Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4924313imc; Mon, 25 Feb 2019 13:45:14 -0800 (PST) X-Google-Smtp-Source: AHgI3IY3E3J+CjhYTpijykZQ1SXCMVpU/PKKNAPEQ5cViE7t5qD6AyHVRNSTWjsE+d2QA/6U/whD X-Received: by 2002:aa7:8150:: with SMTP id d16mr22640328pfn.172.1551131113952; Mon, 25 Feb 2019 13:45:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551131113; cv=none; d=google.com; s=arc-20160816; b=0o6shiWuTSy9J4drhAaJh4R69vzDrG7ozSh9ikE3RlTYclHAAVvbk7WmGHjTl5UjKH 4WjYIkSXb/I4MY2YdxdoxiSyw+H31Na9WeK7ovUdA3w/IhXxp/q+1UcA79rWBYxQ8vTd D3tg4SMr5QXR9UIZY/UuDu2XpTfZ9PDXuPCmHTfYtGb+SC+yvuZAMANSdMhdghBRckEJ /a8i5o2aJZ8dSr0c14cvPUWIlyxWv5KoWG1AjYjaBrBDaRRgFIS3pDWGSmYE0cGCJoWA BPpMl1n5Jhmlsbho1COUpdJJ4Jw1I10Do3FWxM2WHxH8Y5ScyroFY5QIkrII9WE8amc4 3vkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wAzhTzx4oM0oTBDTwcF9Gc0HwT1ClxLG8olMY153N3Q=; b=CbnFtDXDnULzg0Y2mQEMVdoc0Ser66ggwMSdUiFj/VcZqnrOs34VtlzRNLnO9wzhmh aDSCYVygM7blORwAwaNE1S7LjqIdwK1YfYTO6rxvYJPIv7asgg6pTt1DRH3/HW7eKzhm ZUlg4oJo937W6JCiD1yxi8EM0OOpsYu6ZbXI2LBWvX6TjH7zDtXP79NXI3HqGBNt04q5 Rk8XaxDLj1JWKBRWQVv8PyUtLlZtsj0NrZKEwgBGVm0Z9bjsQR6gbHiNM7o8BL1yv0lN 3oeqU2ViLNaB4MjovMl18siA7Is6TXbUkN6KYL7ssJo5u880Hj2oyen9hwT1m5vg7FXK W92A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sqhTDeT5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d14si10222965pgn.536.2019.02.25.13.44.59; Mon, 25 Feb 2019 13:45:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=sqhTDeT5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729518AbfBYVnd (ORCPT + 99 others); Mon, 25 Feb 2019 16:43:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:36902 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731854AbfBYVbS (ORCPT ); Mon, 25 Feb 2019 16:31:18 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2868B217F5; Mon, 25 Feb 2019 21:31:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130277; bh=dMUkCp95rtcdWmG3fwdi42a4Zs9y1C47EWZRQPYoaKo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sqhTDeT5vuCA5dN9IrRffzKAdbff5QokMNjc/gHWQHAkpxvgbY9RO0OEsgDI6WkPW rG55RHeFB58NOlpvn145VMh7gauCkFCJEC71aQw516lzaYSOdtpDWGKQCX4X766au4 xPt1yZD6ihx1sExsz0+C4wum01qpFKBmWfqgb5Nc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joao Pinto , "David S. Miller" , Giuseppe Cavallaro , Alexandre Torgue , Jose Abreu , Sasha Levin Subject: [PATCH 4.20 071/183] net: stmmac: Fix PCI module removal leak Date: Mon, 25 Feb 2019 22:10:44 +0100 Message-Id: <20190225195106.457194838@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 6dea7e1881fd86b80da64e476ac398008daed857 ] Since commit b7d0f08e9129, the enable / disable of PCI device is not managed which will result in IO regions not being automatically unmapped. As regions continue mapped it is currently not possible to remove and then probe again the PCI module of stmmac. Fix this by manually unmapping regions on remove callback. Changes from v1: - Fix build error Cc: Joao Pinto Cc: David S. Miller Cc: Giuseppe Cavallaro Cc: Alexandre Torgue Fixes: b7d0f08e9129 ("net: stmmac: Fix WoL for PCI-based setups") Signed-off-by: Jose Abreu Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c b/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c index c54a50dbd5ac2..d819e8eaba122 100644 --- a/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c +++ b/drivers/net/ethernet/stmicro/stmmac/stmmac_pci.c @@ -299,7 +299,17 @@ static int stmmac_pci_probe(struct pci_dev *pdev, */ static void stmmac_pci_remove(struct pci_dev *pdev) { + int i; + stmmac_dvr_remove(&pdev->dev); + + for (i = 0; i <= PCI_STD_RESOURCE_END; i++) { + if (pci_resource_len(pdev, i) == 0) + continue; + pcim_iounmap_regions(pdev, BIT(i)); + break; + } + pci_disable_device(pdev); } -- 2.19.1