Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp3296555ybc; Thu, 14 Nov 2019 07:02:58 -0800 (PST) X-Google-Smtp-Source: APXvYqwYzw6tbwycQr74yeVCPPaKpU1kebz09fZCLZFmcJ3CmK3TId7c4J0Np0oz8Xhxxht3uT41 X-Received: by 2002:a17:906:9458:: with SMTP id z24mr8701485ejx.289.1573743778047; Thu, 14 Nov 2019 07:02:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573743778; cv=none; d=google.com; s=arc-20160816; b=xy/4vFwmzidsGCq/ibJxlERD1/+BBbOd94PrmtOcTs30t2SmlcO1JeteRXPCt5NGP5 BLvjDJw2SEAvNhti6idjELtETzTuYuCV8bGohl/sPN29LHtUUB7VulGlVS+LTFz7/gNq yaUkSz0I2TW3DT2cmBlMS0PMPkOpjQSJA0Q6wGhwI422ghvq9mZpY429lcDkqurzrlS5 wYrNTCs49u2jenNJgsTjNomijAVQvlZzIWdF2eTsA0gGGYQpWzHAnBrYqDBDW57aIIcy Ka+N/MlduL8htL+vJRSJDuyrFRoni02HROjMzj/3H/wxAzm+WoSFQBYvDR11bU52HlmN 3OFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=BpZWgkuYQQE1xf36G5kfKimVqsnadq62MdXmwhVg2xU=; b=bpEHdgu1CTy5tTcrEdDKSWy2VWd7tbezzRNlwoBKjMrbAH6INE8znILrc/CM0UPGVZ 2JcRKAiH/pivkKuhuRK7v+LbJyp61BKqG/JBayaZ2063u9P4aS5tC2f/njIJ7AtqZi/n BmfVNsr8M4bLskk6ql6qfSReLCArN1/EmXyBAzy/SwB5nUGlNcmU6AJlOobYd5R19Z+j /n8pbYr8fIx3MPv57RUw3CBy1OfyFJH9I603IuTtgApJSkDosQfabG9KPUFvo1dBkkzc PqlP94Kpu/euyJpPs2cBoriHZv3psaG17EmBd24CiROZSikkXc62MnsjxNi08GJaveK+ oDJA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gu7si3574544ejb.405.2019.11.14.07.02.18; Thu, 14 Nov 2019 07:02:58 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-bluetooth-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-bluetooth-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726482AbfKNPBW (ORCPT + 99 others); Thu, 14 Nov 2019 10:01:22 -0500 Received: from mx2.suse.de ([195.135.220.15]:36532 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726263AbfKNPBW (ORCPT ); Thu, 14 Nov 2019 10:01:22 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 934BBB031; Thu, 14 Nov 2019 15:01:20 +0000 (UTC) From: Oliver Neukum To: ytkim@qca.qualcomm.com, marcel@holtmann.org, johan.hedberg@gmail.com, linux-bluetooth@vger.kernel.org Cc: Oliver Neukum Subject: [PATCH] btusb: fix PM leak in error case of setup Date: Thu, 14 Nov 2019 16:01:18 +0100 Message-Id: <20191114150118.5237-1-oneukum@suse.com> X-Mailer: git-send-email 2.16.4 Sender: linux-bluetooth-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-bluetooth@vger.kernel.org If setup() fails a reference for runtime PM has already been taken. Proper use of the error handling in btusb_open()is needed. You cannot just return. Fixes: ace31982585a3 ("Bluetooth: btusb: Add setup callback for chip init on USB") Signed-off-by: Oliver Neukum --- drivers/bluetooth/btusb.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/bluetooth/btusb.c b/drivers/bluetooth/btusb.c index a9c35ebb30f8..0b5e4c135f78 100644 --- a/drivers/bluetooth/btusb.c +++ b/drivers/bluetooth/btusb.c @@ -1200,7 +1200,7 @@ static int btusb_open(struct hci_dev *hdev) if (data->setup_on_usb) { err = data->setup_on_usb(hdev); if (err < 0) - return err; + goto setup_fail; } data->intf->needs_remote_wakeup = 1; @@ -1239,6 +1239,7 @@ static int btusb_open(struct hci_dev *hdev) failed: clear_bit(BTUSB_INTR_RUNNING, &data->flags); +setup_fail: usb_autopm_put_interface(data->intf); return err; } -- 2.16.4