Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp174181iob; Mon, 2 May 2022 16:17:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzZfbpnSrb64ZGAPD5loYSnmtDPrODpxqrQcY7miqiOAEaDBGBJh/kowIHRBfqIhznkB1B X-Received: by 2002:a17:902:dad2:b0:15e:9faa:e924 with SMTP id q18-20020a170902dad200b0015e9faae924mr8697407plx.94.1651533430965; Mon, 02 May 2022 16:17:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651533430; cv=none; d=google.com; s=arc-20160816; b=VS584srxI4MRqa2UepkXh8ujQQqPDdnVdEro+4xi5TdsGxJ0lhQ/N9VRgpTBG/oLL8 7ZTBQ7hQANzzwubcImw7Gscg4KPvJe8SRzaGVpy2XWbAK7TWdycXn8FnFFP4P8cNa3EL 11/mZ8BDnraUC88obiFR2VTbCqA90OOqaF/FThS3IBcX+zpI8wfObEg1+XNGyiAv6BIY TXGhdpYinAWHQw7C1i79O0KYHwuFfu9PkkJEKKuWIRykGZWiHpvM0QxZaCx0kjX0sSLZ SOlxt0e5JXGWquHux26EThWxxW9ALOd1j34JDW9umwUKaB5ytH75EizjSAkU9Yo5MsYn 2jJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=fmRz1ww2hntYhSKRq/16Hr+8zlIhz/D9VnEyrgYQiW0=; b=yaQJlL2S4Zdiff2evno3DmazlNlUjqA38w4A9QHfRFj9b4pnPtTEsVTGmVfkQIz5i7 zIlngTJZPurVkXHvpuu6qdOuSpSdr6gMZkRi8MTP2/Hw09B1n63/UOK4xj9MR6dsijuf WSEXrGEXovMZ5Gnt9CQf4G3CUB0M2TTsS1RoK7NwExseLq0i6488Ll/UsKS6zWFtcUZO gGcMFTMvc9sEpiwbfcoOf3APSL4sKXIaZaDDRMXlPCT++g3mgNIW5WbqELpkBOI8085v sonTCzv68KnAvW/5V/7St068qJ8AQghlnD0Fi57I711oLrjqNe4mxL7n0XC1R0UGuMVv XJnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=jzj3NYMK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id q23-20020a656a97000000b003c1a429260fsi13003774pgu.791.2022.05.02.16.17.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 16:17:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=jzj3NYMK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id DF78E30F74; Mon, 2 May 2022 16:16:58 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238894AbiEAAJf (ORCPT + 99 others); Sat, 30 Apr 2022 20:09:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237705AbiEAAJV (ORCPT ); Sat, 30 Apr 2022 20:09:21 -0400 Received: from mail-io1-xd33.google.com (mail-io1-xd33.google.com [IPv6:2607:f8b0:4864:20::d33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6CE38205D6; Sat, 30 Apr 2022 17:05:58 -0700 (PDT) Received: by mail-io1-xd33.google.com with SMTP id m6so9021298iob.4; Sat, 30 Apr 2022 17:05:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=fmRz1ww2hntYhSKRq/16Hr+8zlIhz/D9VnEyrgYQiW0=; b=jzj3NYMKubS/aJMg5kYwhjzpXtDMXBQxn4A+0O4dLAPeRXAI4YWlqvjNt5/F8lr0tv ly1aJjQ2GsoIKz6tfEGKWAZyqaNCp6H6JCSm67dF7MFSnaKH3XJ9FjzPrG+sgTniYrjQ Ub3lSACAtRTX/wrWKnHyji7Sif/84qf1YEkmziRk8jVUp7tuPUF5qAUVibnye7dIgG3Y 47A1Qhv1/6yxkuF//bPvTDjxySDgIpOFl9LXJi8u6emUihrfI3YuwC+l/w5xg2czg18d pifw5bSaApdNh560tLUZE5Os8e4npV1qtKo/NJ0MGPYVrOIN5ttf/is5u3OlnmgLIsCK UwHA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=fmRz1ww2hntYhSKRq/16Hr+8zlIhz/D9VnEyrgYQiW0=; b=XGC60+JlL3XHO3sM+GLSMKzuUgT5mktHJk4kBkiZ0wkIgCFFeSl+3EH+uF3fSeb9gx YEdkGcH8uIuCTJ5/atKPKBr1l74LuuVsl0bwKh8wwhR/z7ZnCxaeeMnqqqrmnIFzgJqq PF60vLXId0upMrb3ohN8IXuCaeoDLbQ41x74ECl9ZN2QULm7GnwHpHXyMmpbC57ebxyR QM+1FcAo9161D6DNfk7wopr8noszmruQKQ6yIRCSd6YZLEYfbzxyb+x5NfwfukHhCusH Hb4px/IZjduIdLgpyH0l/h8Jlb+IKm3wXZYPqny3gvhk9avSzCj4QsVV6GDZHgHMPVGu