Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5075070pxj; Wed, 9 Jun 2021 08:35:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwbwfCTfmDh60WQFDd7zhuRhRiDfuFownb/x2pOnX8/RiI7zfY41YcBwR2GH0h9rc8YV2zL X-Received: by 2002:a17:906:f849:: with SMTP id ks9mr461275ejb.402.1623252931578; Wed, 09 Jun 2021 08:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623252931; cv=none; d=google.com; s=arc-20160816; b=BaghoiYfPD5a216pO1sCYjs4TVgZD0rd9rJ/1Cyp03ggSa44uYRylRdw8J/fX/Ib3Q fKsenZ2DOTiLRr+2jwlPTc8w6G0E4Hx1PHxIx+P+qcQFEguqLvT1rKsbTCCvpcPKvDba cdJGW77vQozmQ6sO9mAraaOitGYRSHEs4lFIZIBFXhZIG8w9FXNG1HSJseei8QfY6x2p 8aD2Xxy4caO5hiItteCXlThRCLjof31AbeVx5sO/+ttwYLY7B2iqrDKCG8DS0wpwC9PW tGps9+KmmhN0kevCsLx0Im5unTtNzh5+lXfSMG+GaukH/m2vSpJQRvArxx8Ye6cPJYy0 CbIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=jmxMF0wKhe5+H1HMTwQ8HbWEIfimZK4ZLURBTpyuXWQ=; b=RcyrDYDVOqr5PhOqBp9SAw6V2/kKtvxu9VLYS7AlJq0eMCWo1A8DYoWpXCjfFVLyUa L7Y7dx2nIil8cZZgax9KiFIDZnFuQQ3xj4NO/uZkrnZ/pOQscduYbrq+yagJKe1uju2q 1QZmZTTO4ukIYdeV9L3EXUo4Y37lT/nBO2HnILVG5lSBYh2G7IWcht80uXd0CYTBncuB FQ6uX9m8AzCoMZELJggzmnGOD3PwuZLJZ8HW1DuoWn28ELuhxulY6sQ8auZ+1pO7/Ji6 pw6O/VOGE0iiU5qRocdUwtTovbdJu0rN7TBQY/c51DV2DpEZItT9WmpGPsIjnPr33wh+ YuXg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r15si42525edo.442.2021.06.09.08.35.07; Wed, 09 Jun 2021 08:35:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237147AbhFIOOS (ORCPT + 99 others); Wed, 9 Jun 2021 10:14:18 -0400 Received: from foss.arm.com ([217.140.110.172]:32938 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237544AbhFIOON (ORCPT ); Wed, 9 Jun 2021 10:14:13 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C1121D6E; Wed, 9 Jun 2021 07:12:18 -0700 (PDT) Received: from [10.57.6.115] (unknown [10.57.6.115]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D19A03F73D; Wed, 9 Jun 2021 07:12:16 -0700 (PDT) Subject: Re: [PATCH] iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails To: Xiyu Yang , Will Deacon , Joerg Roedel , Nicolin Chen , Bjorn Andersson , Krishna Reddy , Jordan Crouse , Sai Prakash Ranjan , linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org Cc: yuanxzhang@fudan.edu.cn, Xin Tan References: <1623245709-11123-1-git-send-email-xiyuyang19@fudan.edu.cn> From: Robin Murphy Message-ID: Date: Wed, 9 Jun 2021 15:12:11 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: <1623245709-11123-1-git-send-email-xiyuyang19@fudan.edu.cn> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2021-06-09 14:35, Xiyu Yang wrote: > arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the > refcount of the "smmu" even though the return value is less than 0. > > The reference counting issue happens in some error handling paths of > arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get() > fails, the caller functions forget to decrease the refcount of "smmu" > increased by arm_smmu_rpm_get(), causing a refcount leak. > > Fix this issue by calling arm_smmu_rpm_put() or jumping to the "rpm_put" > label when arm_smmu_rpm_get() fails. If only there was some kind of helper function which could encapsulate the correct expected behaviour in a single place... In fact with the new pm_runtime_resume_and_get() API I think these two patches boil down to a one-line change. Thanks, Robin. > Signed-off-by: Xiyu Yang > Signed-off-by: Xin Tan > --- > drivers/iommu/arm/arm-smmu/arm-smmu.c | 13 +++++++++---- > 1 file changed, 9 insertions(+), 4 deletions(-) > > diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c b/drivers/iommu/arm/arm-smmu/arm-smmu.c > index 6f72c4d208ca..177ee54c5534 100644 > --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c > +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c > @@ -840,7 +840,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) > > ret = arm_smmu_rpm_get(smmu); > if (ret < 0) > - return; > + goto rpm_put; > > /* > * Disable the context bank and free the page tables before freeing > @@ -857,6 +857,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) > free_io_pgtable_ops(smmu_domain->pgtbl_ops); > __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx); > > +rpm_put: > arm_smmu_rpm_put(smmu); > } > > @@ -1153,7 +1154,7 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) > > ret = arm_smmu_rpm_get(smmu); > if (ret < 0) > - return ret; > + goto rpm_put; > > /* Ensure that the domain is finalised */ > ret = arm_smmu_init_domain_context(domain, smmu, dev); > @@ -1404,7 +1405,7 @@ static struct iommu_device *arm_smmu_probe_device(struct device *dev) > > ret = arm_smmu_rpm_get(smmu); > if (ret < 0) > - goto out_cfg_free; > + goto rpm_put; > > ret = arm_smmu_master_alloc_smes(dev); > arm_smmu_rpm_put(smmu); > @@ -1417,6 +1418,8 @@ static struct iommu_device *arm_smmu_probe_device(struct device *dev) > > return &smmu->iommu; > > +rpm_put: > + arm_smmu_rpm_put(smmu); > out_cfg_free: > kfree(cfg); > out_free: > @@ -1438,8 +1441,10 @@ static void arm_smmu_release_device(struct device *dev) > smmu = cfg->smmu; > > ret = arm_smmu_rpm_get(smmu); > - if (ret < 0) > + if (ret < 0) { > + arm_smmu_rpm_put(smmu); > return; > + } > > arm_smmu_master_free_smes(cfg, fwspec); > >