Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp981743ybt; Wed, 17 Jun 2020 19:51:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwVJgiZbj6kfwMKs4iHjfSzwmJCDi8Wze/ISkSeZNJqRkMl78oeiR3Tb24rIXuWjfliUm75 X-Received: by 2002:a17:906:1c93:: with SMTP id g19mr1999140ejh.194.1592448694622; Wed, 17 Jun 2020 19:51:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592448694; cv=none; d=google.com; s=arc-20160816; b=OwiQTuzOG16aROXzQlAQkbF0qw8iWopXRED8oLtPtaZx3a+JqlJGwBrbFjYvWtPpMh UWe//APaP7PWo3ugCKxdsLJLTnrw3hnmHehnvtkizNbKDWz7frSorfLVIFBVl2IGv4Ns aneDW91CdtWl80TDTC8dEyTL+px14VlMltsLz7sJyPTZfvhkk2qHqh2HrI+GV85E6tT2 P1CIlreWwvBxPppTbr4INQxRb/LiKX5b5C9/NFMGKakf3MXDx8JO+q7o8mAgG1TgG9Qc u2Cehx5fkWbtwDwZpslyS4WOY5ScOoSq4EWufY8yR/FsOEBH6FTRzeTcXlEOjMRgN70c YI/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=9ACM5DrUCQwrCPpcph4vXjzILtl8M1Vak7AhuhwV7YY=; b=XNyhnZK51PiBx25P/lgKEt+BEWGWdYwKMaEwf+wTdJtpOEto3lyTuHSiLZ5mz+fFym FLPz1JooCac2OUUiZOG12PJbTxruYxIrmT4qOhM4zEY0f/FzZjr7FAsvaLA5x3t1huPL VAXRI0GtKw4XKoH8EQGfiz0UpSkGdsd1n8/BAPta+voilu5grkuDp2kH4rIxkkDGijpb DWx4Ri0/c8My6SMQmaQHslEVa+4kbfFOYVB4cMbz+NSEc8mmujmlSdv4MLmbm7+C55AY zy+jqGmA09hEoDO8DqqzFjzKvP7CjPATZITkPmARlDspZdch1d0ug0xkAbC1XEnjxtlL LX8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wRvY4VCU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x24si1048901ejs.448.2020.06.17.19.51.12; Wed, 17 Jun 2020 19:51:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wRvY4VCU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387923AbgFRCte (ORCPT + 99 others); Wed, 17 Jun 2020 22:49:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:36032 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728229AbgFRBJe (ORCPT ); Wed, 17 Jun 2020 21:09:34 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A86D521974; Thu, 18 Jun 2020 01:09:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592442574; bh=7tbR37TlDsxb2DvWezaDQ8YEVSOAqo98BHGh0rZj/rE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wRvY4VCUuImMS6UyljTGvuLvI+IS9bJFEWKT2i+vUTguinhvwUWACXnxRz2NkgnEk QABRCZMlz4ALgEuGzEV+91h2O60u1NjtavAX3mgMExRv34bliQ79zoFeiCgnnqzYwF EUy7LWPR4UtksNZfWlQBglpgNwSWeb205S5hVY2k= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Christophe JAILLET , Geert Uytterhoeven , Greg Ungerer , Sasha Levin , linux-m68k@lists.linux-m68k.org Subject: [PATCH AUTOSEL 5.7 067/388] m68k/PCI: Fix a memory leak in an error handling path Date: Wed, 17 Jun 2020 21:02:44 -0400 Message-Id: <20200618010805.600873-67-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200618010805.600873-1-sashal@kernel.org> References: <20200618010805.600873-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe JAILLET [ Upstream commit c3f4ec050f56eeab7c1f290321f9b762c95bd332 ] If 'ioremap' fails, we must free 'bridge', as done in other error handling path bellow. Fixes: 19cc4c843f40 ("m68k/PCI: Replace pci_fixup_irqs() call with host bridge IRQ mapping hooks") Signed-off-by: Christophe JAILLET Reviewed-by: Geert Uytterhoeven Signed-off-by: Greg Ungerer Signed-off-by: Sasha Levin --- arch/m68k/coldfire/pci.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/arch/m68k/coldfire/pci.c b/arch/m68k/coldfire/pci.c index 62b0eb6cf69a..84eab0f5e00a 100644 --- a/arch/m68k/coldfire/pci.c +++ b/arch/m68k/coldfire/pci.c @@ -216,8 +216,10 @@ static int __init mcf_pci_init(void) /* Keep a virtual mapping to IO/config space active */ iospace = (unsigned long) ioremap(PCI_IO_PA, PCI_IO_SIZE); - if (iospace == 0) + if (iospace == 0) { + pci_free_host_bridge(bridge); return -ENODEV; + } pr_info("Coldfire: PCI IO/config window mapped to 0x%x\n", (u32) iospace); -- 2.25.1