Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp859458ybz; Sat, 25 Apr 2020 05:57:47 -0700 (PDT) X-Google-Smtp-Source: APiQypKoHZDkzZL+z0+I99QJbqPYbOx/5S4bsfAAydbUlEuAXE95NPQpeXaPCQJqgmVnG94KrgcP X-Received: by 2002:aa7:c0d2:: with SMTP id j18mr11726084edp.283.1587819466905; Sat, 25 Apr 2020 05:57:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587819466; cv=none; d=google.com; s=arc-20160816; b=twqmWBXwMTAhfDOO52p7DjHa1/hEwadtZsR1m5tPW7t+sIP1V97gmspaEGmaaNp8DN V08c3Mc6lmaPb1liq1RwSh6AU7FSgLAxDweHLxksYL9Pt8Ucs6V/HhqPQFdA0F5j20if 8gVQgl/zGwFu9caCwLUbC2uR+VfAucVngTv2tjlfudLjDRuwUdQeUTk5Uv7SMZExnmJ8 XBpcnLIHnzgPX7PrsY7+0tlGAa0XBguKLrgpD8+iVlFZUdWXv3RUlGyWwX/lfSLUNvt1 t8MMreSgD63ZBt9H88O9YDhIu9N2olYK6YAKfCIAEAKnQ6eSpKz6Zu5pdgItBvQDkvWr wISQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=johz7ezEhkI1R++xhPEgeFcUv28KqNL7JOn5MDPRhlk=; b=Hywafhan7aLz9XHssslaJDEi/LORGSGf+aJvwfc4+WltwyBeAoJavvW9Yexxt0RvNF gIQD8D4ap6oYvpyOlc+kycIOSkqdAoo9bC6qoTeZ0Vdvh69bifxPiKYCO7uH17b18JDR JI/3HZY3l8WR+z0s9H2ZQvp+x4/xStGT9Rz0B34dg51c+IHU8bwMbSa1NCWiD3xIViN8 MkXdRtTjSvq/nQ99vkaNkeI0JpPRZxaFBKrpBWGiYWpGBpTy7VyJoxPRR7gMo5ZCZipW yK/HW5Z6U4pAwKVpQOSMI32fgjryAKn4IinJAmzquMLeH0SE8Is8pFO6NQgGZFJr6xDB a2Kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=dD8DUw+v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gh8si5038055ejb.301.2020.04.25.05.57.23; Sat, 25 Apr 2020 05:57:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=dD8DUw+v; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726177AbgDYMyg (ORCPT + 99 others); Sat, 25 Apr 2020 08:54:36 -0400 Received: from mail.fudan.edu.cn ([202.120.224.10]:38425 "EHLO fudan.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726060AbgDYMyg (ORCPT ); Sat, 25 Apr 2020 08:54:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fudan.edu.cn; s=dkim; h=Received:From:To:Cc:Subject:Date: Message-Id; bh=johz7ezEhkI1R++xhPEgeFcUv28KqNL7JOn5MDPRhlk=; b=d D8DUw+viibmUZm5PP8JEIAolLCWyk3njOqMhSzngIu1I7TJFmhNS9SCNuhF7Tvi9 n1kSwYBadRdIIFcaCz6OZpAj3Y/QcVmRxGygdblCpTP+qffosZfULnQmaEWEu8oF EAxbdD44guGglHl5iEDiBvUsBWnvYXxplnQXCtnkVw= Received: from localhost.localdomain (unknown [120.229.255.80]) by app1 (Coremail) with SMTP id XAUFCgAnLsb_MqRehWmNAA--.2704S3; Sat, 25 Apr 2020 20:54:24 +0800 (CST) From: Xiyu Yang To: Ulf Hansson , =?UTF-8?q?Andreas=20F=C3=A4rber?= , Manivannan Sadhasivam , linux-mmc@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: yuanxzhang@fudan.edu.cn, kjlu@umn.edu, Xiyu Yang , Xin Tan Subject: [PATCH] mmc: owl-mmc: Fix dma_chan refcnt leak in owl_mmc_probe() Date: Sat, 25 Apr 2020 20:53:45 +0800 Message-Id: <1587819225-38916-1-git-send-email-xiyuyang19@fudan.edu.cn> X-Mailer: git-send-email 2.7.4 X-CM-TRANSID: XAUFCgAnLsb_MqRehWmNAA--.2704S3 X-Coremail-Antispam: 1UD129KBjvJXoW7CFWUCw4kJF13uF13XF1fZwb_yoW8ur1kpF WfG3yfKrW8KF45trZxGa18XF1Fqr4Ik34xKayDGw1rZ390q39FyF13CFyFgF1rJFykJwn2 