Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp832613ybt; Fri, 26 Jun 2020 12:38:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwDmwgdQeECJ6hhFon80KXAUOYPcq+Ug0gliD4DaACgHGtA6SpcvML3BT90AHkO+gTnQ2aG X-Received: by 2002:a17:906:d92e:: with SMTP id rn14mr4239788ejb.314.1593200318116; Fri, 26 Jun 2020 12:38:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593200318; cv=none; d=google.com; s=arc-20160816; b=L220M6M3/ozW1d0AVW0ssn+AVTa8ZJzjSB1HDyKqNWBVGxu2JVzWO+jRflofN74UuE yMW0FvS2Mpsyqf9Pj7HICXz4XSw3q6EcgIhAiw/xtqSuJhbUTjMl8ZbeZxyBrLHFuEhR y8J1Kl6nGhGvTY1/dTDe/NSe+685hrhuzVJTCh9rwx+MN5j+/PqsWDOukqh0QdivzB30 BvS62PwSNsnNMXqN/XfqWY0Sp5L5HlZzNiP+iCRQ5A6PBG4qsf7hA/EkVZUNA1i2Y1Bg 2AG/MlktIJt25nQZqNjrGmbrJOptkHxemo2X3Ro3dZZTcfxCLalGW8ljMGKRmQC6+6hL YpIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=WgjW7rfa1U4n3GwKElHXXUqvf1UPVDJerDio41kTReA=; b=zoAA21Cfj4WsAvf6/WrVo5x+5t451NItYDlslEenfXVKkU/Do205g94v6g8agijL8n deABiZWVNnPfc7XzEt8OeH8pEJHnaKpJSgZCdJri2dGYJ1F9k1SGLfo0BoE7N2816E1z E/u/0ZBHrJ+2cQ+kp8pmv6yZ22T9NHEhsXrd+TZHcEE/uKZIqssTUYIQaXPdwjlH9udv 6D3JDWRlYT1luNfq9HhlD6J7W57Hg0PkyPuY9uIvtd+zL5uDA6BSD4uvKDf2uYXCM5Qm tT6O74UegafL6TJ4hAn5Vl/i1yfwsSfkTMADvgA70aLgSKsanDp3Ssj+yE4X8XNY0afh jgrA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mb7si11425250ejb.316.2020.06.26.12.38.14; Fri, 26 Jun 2020 12:38:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725781AbgFZTha (ORCPT + 99 others); Fri, 26 Jun 2020 15:37:30 -0400 Received: from smtp01.smtpout.orange.fr ([80.12.242.123]:22534 "EHLO smtp.smtpout.orange.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725792AbgFZTh2 (ORCPT ); Fri, 26 Jun 2020 15:37:28 -0400 Received: from localhost.localdomain ([93.22.36.38]) by mwinf5d77 with ME id vvdP220040pNVn903vdPdG; Fri, 26 Jun 2020 21:37:25 +0200 X-ME-Helo: localhost.localdomain X-ME-Auth: Y2hyaXN0b3BoZS5qYWlsbGV0QHdhbmFkb28uZnI= X-ME-Date: Fri, 26 Jun 2020 21:37:25 +0200 X-ME-IP: 93.22.36.38 From: Christophe JAILLET To: richard.gong@linux.intel.com, atull@kernel.org, gregkh@linuxfoundation.org Cc: linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, Christophe JAILLET Subject: [PATCH V3] firmware: stratix10-svc: Fix some error handling code Date: Fri, 26 Jun 2020 21:37:20 +0200 Message-Id: <20200626193720.949431-1-christophe.jaillet@wanadoo.fr> X-Mailer: git-send-email 2.25.1 In-Reply-To: <0ecc14c7-b4df-1890-fbe7-91307c2db398@wanadoo.fr> References: <0ecc14c7-b4df-1890-fbe7-91307c2db398@wanadoo.fr> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix several error handling issues: - In 'svc_create_memory_pool()' we memremap some memory. This has to be undone in case of error and if the driver is removed. The easiest way to do it is to use 'devm_memremap()'. - 'svc_create_memory_pool()' returns an error pointer on error, not NULL. In 'stratix10_svc_drv_probe()', fix the corresponding test and return value accordingly. - Move the genpool allocation after a few devm_kzalloc in order to ease error handling. (some call to 'gen_pool_destroy()' were missing) - If an error occurs after calling 'svc_create_memory_pool()', the allocated genpool should be destroyed with 'gen_pool_destroy()', as already done in the remove function. Add an error handling path for that - If an error occurs after calling 'kfifo_alloc()', the allocated memory should be freed with 'kfifo_free()', as already done in the remove function. Add an error handling path for that While at it, do some clean-up: - Use 