumcaM8kav1K/hb9NbP8tEgHx2nKa8H2p2e+t /pngdcRcgmLPltoH0VR5e6Rf1FmKh5lcm7gdwjAN8W+hwBwzY6kKl98+AcyP1+TqDt/c lW0HgZzWgO3R3QNm3rcdOiKM9manvrD+CWYdZJENFR6A1BgiSbEJJufd6UhtdOPC3fSK jyviICiXw4bO3laj2qt8Sbh/JozVLs55CbvGiNC04zE7bFppSZ9FQy28c5HXAmuEgSgc esdwF0lho7KFmvs9HwmInPL5fRXS8zvEyL6XWktxyN2idK7cYoJuf5P7QkTj5Htlzb0I oWrQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=yX0nYXu+YGPeBkOqS9KRsmPpDqT2Wrqc3D3YFScgrNE=; b=UOV1TPDYkHOia4D197JALEaUTWKc1zF4suO21jmlX5jveEiD0d6/deOu3XwLJQpPmg EFJVvQhdtutIEh6SQONHAo8DLr2TbVGs/qw0Ok/45sT2WTVq26W48uXZH/jdLAUlZ5Xd 0hPJSesq3sDFBmDggHEnfHAhAC2QZV2VPMWQHKgrSfBFLibViaKEXxWR12tn39Px8Yo9 E0FfcJpbiqBdJSCIfjVQCEoc/C+nzDEpKjY/zSAREONpxi0sQEs6lMeF2GohYgF1x3d0 K56Rv8Cb8ykd4DiPkQDy36oTcQe9WMrL63Sn15RJxBMud8ee+JJghTRM82usym86emCi Qu3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KOQknCS+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y19si9626950edr.66.2019.09.13.11.21.43; Fri, 13 Sep 2019 11:22:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KOQknCS+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389781AbfIMNQB (ORCPT + 99 others); Fri, 13 Sep 2019 09:16:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:42420 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388840AbfIMNP6 (ORCPT ); Fri, 13 Sep 2019 09:15:58 -0400 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F2C3C20717; Fri, 13 Sep 2019 13:15:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568380557; bh=OeulC7b3Le43kz19Ae1KprA2gYrU0Em+iQ2JG0JxJr4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KOQknCS+99aLB8rIyyCMdLjjmNAanT/eEFqiNUwVWk0RxWeGFePDtd1sOQEpsrSLq /8EvSDA4D/BK4BO0CiYdZSaD1tO+FetB2JYDMnWgk+ysnAG+0udfphjL6z3wQFVJi1 hJuRt2efJuuFOcp9vprOw+GIOoWuj9xBlqiV9rYw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Bjorn Andersson , Lorenzo Pieralisi , Stanimir Varbanov , Sasha Levin Subject: [PATCH 4.19 103/190] PCI: qcom: Fix error handling in runtime PM support Date: Fri, 13 Sep 2019 14:05:58 +0100 Message-Id: <20190913130607.851753673@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190913130559.669563815@linuxfoundation.org> References: <20190913130559.669563815@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 6e5da6f7d82474e94c2d4a38cf9ca4edbb3e03a0 ] The driver does not cope with the fact that probe can fail in a number of cases after enabling runtime PM on the device; this results in warnings about "Unbalanced pm_runtime_enable". Furthermore if probe fails after invoking qcom_pcie_host_init() the power-domain will be left referenced. As it is not possible for the error handling in qcom_pcie_host_init() to handle errors happening after returning from that function the pm_runtime_get_sync() is moved to qcom_pcie_probe() as well. Fixes: 854b69efbdd2 ("PCI: qcom: add runtime pm support to pcie_port") Signed-off-by: Bjorn Andersson [lorenzo.pieralisi@arm.com: updated commit log] Signed-off-by: Lorenzo Pieralisi Acked-by: Stanimir Varbanov Signed-off-by: Sasha Levin --- drivers/pci/controller/dwc/pcie-qcom.c | 56 ++++++++++++++++++-------- 1 file changed, 39 insertions(+), 