Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp690315pxf; Thu, 18 Mar 2021 09:22:57 -0700 (PDT) X-Google-Smtp-Source: ABdhPJygbjyqzrDtM2ACr5IiIZvQZ72WyzlDjxLx1OjzL0UXUyS31u+qG+UFBrdGJvfZcdRRJr3f X-Received: by 2002:a05:6402:38f:: with SMTP id o15mr4585812edv.361.1616084577006; Thu, 18 Mar 2021 09:22:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616084576; cv=none; d=google.com; s=arc-20160816; b=EuzOhVXtC/N2BhmVYDv7LieV8HRpfnKQi0vAC5BYgm6U9lQri7PKK5wAbnpxPdokmJ EZqZnzU3kX2CH3WFPZPOXtH/KCMbQQS0HEUk5YQa9VZGQjvmscHTdSx6t7duW5H68wDb KBwr49RLO4F6Z4hx3z/ukTH0PFJbWkCLaJwCTvDls3PbPGO61YwCOswbl0QBWFK6MZqJ SdFYOs3aMaPfGruIbCiGBH7bHTzPKZVec88lxcwaRD2sltwkaoKoiYICix6Tr+OuWw/b D1s96lli7GAoAZgP8iee/1Nn7NtxSzhBww0KDOkgiLcAoGeHbY7v8RYebV7UgU7U13wS BnEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:to:from :dkim-signature; bh=niDtTWOYXUYFGcJaJ5bNloNgVTsHS/48zJQic+B6298=; b=V9h3wjTYBa7xl7loP7j2xJURVaN0Tu9YA/QUyayApU8xtMr0ze7xZScKXb81uk4+3v Dgt25Z6BVkPW0ILLhvVy5azNtW5mEcnr4gIUw1somCY5/KNw4QYUjlLRijmjXkTTXNFa 89bimXnXxHM1GxHY5+RiYiOnEa6FFa1G8S+PjoDut1uL2PKZjHhJvDeeoSZsivjH4mLA 9MX3FQZlAeQ5d/WPsEH84nLegsJAwojNeh85anGCeA4rWgBwcqCkNVBhsNilOIjZiY3l zwjMKLdADbTY7AKqzSlHdN3cH4B+8FcyCfGX/wnegpUW/VE7sSpYI1ILLX5RMF+69XYb aZ2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=O0NaSZHR; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y101si2009330ede.101.2021.03.18.09.22.30; Thu, 18 Mar 2021 09:22:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=O0NaSZHR; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232117AbhCRQV6 (ORCPT + 99 others); Thu, 18 Mar 2021 12:21:58 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50618 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231853AbhCRQVt (ORCPT ); Thu, 18 Mar 2021 12:21:49 -0400 Received: from mail-qt1-x82b.google.com (mail-qt1-x82b.google.com [IPv6:2607:f8b0:4864:20::82b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B02B1C06174A; Thu, 18 Mar 2021 09:21:49 -0700 (PDT) Received: by mail-qt1-x82b.google.com with SMTP id l13so4477963qtu.9; Thu, 18 Mar 2021 09:21:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references:mime-version :content-transfer-encoding; bh=niDtTWOYXUYFGcJaJ5bNloNgVTsHS/48zJQic+B6298=; b=O0NaSZHRa4oaubxXOXvR9ECkxXl3VsMSA0baqxLoTGwGgsa/aLGUAQLHtQYHh8BOZw zFKWaxQleLrz07PBZJ/9yih3IAy2ALOPncpwe19kc05rGRYXQna+rkq1qLRVyVeg27AZ quKgV3sk4k1tTttpHeuKbHGlDvIuAbEaj6ILNA+Eh4vHRlimSw97z94okOLrOQC07s/k SNy+GzoSyFZiUnSEILfMBo9P/aqXVTWqrBduYo2MYh4slHzw1uBXEfOJ4Wfiw7E4aUhz EUGgHNX5+EDDB6IIImjb/06guSWlDyPBzdshIwYmkATVceWKy4Xk3me/YF/kHAVba+2Q MNFA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=niDtTWOYXUYFGcJaJ5bNloNgVTsHS/48zJQic+B6298=; b=VPl+3/20lwHLwXc/C7eGo1U59WxHRXdAR3v+zpF9sotq/EGv0JUG6PhDwbrPsJJW3W mmpFc/HXbaruLbGlSXFj8zwJKVvD9OYNl0oTXhAQqn+omTTr5AzaRpiY+oaswntA/eCU