Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp5912204pxb; Sun, 7 Nov 2021 23:32:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJz/RKXW5N9s6FEKHvz96j8K8bRDaY4EtmJhJGclsx6GSx4HSbzTA+ADHLLq2aKEv5LohqGe X-Received: by 2002:a05:6402:2753:: with SMTP id z19mr73789912edd.143.1636356729297; Sun, 07 Nov 2021 23:32:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1636356729; cv=none; d=google.com; s=arc-20160816; b=JmCYB7ZAzjccel29+92Mho5EW7Ft6frjsG3FCmuEnvS7im88jmsQMv7RJWmijuaLAH cD7Syw4UsinxrgVJJsSgm35MTs1AhZXVdPKEYKqfgsCfShfK16jdYKka99qo6DuNg5e5 9B0Kp4YRnKEOr2DUh5/Amn0U/Pw6th9/8HdDKGbGqFtdfUx1tCQN4qN/s+j2jbGR8T86 OgZlnFN4etZ8xA3TXFwvb9xiMCxC2bM1pgphKTlaTaR+WZeouiRmgwZuui3GUKKpU0DJ ctQvZR5B8erzvawEMr8Qdls/a+aZLOHDe+Ct/2vb2Wh2WJueNZgWctQijrmfhPIkyBlW hebQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=JaITWYlu8c0FZ4GhudcBVXXwNUSm4FGu9OGZ7UEPqKs=; b=hAJPtUedPvQ4SEikEk71acVS4V6vmjFvIaWAa+rc2cuO4NLt5ojVzRtWenOygujPv8 nRE7jT6vKA02scbT9x6HKlRpSN+mjvaNYtuf1Y7rRim9/5W3dJoqF+WUbEQuDN6k4DXh ERSB5fc0eyyIdiSJr9EL9EtLGVM52ctOi0Rnwiee1iWWPRZumzv0ARSA/82tWj3yNPrx CqP1w7jEpoxW66ojDfl+8FrA1Ny/0+ev/INGoBq8afQSx3ksa5/TRSXaayXgEU/8JGoS fCxh4TD90fZUL6gESllqZrK/2w+uJpwL1RkdPRPQzvyyN5Fzz0Cv3t7X4XmE4ldXqF1t uXBw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w10si21377966ejf.2.2021.11.07.23.31.46; Sun, 07 Nov 2021 23:32:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237323AbhKHEIB (ORCPT + 99 others); Sun, 7 Nov 2021 23:08:01 -0500 Received: from szxga01-in.huawei.com ([45.249.212.187]:14723 "EHLO szxga01-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236468AbhKHEH7 (ORCPT ); Sun, 7 Nov 2021 23:07:59 -0500 Received: from dggemv704-chm.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4HncsK6WcHzZckx; Mon, 8 Nov 2021 12:03:01 +0800 (CST) Received: from dggema774-chm.china.huawei.com (10.1.198.216) by dggemv704-chm.china.huawei.com (10.3.19.47) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.2308.15; Mon, 8 Nov 2021 12:05:13 +0800 Received: from use12-sp2.huawei.com (10.67.189.174) by dggema774-chm.china.huawei.com (10.1.198.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2308.15; Mon, 8 Nov 2021 12:05:12 +0800 From: Xiaoming Ni To: , , , , <21cnbao@gmail.com>, , , , , , CC: , Subject: [PATCH] arm:cache-l2x0: Fix resource leak in the l2x0_of_init() failed branch Date: Mon, 8 Nov 2021 12:05:10 +0800 Message-ID: <20211108040510.14494-1-nixiaoming@huawei.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.189.174] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggema774-chm.china.huawei.com (10.1.198.216) X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org During the code review, some problems were found in the function l2x0_of_init(). 1. Do not call Of_put_node() after calling of_find_match_node(). 2. When __l2c_init() is called for identification, l2x0_base is not released. Invoking Of_put_node() and iounmap() is added to solve this problem. Fixes: 8c369264b6de3 ("ARM: 7009/1: l2x0: Add OF based initialization") Fixes: 91c2ebb90b189 ("ARM: 7114/1: cache-l2x0: add resume entry for l2 in secure mode") Fixes: 6b49241ac2525 ("ARM: 8259/1: l2c: Refactor the driver to use commit-like interface") Signed-off-by: Xiaoming Ni --- arch/arm/mm/cache-l2x0.c | 17 ++++++++++++++--- 1 file changed, 14 insertions(+), 3 deletions(-) diff --git a/arch/arm/mm/cache-l2x0.c b/arch/arm/mm/cache-l2x0.c index 43d91bfd2360..105bf7575cdf 100644 --- a/arch/arm/mm/cache-l2x0.c +++ b/arch/arm/mm/cache-l2x0.c @@ -1766,17 +1766,22 @@ int __init l2x0_of_init(u32 aux_val, u32 aux_mask) u32 cache_id, old_aux; u32 cache_level = 2; bool nosync = false; + int ret; np = of_find_matching_node(NULL, l2x0_ids); if (!np) return -ENODEV; - if (of_address_to_resource(np, 0, &res)) + if (of_address_to_resource(np, 0, &res)) { + of_put_node(np); return -ENODEV; + } l2x0_base = ioremap(res.start, resource_size(&res)); - if (!l2x0_base) + if (!l2x0_base) { + of_put_node(np); return -ENOMEM; + } l2x0_saved_regs.phy_base = res.start; @@ -1820,6 +1825,12 @@ int __init l2x0_of_init(u32 aux_val, u32 aux_mask) else cache_id = readl_relaxed(l2x0_base + L2X0_CACHE_ID); - return __l2c_init(data, aux_val, aux_mask, cache_id, nosync); + ret = _l2c_init(data, aux_val, aux_mask, cache_id, nosync); + if (ret != 0) { + iounmap(l2x0_base); + l2x0_base = NULL; + } + of_put_node(np); + return ret; } #endif -- 2.27.0