9F1jgr4rZFyDuw7anT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9K14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26rxl 6s0DM28EF7xvwVC2z280aVAFwI0_GcCE3s1l84ACjcxK6I8E87Iv6xkF7I0E14v26rxl6s 0DM2vYz4IE04k24VAvwVAKI4IrM2AIxVAIcxkEcVAq07x20xvEncxIr21l5I8CrVACY4xI 64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r1Y6r17McIj6I8E87Iv67AKxVWUJVW8Jw Am72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41lF7I21c0EjII2zVCS5cI20VAG YxC7M4IIrI8v6xkF7I0E8cxan2IY04v7MxkIecxEwVAFwVW5JwCF04k20xvY0x0EwIxGrw CFx2IqxVCFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE 14v26r106r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkGc2Ij64vIr41lIxAIcVC0I7IYx2 IY67AKxVWUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Gr0_Cr1lIxAIcVCF04k26cxK x2IYs7xG6Fyj6rWUJwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14 v26r4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjfU5fHUUUUUU X-CM-SenderInfo: irzsiiysuqikmy6i3vldqovvfxof0/ Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org owl_mmc_probe() invokes dma_request_chan(), which returns a reference of the specified dma_chan object to "owl_host->dma" with increased refcnt. When owl_mmc_probe() encounters error, it calls mmc_free_host() to free the "mmc" memory. Since "owl_host" comes from one of "mmc" fields, this "free" behavior causes "owl_host" and "owl_host->dma" become invalid, so the refcount for its field should be decreased to keep refcount balanced before mmc_free_host() calls. The reference counting issue happens in several exception handling paths of owl_mmc_probe(). When those error scenarios occur such as failed to request irq, the function forgets to decrease the refcnt increased by dma_request_chan(), causing a refcnt leak. Fix this issue by jumping to "err_put_dma" label when those error scenarios occur. Signed-off-by: Xiyu Yang Signed-off-by: Xin Tan --- drivers/mmc/host/owl-mmc.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/mmc/host/owl-mmc.c b/drivers/mmc/host/owl-mmc.c index 01ffe51f413d..4dc72f5f32f5 100644 --- a/drivers/mmc/host/owl-mmc.c +++ b/drivers/mmc/host/owl-mmc.c @@ -635,7 +635,7 @@ static int owl_mmc_probe(struct platform_device *pdev) owl_host->irq = platform_get_irq(pdev, 0); if (owl_host->irq < 0) { ret = -EINVAL; - goto err_free_host; + goto err_put_dma; } ret = devm_request_irq(&pdev->dev, owl_host->irq, owl_irq_handler, @@ -643,19 +643,22 @@ static int owl_mmc_probe(struct platform_device *pdev) if (ret) { dev_err(&pdev->dev, "Failed to request irq %d\n", owl_host->irq); - goto err_free_host; + goto err_put_dma; } ret = mmc_add_host(mmc); if (ret) { dev_err(&pdev->dev, "Failed to add host\n"); - goto err_free_host; + goto err_put_dma; } dev_dbg(&pdev->dev, "Owl MMC Controller Initialized\n"); return 0; +err_put_dma: + if (owl_host->dma) + dma_release_channel(owl_host->dma); err_free_host: mmc_free_host(mmc); -- 2.7.4