17 deletions(-) diff --git a/drivers/pci/controller/dwc/pcie-qcom.c b/drivers/pci/controller/dwc/pcie-qcom.c index 87a8887fd4d3e..79f06c76ae071 100644 --- a/drivers/pci/controller/dwc/pcie-qcom.c +++ b/drivers/pci/controller/dwc/pcie-qcom.c @@ -1091,7 +1091,6 @@ static int qcom_pcie_host_init(struct pcie_port *pp) struct qcom_pcie *pcie = to_qcom_pcie(pci); int ret; - pm_runtime_get_sync(pci->dev); qcom_ep_reset_assert(pcie); ret = pcie->ops->init(pcie); @@ -1128,7 +1127,6 @@ err_disable_phy: phy_power_off(pcie->phy); err_deinit: pcie->ops->deinit(pcie); - pm_runtime_put(pci->dev); return ret; } @@ -1218,6 +1216,12 @@ static int qcom_pcie_probe(struct platform_device *pdev) return -ENOMEM; pm_runtime_enable(dev); + ret = pm_runtime_get_sync(dev); + if (ret < 0) { + pm_runtime_disable(dev); + return ret; + } + pci->dev = dev; pci->ops = &dw_pcie_ops; pp = &pci->pp; @@ -1227,44 +1231,56 @@ static int qcom_pcie_probe(struct platform_device *pdev) pcie->ops = of_device_get_match_data(dev); pcie->reset = devm_gpiod_get_optional(dev, "perst", GPIOD_OUT_LOW); - if (IS_ERR(pcie->reset)) - return PTR_ERR(pcie->reset); + if (IS_ERR(pcie->reset)) { + ret = PTR_ERR(pcie->reset); + goto err_pm_runtime_put; + } res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "parf"); pcie->parf = devm_ioremap_resource(dev, res); - if (IS_ERR(pcie->parf)) - return PTR_ERR(pcie->parf); + if (IS_ERR(pcie->parf)) { + ret = PTR_ERR(pcie->parf); + goto err_pm_runtime_put; + } res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "dbi"); pci->dbi_base = devm_pci_remap_cfg_resource(dev, res); - if (IS_ERR(pci->dbi_base)) - return PTR_ERR(pci->dbi_base); + if (IS_ERR(pci->dbi_base)) { + ret = PTR_ERR(pci->dbi_base); + goto err_pm_runtime_put; + } res = platform_get_resource_byname(pdev, IORESOURCE_MEM, "elbi"); pcie->elbi = devm_ioremap_resource(dev, res); - if (IS_ERR(pcie->elbi)) - return PTR_ERR(pcie->elbi); + if (IS_ERR(pcie->elbi)) { + ret = PTR_ERR(pcie->elbi); + goto err_pm_runtime_put; + } pcie->phy = devm_phy_optional_get(dev, "pciephy"); - if (IS_ERR(pcie->phy)) - return PTR_ERR(pcie->phy); + if (IS_ERR(pcie->phy)) { + ret = PTR_ERR(pcie->phy); + goto err_pm_runtime_put; + } ret = pcie->ops->get_resources(pcie); if (ret) - return ret; + goto err_pm_runtime_put; pp->ops = &qcom_pcie_dw_ops; if (IS_ENABLED(CONFIG_PCI_MSI)) { pp->msi_irq = platform_get_irq_byname(pdev, "msi"); - if (pp->msi_irq < 0) - return pp->msi_irq; + if (pp->msi_irq < 0) { + ret = pp->msi_irq; + goto err_pm_runtime_put; + } } ret = phy_init(pcie->phy); if (ret) { pm_runtime_disable(&pdev->dev); - return ret; + goto err_pm_runtime_put; } platform_set_drvdata(pdev, pcie); @@ -1273,10 +1289,16 @@ static int qcom_pcie_probe(struct platform_device *pdev) if (ret) { dev_err(dev, "cannot initialize host\n"); pm_runtime_disable(&pdev->dev); - return ret; + goto err_pm_runtime_put; } return 0; + +err_pm_runtime_put: + pm_runtime_put(dev); + pm_runtime_disable(dev); + + return ret; } static const struct of_device_id qcom_pcie_match[] = { -- 2.20.1