From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 6918FC6FA99 for ; Fri, 3 Mar 2023 22:54:51 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232541AbjCCWyu (ORCPT ); Fri, 3 Mar 2023 17:54:50 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232987AbjCCWyq (ORCPT ); Fri, 3 Mar 2023 17:54:46 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 60D1D2BEF6; Fri, 3 Mar 2023 14:54:14 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id EE3D8B81A23; Fri, 3 Mar 2023 21:47:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AE38CC433A0; Fri, 3 Mar 2023 21:47:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1677880039; bh=IrJ5E0bGRhC1as+odz5Z3Y0jR45FkR8gwv6cGovNbRM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pjWaNu3B9gINSZJuSVIOg/REDHmKj8ufhW2L/26DKmvsOs5KujCsOhD0g2WFgFSjk Z5Lq2TgDWuG3jLw6d3ip50lNlhcmXWjCbRnEFfH5HbSsqA2wmezZfuGY+nOlf6jIM1 HYV8MuZfwbsFp6jwF/xS9cyaDuvtFFkjKDGu1FYh/JDs/NBMaTxeCJxAbN8x6VNjDG dM+dyZAE+1NPHuaKvbdEFpDBcWBcmO5x8e2HGl7HCSgGMISYcIbpPIGGHgUgu0puve my6fHqA7lFlh+sXioB3vUWnfeNNFoNSpgorXTOUnOVmsvRdAfMvd00uywMbIi7w8+l ATJBvpb2ATUNQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Vasant Hegde , Matt Fagnani , Suravee Suthikulpanit , Joerg Roedel , Sasha Levin , joro@8bytes.org, will@kernel.org, iommu@lists.linux.dev Subject: [PATCH AUTOSEL 5.10 02/30] iommu/amd: Fix error handling for pdev_pri_ats_enable() Date: Fri, 3 Mar 2023 16:46:47 -0500 Message-Id: <20230303214715.1452256-2-sashal@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230303214715.1452256-1-sashal@kernel.org> References: <20230303214715.1452256-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org From: Vasant Hegde [ Upstream commit 080920e52148b4fbbf9360d5345fdcd7846e4841 ] Current code throws kernel warning if it fails to enable pasid/pri [1]. Do not call pci_disable_[pasid/pri] if pci_enable_[pasid/pri] failed. [1] https://lore.kernel.org/linux-iommu/15d0f9ff-2a56-b3e9-5b45-e6b23300ae3b@leemhuis.info/ Reported-by: Matt Fagnani Signed-off-by: Vasant Hegde Reviewed-by: Suravee Suthikulpanit Link: https://lore.kernel.org/r/20230111121503.5931-1-vasant.hegde@amd.com Signed-off-by: Joerg Roedel Signed-off-by: Sasha Levin --- drivers/iommu/amd/iommu.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c index f216a86d9c817..bb0983c9fbdf4 100644 --- a/drivers/iommu/amd/iommu.c +++ b/drivers/iommu/amd/iommu.c @@ -2078,17 +2078,17 @@ static int pdev_iommuv2_enable(struct pci_dev *pdev) /* Only allow access to user-accessible pages */ ret = pci_enable_pasid(pdev, 0); if (ret) - goto out_err; + return ret; /* First reset the PRI state of the device */ ret = pci_reset_pri(pdev); if (ret) - goto out_err; + goto out_err_pasid; /* Enable PRI */ ret = pci_enable_pri(pdev, reqs); if (ret) - goto out_err; + goto out_err_pasid; if (reset_enable) { ret = pri_reset_while_enabled(pdev); @@ -2098,12 +2098,14 @@ static int pdev_iommuv2_enable(struct pci_dev *pdev) ret = pci_enable_ats(pdev, PAGE_SHIFT); if (ret) - goto out_err; + goto out_err_pri; return 0; -out_err: +out_err_pri: pci_disable_pri(pdev); + +out_err_pasid: pci_disable_pasid(pdev); return ret; -- 2.39.2