Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4899424imc; Mon, 25 Feb 2019 13:14:27 -0800 (PST) X-Google-Smtp-Source: AHgI3Ia51rbNBxNyYgu8qk1C8vzeCl+UO0DE4zCHWhV15Lm1k8/r5u2un4JzFP+EaieQhQFtuBM2 X-Received: by 2002:a63:fb0b:: with SMTP id o11mr3767403pgh.222.1551129267562; Mon, 25 Feb 2019 13:14:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551129267; cv=none; d=google.com; s=arc-20160816; b=FYH3BXtFK/idg4p4lbnks6PAjj9H2s3jckmx62sdkV82FMqjFKooZykTwA/7hpCOs+ 8zages7on0oqiyU08qnwm1omL+SnoJ2icdOAJK+v+I5/2yRr9vKAkrbnp5k1kcLUHGeo Rkof7PUCaiyn2SS24Ri/3Mc3PrgpSw8PRqp1MlLXGBCJo/nEv+e9p14kyxO+eq/1pzCv zjAxJimIU5L7f9b0hrhpKoZiZhf0kDqUqbvj9LseOjbP/pM/AJhhau2QGk6xFMPNDj1E E8jEMaQZtGf9dGU9yAEtYgYE1b64XQGvGXgkoXNcI33YKyzAm0VrJ4KiWkRM080DdhxL 8CuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tp5TjNkltGIKBsECaHS3B95iU0A/42ucApigU2IUGqc=; b=td+V5K2Z9b7QPFe8MuER10xIPUoUKq+1Q0Fy8eJVB83Dyb7R5aQrKQl3wdTgWxmulA e5saylFT45/HoACF1KS6BmiNnaSNlTygesprhbCG4zWn/F+G30FSGWIicI00QvCcbs44 t03bdaKYo168d9yTxxvcoqjeYkp2WgjQSK7gIvmPDrUDQCeTmWJZtkH2IJMZ5R+3dvkw UXeMvKW1Y5GD0jPPL68gG17tJdbYZcD3C4h81vP5Mn9fcRJ3DIMaMdDGS7dyEQIs1e5d MvwUFQdv27WlTpdpiYZTTEYINJrd3499Djy8aeImTLVvAagVSRAq5ygJ5sS+kelds05u S1Uw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KrReDcq2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f3si6591573plo.369.2019.02.25.13.14.12; Mon, 25 Feb 2019 13:14:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=KrReDcq2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728938AbfBYVN1 (ORCPT + 99 others); Mon, 25 Feb 2019 16:13:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:43994 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727013AbfBYVNZ (ORCPT ); Mon, 25 Feb 2019 16:13:25 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9A99F2084D; Mon, 25 Feb 2019 21:13:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551129205; bh=Dy5H/FCNRxJvqjb/IB80/mKhiU7fqeTpy9RrJVzDDO0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KrReDcq2mZ0clYNCllTXJEmj28qPP7roUe9jtgmTGIfxUW3kpb8otrnETpAIA3J7a F7LnsaA3T5Cuw+qVPBIqtCAjFgDzZ2qQ5z91+w18fWtwuNDyDn8vZDzjPYkNhR1QM1 j6XZVV/wLeSevkpEfsre60NL2Ldb4w2kC4yoVjAk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joao Pinto , "David S. Miller" , Giuseppe Cavallaro , Alexandre Torgue , Jose Abreu , Sasha Levin Subject: [PATCH 4.9 21/63] net: stmmac: Fix PCI module removal leak Date: Mon, 25 Feb 2019 22:11:21 +0100 Message-Id: <20190225195037.352579420@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195035.713274200@linuxfoundation.org> References: <20190225195035.713274200@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 6dea7e1881fd86b80da64e476ac398008daed857 ] Since commit b7d0f08e9129, the enable / disable of PCI device is not managed which will result in IO regions not being automatically unmapped. As regions continue mapped it is currently not possible to remove and then probe again the PCI module of stmmac. Fix this by manually unmapping regions on remove callback. Changes from v1: - Fix build error Cc: Joao Pinto Cc: David S. Miller Cc: Giuseppe Cavallaro Cc: Alexandre Torgue Fixes: b7d0f08e9129 ("net: stmmac: Fix WoL for PCI-based setups") Signed-off-by: Jose Abreu Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c index eafc28142cd21..49eaede34eea6 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c @@ -231,7 +231,17 @@ static int stmmac_pci_probe(struct pci_dev *pdev, */ static void stmmac_pci_remove(struct pci_dev *pdev) { + int i; + stmmac_dvr_remove(&pdev->dev); + + for (i = 0; i <= PCI_STD_RESOURCE_END; i++) { + if (pci_resource_len(pdev, i) == 0) + continue; + pcim_iounmap_regions(pdev, BIT(i)); + break; + } + pci_disable_device(pdev); } -- 2.19.1