l8eA== X-Gm-Message-State: AOAM531crm/AlGqImcxDflTs8NA5jYyGgxIzVFjG3SPnf/g6ndS0XxId WitZAsem8i1PGwfsu+KuO74= X-Received: by 2002:a05:6638:2643:b0:32a:cce3:e533 with SMTP id n3-20020a056638264300b0032acce3e533mr2490754jat.24.1651363557854; Sat, 30 Apr 2022 17:05:57 -0700 (PDT) Received: from xps8900.attlocal.net ([2600:1700:2442:6db0:809b:de5d:7e0a:bf83]) by smtp.gmail.com with ESMTPSA id n13-20020a92d9cd000000b002cde6e352dcsm1567160ilq.38.2022.04.30.17.05.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 30 Apr 2022 17:05:57 -0700 (PDT) From: frowand.list@gmail.com To: Rob Herring , pantelis.antoniou@konsulko.com, Slawomir Stepien , Dan Carpenter Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, Slawomir Stepien , Jan Kiszka , Geert Uytterhoeven Subject: [PATCH 3/3] of: overlay: do not free changeset when of_overlay_apply returns error Date: Sat, 30 Apr 2022 19:05:43 -0500 Message-Id: <20220501000543.1368005-4-frowand.list@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220501000543.1368005-1-frowand.list@gmail.com> References: <20220501000543.1368005-1-frowand.list@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Frank Rowand New unittests for overlay notifiers reveal a memory leak in of_overlay_apply() when a notifier returns an error for action OF_OVERLAY_POST_APPLY. The pr_err() message is: OF: ERROR: memory leak, expected refcount 1 instead of 3, of_node_get()/of_node_put() unbalanced - destroy cset entry: attach overlay node /testcase-data/overlay-node/test-bus/test-unittest17 Change the error path to no longer call free_overlay_changeset(), and document that the caller of of_overlay_fdt_apply() may choose to remove the overlay. Update the unittest that triggered the error to expect the changed return values and to call of_overlay_remove(). Signed-off-by: Frank Rowand --- === Output of the new overlay notifier unittests, as filtered by scripts/dtc/of_unittest_expect: ### dt-test ### pass of_unittest_overlay_notify():2825 ok OF: overlay: overlay changeset pre-apply notifier error -16, target: /testcase-data/overlay-node/test-bus ### dt-test ### pass of_unittest_overlay_notify():2846 ### dt-test ### pass of_unittest_overlay_notify():2851 ok OF: overlay: overlay changeset post-apply notifier error -17, target: /testcase-data/overlay-node/test-bus ### dt-test ### pass of_unittest_overlay_notify():2857 ### dt-test ### pass of_unittest_overlay_notify():2862 ### dt-test ### pass of_unittest_overlay_notify():2866 ### dt-test ### pass of_unittest_overlay_notify():2872 ### dt-test ### pass of_unittest_overlay_notify():2875 ok OF: overlay: overlay changeset pre-remove notifier error -18, target: /testcase-data/overlay-node/test-bus ### dt-test ### pass of_unittest_overlay_notify():2886 ### dt-test ### pass of_unittest_overlay_notify():2894 ### dt-test ### pass of_unittest_overlay_notify():2898 ### dt-test ### pass of_unittest_overlay_notify():2901 ok OF: overlay: overlay changeset post-remove notifier error -19, target: /testcase-data/overlay-node/test-bus ### dt-test ### pass