Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4442714ybz; Tue, 21 Apr 2020 00:14:05 -0700 (PDT) X-Google-Smtp-Source: APiQypJhBLSGLGwkBbBsbLmNTUh+sy7FqJGPCI0Zcb/mej7KLd0J8zclTD5VPfocScjI4iBbRoC7 X-Received: by 2002:aa7:d056:: with SMTP id n22mr17297597edo.281.1587453245759; Tue, 21 Apr 2020 00:14:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587453245; cv=none; d=google.com; s=arc-20160816; b=WAz6AigW1HrQpVhvujGl1wRRV9nfmRhghOrb898iKkZlYbqjONMcCm6xjPGuUDlJOd ZOihEcsBlcdWAnwp91Jm+Hxn+CeXjdqfuUZDixWKNrgdRqhFWZroOlQ5yQI/iHWzXqin LuePTqRg6GJz+ReYTZhkFBAtR5Df69GNtVkq4VPRI1DMVIRuArSbaD1T7yHmODCM9W/n xvi/XKQ3osmM3ja3OEuU30Q569q0cvR6qj8cP2uMCxCLl9OyFFgLiFnAnJE8cE+PlUYh lG8U7nBMcZMq1s+IFfzRBkL1wWZP25cibW54/ypqrCvnP+klozDkhP6jhjqZt+pvs70B RhXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=+hwxkr5sYhs9fzBGpKXtAOr+n7NA3qXWmzow32hEhng=; b=OD1FLfCwBD7+cSNLukoOcBIac/gsQIAarmZwCzAvtb5RvBk2M0oNEn2J+Wtkf8i9mG tgwMijxoT8mAHMj0xj0AxJ65aHfrYa/gylx7W2BjA2RqYAptLa5dVsMet32724JlR851 5oc9ca65ytfyIZE2Hkb6z1ZhrxhmM4d+TTV+UTBlwnui/zCHtK9VyBBY++XicpNtCacK HzLREXj/ajPrFbZsJCf1FAXlKACLcEPo5IV80EuXY0czMnh3paky0yEdpo6OXviBPXLX gKh3pO+HjUxTmFFgRIKmjhErd3WqqhxByropJY8uPvDkRTE0Fw7/ObA41hCFqDY7P0+s jlUg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v10si1130660edl.365.2020.04.21.00.13.43; Tue, 21 Apr 2020 00:14:05 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726600AbgDUHMo (ORCPT + 99 others); Tue, 21 Apr 2020 03:12:44 -0400 Received: from hfcrelay.icp-osb-irony-out1.external.iinet.net.au ([203.59.1.81]:1566 "EHLO hfcrelay.icp-osb-irony-out1.external.iinet.net.au" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725989AbgDUHMo (ORCPT ); Tue, 21 Apr 2020 03:12:44 -0400 X-SMTP-MATCH: 0 X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A2BOAQAhnJ5e/xsiIRsNWRwBAQEBAQc?= =?us-ascii?q?BAREBBAQBAYF7hEeEHo9QAQEGgQotigCRTgoBAQEBAQEBAQE3BAEBhEQCgjQ?= =?us-ascii?q?4EwIQAQEBBQEBAQEBBQMBhXeGSgEBAQMjFUEQCxgCAiYCAlcGAQwGAgEBgyK?= =?us-ascii?q?CTAMJsC11gTKFT4J+IU6BQIEOKoxTeYEHgTiCOy4+hBWDS4JfBJhkmSMIgka?= =?us-ascii?q?XayOcV49wnn+BeDMaCCgIgyRQJZFkF443YoxsgkUBAQ?= X-IPAS-Result: =?us-ascii?q?A2BOAQAhnJ5e/xsiIRsNWRwBAQEBAQcBAREBBAQBAYF7h?= =?us-ascii?q?EeEHo9QAQEGgQotigCRTgoBAQEBAQEBAQE3BAEBhEQCgjQ4EwIQAQEBBQEBA?= =?us-ascii?q?QEBBQMBhXeGSgEBAQMjFUEQCxgCAiYCAlcGAQwGAgEBgyKCTAMJsC11gTKFT?= =?us-ascii?q?4J+IU6BQIEOKoxTeYEHgTiCOy4+hBWDS4JfBJhkmSMIgkaXayOcV49wnn+Be?= =?us-ascii?q?DMaCCgIgyRQJZFkF443YoxsgkUBAQ?= X-IronPort-AV: E=Sophos;i="5.72,409,1580745600"; d="scan'208";a="288535545" Received: from 27-33-34-27.tpgi.com.au (HELO [192.168.0.106]) ([27.33.34.27]) by icp-osb-irony-out1.iinet.net.au with ESMTP; 21 Apr 2020 15:12:37 +0800 Subject: Re: [PATCH] m68k/PCI: Fix a memory leak in an error handling path To: Christophe JAILLET , geert@linux-m68k.org, bhelgaas@google.com, lorenzo.pieralisi@arm.com Cc: linux-m68k@lists.linux-m68k.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org References: <20200418070751.25420-1-christophe.jaillet@wanadoo.fr> From: Greg Ungerer Message-ID: <3a465332-532b-00f1-bca0-4ead5228ebd9@linux-m68k.org> Date: Tue, 21 Apr 2020 17:12:34 +1000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.7.0 MIME-Version: 1.0 In-Reply-To: <20200418070751.25420-1-christophe.jaillet@wanadoo.fr> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Christophe, On 18/4/20 5:07 pm, Christophe JAILLET wrote: > If 'ioremap' fails, we must free 'bridge', as done in other error handling > path bellow. > > Fixes: 19cc4c843f40 ("m68k/PCI: Replace pci_fixup_irqs() call with host bridge IRQ mapping hooks") > Signed-off-by: Christophe JAILLET Looks good, thanks. I will queue this in the for-next branch of the m68knommu tree. Regards Greg > --- > arch/m68k/coldfire/pci.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/arch/m68k/coldfire/pci.c b/arch/m68k/coldfire/pci.c > index 62b0eb6cf69a..84eab0f5e00a 100644 > --- a/arch/m68k/coldfire/pci.c > +++ b/arch/m68k/coldfire/pci.c > @@ -216,8 +216,10 @@ static int __init mcf_pci_init(void) > > /* Keep a virtual mapping to IO/config space active */ > iospace = (unsigned long) ioremap(PCI_IO_PA, PCI_IO_SIZE); > - if (iospace == 0) > + if (iospace == 0) { > + pci_free_host_bridge(bridge); > return -ENODEV; > + } > pr_info("Coldfire: PCI IO/config window mapped to 0x%x\n", > (u32) iospace); > >