Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5162811pxj; Wed, 9 Jun 2021 10:32:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy85qvif18k0GgsV0l0eGQESViyiOuKPs3Ez6BeklDglOEou8qt+yTl6gfNONHpIhhPYl2V X-Received: by 2002:a05:6402:885:: with SMTP id e5mr559505edy.248.1623259943138; Wed, 09 Jun 2021 10:32:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623259943; cv=none; d=google.com; s=arc-20160816; b=yUnSQW5tObBWkMacDRjmKbimFpHkmVNfGJi40NbJhI3EVsReuZA3KfxLuPLVbsrMWE ICMmfn4LRZS5osNWsXmU6EBHOFSLSgQTYPey2rTyBDwjfKBlNBMOnlmEaZMOO4Bed6Dj C4/TNmbvMb8FRXLUcd4Vhtn5H9Kwmk1BNblNKjMNcVwF09nuZJ0LL8YlwLGEZywf+89J Bq0aVgV0s82ndDEWCov102jstaWdTP0dnmUjGtzsHLCSq/RWrchgaCr+LtXcwU4U5Fj+ clUMs4RCz9YVs03BYwGxey/7MzLsfk26vLLnqmaS/FMLqim4R1t9cFo+aFNLzNkqe5NA JJ3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=OkHkIhhIF+nUZjZbINQyI6axCFfaFtk6/n5ulBOsI1c=; b=NWAl2medtMf7uFIqUe7pPZt2Y1W51flYi8BthIwqHJapdTvFqQ6x13tJz4g/BejupO jD1Sv7Bt2QK89pEwHAX1Sb5RToINmfs/0E/DUyzoi4CBaTLD8JCP9AHUnakDd2SIDp4h FdyuaNXTJSLlEhVsfaHot3+CHBRgB16oYBjiz3+MISPAgvZVCUIfkpir063K01Y36etV 7mbzsyvfvWPwk+cP0wSbnv8r2KO2anzVuAbSB5ACwjAubE7i1XyMLjRFPL1BTo5ZPOxC 9u32UjD3gglm3Q9tGkYuFsMXeHcF67KQXj0upPbPSEUohb6Wc2Z/A9R0wG9sMBTG2NvZ O+SQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=p1OJw7Oz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t27si257571ejd.372.2021.06.09.10.31.58; Wed, 09 Jun 2021 10:32:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@fudan.edu.cn header.s=dkim header.b=p1OJw7Oz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=fudan.edu.cn Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236451AbhFINiV (ORCPT + 99 others); Wed, 9 Jun 2021 09:38:21 -0400 Received: from zg8tmty1ljiyny4xntqumjca.icoremail.net ([165.227.154.27]:56474 "HELO zg8tmty1ljiyny4xntqumjca.icoremail.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with SMTP id S236421AbhFINiT (ORCPT ); Wed, 9 Jun 2021 09:38:19 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fudan.edu.cn; s=dkim; h=Received:From:To:Cc:Subject:Date: Message-Id; bh=OkHkIhhIF+nUZjZbINQyI6axCFfaFtk6/n5ulBOsI1c=; b=p 1OJw7Oz6ZFv5QyUgpCZuL0ZJGG76QEDgucdurJoE+KKwV06vF6I1NBJlrGXV4kjp I1Q3WHuNYpMYNV+uCMz+6v4H1QE2qOHvI7xfnFXIP4Tu3bK8XN1xhEhLdASvKnBw k6XBKibVWx3TiCj7VlgtIyc9u8/LIa27i5ez2YLfKQ= Received: from localhost.localdomain (unknown [10.162.183.236]) by app1 (Coremail) with SMTP id XAUFCgAX+CCSw8BgN34+AA--.4410S3; Wed, 09 Jun 2021 21:35:14 +0800 (CST) From: Xiyu Yang To: Will Deacon , Robin Murphy , Joerg Roedel , Nicolin Chen , Bjorn Andersson , Krishna Reddy , Jordan Crouse , Sai Prakash Ranjan , linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org Cc: yuanxzhang@fudan.edu.cn, Xiyu Yang , Xin Tan Subject: [PATCH] iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails Date: Wed, 9 Jun 2021 21:35:07 +0800 Message-Id: <1623245709-11123-1-git-send-email-xiyuyang19@fudan.edu.cn> X-Mailer: git-send-email 2.7.4 X-CM-TRANSID: XAUFCgAX+CCSw8BgN34+AA--.4410S3 X-Coremail-Antispam: 1UD129KBjvJXoWxJryxJw1kuFWDKr48XF1kKrg_yoW5JFykpa 1Uu390vF4kGFy0yr1DAw40vF98W3yIvF9Fyr4xGas8ur13t3s8KF12y34a9a4kCrW8Ja13 