Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp4103457ybe; Mon, 9 Sep 2019 04:21:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqxK14sBnztvfSTgxBEZIfKfxkQ1SIb0Hlp2BOhthA53MDuPgo3Cz+d1TnVrU3IRgnYpltu8 X-Received: by 2002:a50:ec87:: with SMTP id e7mr23427694edr.220.1568028107102; Mon, 09 Sep 2019 04:21:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568028107; cv=none; d=google.com; s=arc-20160816; b=sTOYQMzcsZBRFZRZ7uUxGVzuCYBnPBmKnehIA1E9on5Na6/J1YnKkrBMPCWOy/f/wc ONCdR0bEaQ51PBsqpn4ZxTZxLkW3nMhmZXVHWLSd9B9yjo8tyWFw/YAVbNKQdXsyX+Zx mtZC7KB3DKsCmlAsyE1Wk4SinxmPWtsOkerteUQDVmSgKe09pvtyQs1bvWdMrJfDKmRY BHPpj5U+BXW1K5TYytSyRFya7Hg8VAkmyHwjl2cdOrZmnImJm20j3oovJrnM1ff4NwRg 4OZ7G/FJs+1NeblUMDjZjcVl0Tz017Gb/0aPM4R31Nd3C7aMTUvRSJEv565QljL2XhIP va1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=k9Az2Itq+hOknzlb8PTf4Fhb4E/8PRi+XaDMsGJsMcI=; b=xJ1x7XQYnpTUI9X1/TZs9Y7xJ/161oc98k4Nm8cGdN19YrEU774nR48pFxW4DQW5NQ jtbOFbIgyp8ap5Bj2Cr7etg/apq+gYKnEl2WWMxZdRhzGsanfFmh0iIBgQA/3OLf+35w 5HR11D1EnJYjI5xhnEzJxvYspHVnkzEMmBPZgSjOlw1XZrLlqkTsnMHxUCyNrr/MiMpF fs6CzVWz6L29sAYnDEB6Ah8MZCiF5t75bRdCcujuCZIzQIQ3c75fRYzdyCbDqPTYvG9G DsiJkF0y5bmXCnu2ObFc92+Z6ccxoa3kXGT/eQ/TlSB29KmEShCJXEqZyJc6iS5bt+Zw 3ssA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LIDvl5bf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v2si9270367edm.80.2019.09.09.04.21.21; Mon, 09 Sep 2019 04:21:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=LIDvl5bf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730067AbfIHMpU (ORCPT + 99 others); Sun, 8 Sep 2019 08:45:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:60376 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730024AbfIHMpM (ORCPT ); Sun, 8 Sep 2019 08:45:12 -0400 Received: from localhost (unknown [62.28.240.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 232B221927; Sun, 8 Sep 2019 12:45:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567946711; bh=Arer8dkUm8lSgpruEGvxWHMeV2nlWuAorFR9XbNy6OE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=LIDvl5bfntqIGMbrLzYdT9DYvlCAGuOaZ1ZaAAInBGRoHx15ZoZkEWc2wqIa5pxzI rcERjSpsRO140jIVt205V2zjWC5Eu1Sy7DSlUN7VFUaLZsGCA/rSprhH9VxoCqBbhs 30qzew/+obywwX8c/GPuG/6dbqU+yVZk6PnqpE9Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wenwen Wang , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 12/40] net: myri10ge: fix memory leaks Date: Sun, 8 Sep 2019 13:41:45 +0100 Message-Id: <20190908121120.447555029@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190908121114.260662089@linuxfoundation.org> References: <20190908121114.260662089@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 20fb7c7a39b5c719e2e619673b5f5729ee7d2306 ] In myri10ge_probe(), myri10ge_alloc_slices() is invoked to allocate slices related structures. Later on, myri10ge_request_irq() is used to get an irq. However, if this process fails, the allocated slices related structures are not deallocated, leading to memory leaks. To fix this issue, revise the target label of the goto statement to 'abort_with_slices'. Signed-off-by: Wenwen Wang Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/myricom/myri10ge/myri10ge.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/myricom/myri10ge/myri10ge.c b/drivers/net/ethernet/myricom/myri10ge/myri10ge.c index b171ed2015fe4..a0a555052d8ca 100644 --- a/drivers/net/ethernet/myricom/myri10ge/myri10ge.c +++ b/drivers/net/ethernet/myricom/myri10ge/myri10ge.c @@ -3922,7 +3922,7 @@ static int myri10ge_probe(struct pci_dev *pdev, const struct pci_device_id *ent) * setup (if available). */ status = myri10ge_request_irq(mgp); if (status != 0) - goto abort_with_firmware; + goto abort_with_slices; myri10ge_free_irq(mgp); /* Save configuration space to be restored if the -- 2.20.1