Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4661994pxj; Wed, 12 May 2021 10:18:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhMKQlIuT7o+49y+VgSFbV8h1dWKrB7bgDaCs56f5rBYdWLok3XDQKwIbz6u5HzL5POZ7t X-Received: by 2002:a05:6402:3481:: with SMTP id v1mr2755410edc.312.1620839916133; Wed, 12 May 2021 10:18:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620839916; cv=none; d=google.com; s=arc-20160816; b=Kgka679oyIwgxe1YSuc28UHuNh1LsyMKvM6qdJmzYY6zmaTSiBxgY1Mo6471SskYDM zKXo9Cp8EtqrQczIsJQCaps8HSLXusrNAg9aLd5m6dZ6ogWurXgqWsl1Lj05kDurqbHT LflqgJ8aDtiry53/8e4YgZq6uAflzlh7ytq8Pt8i974wwzVNyqGtmE+X2a1Kn3cbM6A/ L4RwxK6QVibd7MzJv+YBTwBnQNZwWhpBFir2vv8PaQvPn7P3DfrfhbA2HKJLXWQr2Mp4 ezNg6Kg0zfw4tQjlORxeu+pntI9Ton7Dmvsmr3W+8f/Scmeqf9xpkm5M7qERW0lK7fRf Ww5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ZFMbkAt1GuBbUL5TgAU6ai94cBCcdW8Xib+RNPPFO0E=; b=VDQvnfQIjIX7cSzcTEP8jcE44LLlN+IQZycP+U/RDUAoAp46XR9qF1QhbspWABLzU0 IHFWx1ItSkTQw+wr3RMHFLsnUxSUlLSgzrTqTFDwNGBp1onXKcZPTImKdilQcsRIWo0Y 6KLg4WDvgoNHzLSw8Y6q4Dnir5b1zNn5MvtjTn9JuAVBJHqDkNdYGWcGQIYzJQq393mF 1FBTD9vuqMh4iud1sPt1S8mF82jHZl9yGPmxWsO0FXdCC6VNmY1VSR+Fw/ZowBUOvjwo uWiq3gegnl8oDoOk7H6RY0Y0f6ti1/DkAHXnXvWcDHmlyjiqXJlpWF/j0A0WEr27SRKm xU4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="m+pnx/A+"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 26si184877ejx.371.2021.05.12.10.18.11; Wed, 12 May 2021 10:18:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="m+pnx/A+"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346139AbhELRM6 (ORCPT + 99 others); Wed, 12 May 2021 13:12:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:49114 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237284AbhELQAP (ORCPT ); Wed, 12 May 2021 12:00:15 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6CBBF61CD4; Wed, 12 May 2021 15:32:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620833559; bh=CkoxGbzv1ZeUYCu20oMabI40pqt6vcO9XyHEodlp2Bs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=m+pnx/A+avefUWINsAJ5od/LirFKM7bPe6phYZwAtZuHGRWEnZsxMwLgfBov1O333 z6JThcrmoqmqJyM1ABMTusO3hWi2q/VaEGQ/iRR/Ia4FqS5XcC12vbQgRdRsMEvf2Y wq3DvxeV0190qbg4j2pMfeitNfdPBPYrkp2Qwt1Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tong Zhang , Andy Shevchenko , Giovanni Cabiddu , Herbert Xu , Sasha Levin Subject: [PATCH 5.11 198/601] crypto: qat - dont release uninitialized resources Date: Wed, 12 May 2021 16:44:35 +0200 Message-Id: <20210512144834.356990109@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210512144827.811958675@linuxfoundation.org> References: <20210512144827.811958675@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tong Zhang [ Upstream commit b66accaab3791e15ac99c92f236d0d3a6d5bd64e ] adf_vf_isr_resource_alloc() is not unwinding correctly when error happens and it want to release uninitialized resources. To fix this, only release initialized resources. [ 1.792845] Trying to free already-free IRQ 11 [ 1.793091] WARNING: CPU: 0 PID: 182 at kernel/irq/manage.c:1821 free_irq+0x202/0x380 [ 1.801340] Call Trace: [ 1.801477] adf_vf_isr_resource_free+0x32/0xb0 [intel_qat] [ 1.801785] adf_vf_isr_resource_alloc+0x14d/0x150 [intel_qat] [ 1.802105] adf_dev_init+0xba/0x140 [intel_qat] Signed-off-by: Tong Zhang Reviewed-by: Andy Shevchenko Fixes: dd0f368398ea ("crypto: qat - Add qat dh895xcc VF driver") Acked-by: Giovanni Cabiddu Signed-off-by: Herbert Xu Signed-off-by: Sasha Levin --- drivers/crypto/qat/qat_common/adf_vf_isr.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/drivers/crypto/qat/qat_common/adf_vf_isr.c b/drivers/crypto/qat/qat_common/adf_vf_isr.c index 38d316a42ba6..888388acb6bd 100644 --- a/drivers/crypto/qat/qat_common/adf_vf_isr.c +++ b/drivers/crypto/qat/qat_common/adf_vf_isr.c @@ -261,17 +261,26 @@ int adf_vf_isr_resource_alloc(struct adf_accel_dev *accel_dev) goto err_out; if (adf_setup_pf2vf_bh(accel_dev)) - goto err_out; + goto err_disable_msi; if (adf_setup_bh(accel_dev)) - goto err_out; + goto err_cleanup_pf2vf_bh; if (adf_request_msi_irq(accel_dev)) - goto err_out; + goto err_cleanup_bh; return 0; + +err_cleanup_bh: + adf_cleanup_bh(accel_dev); + +err_cleanup_pf2vf_bh: + adf_cleanup_pf2vf_bh(accel_dev); + +err_disable_msi: + adf_disable_msi(accel_dev); + err_out: - adf_vf_isr_resource_free(accel_dev); return -EFAULT; } EXPORT_SYMBOL_GPL(adf_vf_isr_resource_alloc); -- 2.30.2