Ar42qr45CF15AFJanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9G14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4U JVWxJr1l84ACjcxK6I8E87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_Gc CE3s1lnxkEFVAIw20F6cxK64vIFxWle2I262IYc4CY6c8Ij28IcVAaY2xG8wAqx4xG64xv F2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_JrI_JrylYx0Ex4A2jsIE14v26r1j6r 4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwIxGrwACjI8F5VA0II8E6IAqYI8I 648v4I1lFIxGxcIEc7CjxVA2Y2ka0xkIwI1lc2xSY4AK6svPMxAIw28IcxkI7VAKI48JMx C20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr4lx2IqxVCjr7xvwVAF wI0_JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCIc40Y0x0EwIxGrwCI42IY6xIIjxv20x vE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVW8JVWxJwCI42IY6xAIw20EY4v2 0xvaj40_Gr0_Zr1lIxAIcVC2z280aVAFwI0_Jr0_Gr1lIxAIcVC2z280aVCY1x0267AKxV W8JVW8JrUvcSsGvfC2KfnxnUUI43ZEXa7VU1c4S5UUUUU== X-CM-SenderInfo: irzsiiysuqikmy6i3vldqovvfxof0/ Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org arm_smmu_rpm_get() invokes pm_runtime_get_sync(), which increases the refcount of the "smmu" even though the return value is less than 0. The reference counting issue happens in some error handling paths of arm_smmu_rpm_get() in its caller functions. When arm_smmu_rpm_get() fails, the caller functions forget to decrease the refcount of "smmu" increased by arm_smmu_rpm_get(), causing a refcount leak. Fix this issue by calling arm_smmu_rpm_put() or jumping to the "rpm_put" label when arm_smmu_rpm_get() fails. Signed-off-by: Xiyu Yang Signed-off-by: Xin Tan --- drivers/iommu/arm/arm-smmu/arm-smmu.c | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c b/drivers/iommu/arm/arm-smmu/arm-smmu.c index 6f72c4d208ca..177ee54c5534 100644 --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c @@ -840,7 +840,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) ret = arm_smmu_rpm_get(smmu); if (ret < 0) - return; + goto rpm_put; /* * Disable the context bank and free the page tables before freeing @@ -857,6 +857,7 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) free_io_pgtable_ops(smmu_domain->pgtbl_ops); __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx); +rpm_put: arm_smmu_rpm_put(smmu); } @@ -1153,7 +1154,7 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) ret = arm_smmu_rpm_get(smmu); if (ret < 0) - return ret; + goto rpm_put; /* Ensure that the domain is finalised */ ret = arm_smmu_init_domain_context(domain, smmu, dev); @@ -1404,7 +1405,7 @@ static struct iommu_device *arm_smmu_probe_device(struct device *dev) ret = arm_smmu_rpm_get(smmu); if (ret < 0) - goto out_cfg_free; + goto rpm_put; ret = arm_smmu_master_alloc_smes(dev); arm_smmu_rpm_put(smmu); @@ -1417,6 +1418,8 @@ static struct iommu_device *arm_smmu_probe_device(struct device *dev) return &smmu->iommu; +rpm_put: + arm_smmu_rpm_put(smmu); out_cfg_free: kfree(cfg); out_free: @@ -1438,8 +1441,10 @@ static void arm_smmu_release_device(struct device *dev) smmu = cfg->smmu; ret = arm_smmu_rpm_get(smmu); - if (ret < 0) + if (ret < 0) { + arm_smmu_rpm_put(smmu); return; + } arm_smmu_master_free_smes(cfg, fwspec); -- 2.7.4