of_unittest_overlay_notify():2908 ### dt-test ### pass of_unittest_overlay_notify():2915 ### dt-test ### pass of_unittest_overlay_notify():2920 ### dt-test ### pass of_unittest_overlay_notify():2932 drivers/of/overlay.c | 29 ++++++++++++++++++++++++++--- drivers/of/unittest.c | 10 ++++++++-- 2 files changed, 34 insertions(+), 5 deletions(-) diff --git a/drivers/of/overlay.c b/drivers/of/overlay.c index 48c240b06d3b..4c1ac36216b8 100644 --- a/drivers/of/overlay.c +++ b/drivers/of/overlay.c @@ -954,6 +954,25 @@ static int of_overlay_apply(struct overlay_changeset *ovcs) return ret; } +/* + * of_overlay_fdt_apply() - Create and apply an overlay changeset + * @overlay_fdt: pointer to overlay FDT + * @overlay_fdt_size: number of bytes in @overlay_fdt + * @ret_ovcs_id: pointer for returning created changeset id + * + * Creates and applies an overlay changeset. + * + * See of_overlay_apply() for important behavior information. + * + * Return: 0 on success, or a negative error number. *@ret_ovcs_id is set to + * the value of overlay changeset id, which can be passed to of_overlay_remove() + * to remove the overlay. + * + * On error return, the changeset may be partially applied. This is especially + * likely if an OF_OVERLAY_POST_APPLY notifier returns an error. In this case + * the caller should call of_overlay_remove() with the value in *@ret_ovcs_id. + */ + int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, int *ret_ovcs_id) { @@ -1021,15 +1040,19 @@ int of_overlay_fdt_apply(const void *overlay_fdt, u32 overlay_fdt_size, ovcs->overlay_mem = overlay_mem; ret = of_overlay_apply(ovcs); - if (ret < 0) - goto err_free_ovcs; + /* + * If of_overlay_apply() error, calling free_overlay_changeset() may + * result in a memory leak if the apply partly succeeded, so do NOT + * goto err_free_ovcs. Instead, the caller of of_overlay_fdt_apply() + * can call of_overlay_remove(); + */ mutex_unlock(&of_mutex); of_overlay_mutex_unlock(); *ret_ovcs_id = ovcs->id; - return 0; + return ret; err_free_ovcs: free_overlay_changeset(ovcs); diff --git a/drivers/of/unittest.c b/drivers/of/unittest.c index e28c3df2c4c2..dff55ae09d97 100644 --- a/drivers/of/unittest.c +++ b/drivers/of/unittest.c @@ -2848,7 +2848,7 @@ static void __init of_unittest_overlay_notify(void) EXPECT_END(KERN_INFO, "OF: overlay: overlay changeset pre-apply notifier error -16, target: /testcase-data/overlay-node/test-bus"); - unittest(!ovcs_id, "ovcs_id created for overlay_16\n"); + unittest(ovcs_id, "ovcs_id not created for overlay_16\n"); /* --- overlay 17 --- */ @@ -2859,7 +2859,13 @@ static void __init of_unittest_overlay_notify(void) EXPECT_END(KERN_INFO, "OF: overlay: overlay changeset post-apply notifier error -17, target: /testcase-data/overlay-node/test-bus"); - unittest(!ovcs_id, "ovcs_id created for overlay_17\n"); + unittest(ovcs_id, "ovcs_id not created for overlay_17\n"); + + if (ovcs_id) { + ret = of_overlay_remove(&ovcs_id); + unittest(!ret, + "overlay_17 of_overlay_remove(), ret = %d\n", ret); + } /* --- overlay 18 --- */ -- Frank Rowand