'devm_kcalloc()' instead of 'devm_kmalloc_array(... __GFP_ZERO)' - move a 'platform_device_put()' call to the new error handling path. - In 'stratix10_svc_drv_remove()', 'ctrl->genpool' can not be NULL, so axe a useless test in the remove function. Fixes: b5dc75c915cd ("firmware: stratix10-svc: extend svc to support new RSU features") Fixes: 7ca5ce896524 ("firmware: add Intel Stratix10 service layer driver") Signed-off-by: Christophe JAILLET --- v2: takes Dan's comment into account and fix another resource leak. v3: merge the previous 4 patches in a single one to ease review --- drivers/firmware/stratix10-svc.c | 42 +++++++++++++++++++------------- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/drivers/firmware/stratix10-svc.c b/drivers/firmware/stratix10-svc.c index e0db8dbfc9d1..90f7d68a2473 100644 --- a/drivers/firmware/stratix10-svc.c +++ b/drivers/firmware/stratix10-svc.c @@ -605,7 +605,7 @@ svc_create_memory_pool(struct platform_device *pdev, end = rounddown(sh_memory->addr + sh_memory->size, PAGE_SIZE); paddr = begin; size = end - begin; - va = memremap(paddr, size, MEMREMAP_WC); + va = devm_memremap(dev, paddr, size, MEMREMAP_WC); if (!va) { dev_err(dev, "fail to remap shared memory\n"); return ERR_PTR(-EINVAL); @@ -971,20 +971,19 @@ static int stratix10_svc_drv_probe(struct platform_device *pdev) if (ret) return ret; - genpool = svc_create_memory_pool(pdev, sh_memory); - if (!genpool) - return -ENOMEM; - /* allocate service controller and supporting channel */ controller = devm_kzalloc(dev, sizeof(*controller), GFP_KERNEL); if (!controller) return -ENOMEM; - chans = devm_kmalloc_array(dev, SVC_NUM_CHANNEL, - sizeof(*chans), GFP_KERNEL | __GFP_ZERO); + chans = devm_kcalloc(dev, SVC_NUM_CHANNEL, sizeof(*chans), GFP_KERNEL); if (!chans) return -ENOMEM; + genpool = svc_create_memory_pool(pdev, sh_memory); + if (IS_ERR(genpool)) + return PTR_ERR(genpool); + controller->dev = dev; controller->num_chans = SVC_NUM_CHANNEL; controller->num_active_client = 0; @@ -998,7 +997,7 @@ static int stratix10_svc_drv_probe(struct platform_device *pdev) ret = kfifo_alloc(&controller->svc_fifo, fifo_size, GFP_KERNEL); if (ret) { dev_err(dev, "failed to allocate FIFO\n"); - return ret; + goto err_destroy_pool; } spin_lock_init(&controller->svc_fifo_lock); @@ -1017,24 +1016,34 @@ static int stratix10_svc_drv_probe(struct platform_device *pdev) /* add svc client device(s) */ svc = devm_kzalloc(dev, sizeof(*svc), GFP_KERNEL); - if (!svc) - return -ENOMEM; + if (!svc) { + ret = -ENOMEM; + goto err_free_kfifo; + } svc->stratix10_svc_rsu = platform_device_alloc(STRATIX10_RSU, 0); if (!svc->stratix10_svc_rsu) { dev_err(dev, "failed to allocate %s device\n", STRATIX10_RSU); - return -ENOMEM; + ret = -ENOMEM; + goto err_free_kfifo; } ret = platform_device_add(svc->stratix10_svc_rsu); - if (ret) { - platform_device_put(svc->stratix10_svc_rsu); - return ret; - } + if (ret) + goto put_platform; + dev_set_drvdata(dev, svc); pr_info("Intel Service Layer Driver Initialized\n"); + return 0; + +put_platform: + platform_device_put(svc->stratix10_svc_rsu); +err_free_kfifo: + kfifo_free(&controller->svc_fifo); +err_destroy_pool: + gen_pool_destroy(genpool); return ret; } @@ -1050,8 +1059,7 @@ static int stratix10_svc_drv_remove(struct platform_device *pdev) kthread_stop(ctrl->task); ctrl->task = NULL; } - if (ctrl->genpool) - gen_pool_destroy(ctrl->genpool); + gen_pool_destroy(ctrl->genpool); list_del(&ctrl->node); return 0; -- 2.25.1