fVpNogRkiRUu0A4bxffdBQhoScrZ40BoC3Y4EyGn1Jc0ZFyMVZk1Q5+q2JAwAduy4tSy 5iT/aHWBAhGikQ2o+ejvPqRkjYv0uux5Ey2Eci79E1tne/G0N3pj3EVicYSKj/0W6vKB YY5I6+XlDFNlb2JyffXJ8yUXMZ0McGHxtK1k+JhODNuidVzLH6f+LEFJD24IjMlyQ4Uz D1qA== X-Gm-Message-State: AOAM5309z+Sa6pVSMYulZzzVwuIAs1rRMqQAij4k0hH28CmWj/cJ2tOY nJhjiz4qEbREMufOybPovTs= X-Received: by 2002:ac8:59c9:: with SMTP id f9mr4476911qtf.234.1616084508963; Thu, 18 Mar 2021 09:21:48 -0700 (PDT) Received: from tong-desktop.local ([2601:5c0:c200:27c6:d4e9:423a:4aca:b208]) by smtp.googlemail.com with ESMTPSA id d14sm2230722qkg.33.2021.03.18.09.21.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 18 Mar 2021 09:21:48 -0700 (PDT) From: Tong Zhang To: Giovanni Cabiddu , Herbert Xu , "David S. Miller" , Andy Shevchenko , Tong Zhang , Fiona Trahe , Tadeusz Struk , qat-linux@intel.com, linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, Wojciech Ziemba Subject: [PATCH v4 1/2] crypto: qat - don't release uninitialized resources Date: Thu, 18 Mar 2021 12:21:04 -0400 Message-Id: <20210318162105.378239-2-ztong0001@gmail.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org adf_vf_isr_resource_alloc() is not unwinding correctly when error happens and it tris to release uninitialized resources. To fix this, only release initialized resources. [ 1.792845] Trying to free already-free IRQ 11 [ 1.793091] WARNING: CPU: 0 PID: 182 at kernel/irq/manage.c:1821 free_irq+0x202/0x380 [ 1.801340] Call Trace: [ 1.801477] adf_vf_isr_resource_free+0x32/0xb0 [intel_qat] [ 1.801785] adf_vf_isr_resource_alloc+0x14d/0x150 [intel_qat] [ 1.802105] adf_dev_init+0xba/0x140 [intel_qat] Signed-off-by: Tong Zhang Reviewed-by: Andy Shevchenko Fixes: dd0f368398ea ("crypto: qat - Add qat dh895xcc VF driver") Acked-by: Giovanni Cabiddu --- drivers/crypto/qat/qat_common/adf_vf_isr.c | 17 +++++++++++++---- 1 file changed, 13 insertions(+), 4 deletions(-) diff --git a/drivers/crypto/qat/qat_common/adf_vf_isr.c b/drivers/crypto/qat/qat_common/adf_vf_isr.c index 38d316a42ba6..888388acb6bd 100644 --- a/drivers/crypto/qat/qat_common/adf_vf_isr.c +++ b/drivers/crypto/qat/qat_common/adf_vf_isr.c @@ -261,17 +261,26 @@ int adf_vf_isr_resource_alloc(struct adf_accel_dev *accel_dev) goto err_out; if (adf_setup_pf2vf_bh(accel_dev)) - goto err_out; + goto err_disable_msi; if (adf_setup_bh(accel_dev)) - goto err_out; + goto err_cleanup_pf2vf_bh; if (adf_request_msi_irq(accel_dev)) - goto err_out; + goto err_cleanup_bh; return 0; + +err_cleanup_bh: + adf_cleanup_bh(accel_dev); + +err_cleanup_pf2vf_bh: + adf_cleanup_pf2vf_bh(accel_dev); + +err_disable_msi: + adf_disable_msi(accel_dev); + err_out: - adf_vf_isr_resource_free(accel_dev); return -EFAULT; } EXPORT_SYMBOL_GPL(adf_vf_isr_resource_alloc); -- 2.25.1