Received: by 2002:a05:6a10:9e8c:0:0:0:0 with SMTP id y12csp373412pxx; Wed, 28 Oct 2020 06:59:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpd98uoQZCbYQ5Jx1ttzZcqC7/W4bk8VHPziPdLuIc/LfWqQqsqKXTSWybMOZH84XPbA0Y X-Received: by 2002:a17:906:2895:: with SMTP id o21mr8038739ejd.332.1603893570559; Wed, 28 Oct 2020 06:59:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603893570; cv=none; d=google.com; s=arc-20160816; b=A+QRWXrH/yD8RlFMmOogCCP6LrHkvQPvO+O3t8veSxj3zglesn8Wyna5S8gwEQYL6T fEi0YZRPnb8eKzFt6asU2l5tVlQd2Di/5gJlkJcxe57si/twcVQqYkaN69+21Vxmb9YD YPYrdGfE+on4QOGDf37VWQkEWYLmTVsR9hu9EBRWSUDG8/Z/dCMzdFMMfN09iHZupume Jqx6DJBgen9Fq3ER432s24l8X6LiiccooceRjoN9FKxERdOBJlI2Dt8Y7JcYpP9t8a6m c62KBmuAWAfPdgkdQdXYX3e2beZ5ku/b5IbZdSd3Pb+v+3rxpk2dbUQd6dUKJmuoDr6R k0PA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=p3VOsEv6jTBx5E11Jcs15kr2nueTIfFGXFDH5lNMF2I=; b=R/cOHcPxt+9LLvyqA1KZk8O25IW5aStTq7qwRIrtY3RWR65rIh4DneSexjL8Jw76Ym TiZW9boNXjIf2hVQuBzLnfot8mzGAZRMI9Mzk2eRnEu+g0oYwlZagC2gUk5bBgLU5KLj cleaQDB36PI8zM2BnVIjVtoiQOsJniOQQcEzUWVNaQzb3A21IkN/0mVhVw4sZBOED1PZ dp05kuSLekeJFlCIad5g6wOtjZREwgbV2ugq5KoIbDL8Fq+Pzhanv3l7m7QpFfhyTaXy lUB1uZzXb1ZlYTD7G1f1a+QfdE7viB74rPONQrDiYrDUGAae5K9pjrOQqHsbkIAiQYHq G4iA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bEPW86AD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w11si2719069ejq.533.2020.10.28.06.59.07; Wed, 28 Oct 2020 06:59:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=bEPW86AD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1803562AbgJ0PxG (ORCPT + 99 others); Tue, 27 Oct 2020 11:53:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:45010 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1798575AbgJ0P24 (ORCPT ); Tue, 27 Oct 2020 11:28:56 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0ADC922282; Tue, 27 Oct 2020 15:28:51 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1603812532; bh=9JQDxN238P8XgUMNbhtOC1rAp8RS2RnpnB2Lr3wWk8c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=bEPW86AD9bjjbWadIezhGwA6y09MEoE/Y0vjONr/gtdjM5NOjpUZ4cQ7l69Bt8dT4 4FJ+JHsE+mZjUff1j/TVe3nhm59QsmzGN8urbEtiDVQJ17R6E8eHgNspgVgGMCz81T Hg4hjxaobnq5cLnq3sLugebf14c4HOktWLZ2ONAI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dinghao Liu , Ajay Singh , Kalle Valo , Sasha Levin Subject: [PATCH 5.9 211/757] wilc1000: Fix memleak in wilc_bus_probe Date: Tue, 27 Oct 2020 14:47:41 +0100 Message-Id: <20201027135500.511636058@linuxfoundation.org> X-Mailer: git-send-email 2.29.1 In-Reply-To: <20201027135450.497324313@linuxfoundation.org> References: <20201027135450.497324313@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dinghao Liu [ Upstream commit 9a19a939abfa7d949f584a7ad872e683473fdc14 ] When devm_clk_get() returns -EPROBE_DEFER, spi_priv should be freed just like when wilc_cfg80211_init() fails. Fixes: 854d66df74aed ("staging: wilc1000: look for rtc_clk clock in spi mode") Signed-off-by: Dinghao Liu Acked-by: Ajay Singh Signed-off-by: Kalle Valo Link: https://lore.kernel.org/r/20200820055256.24333-1-dinghao.liu@zju.edu.cn Signed-off-by: Sasha Levin --- drivers/net/wireless/microchip/wilc1000/spi.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/drivers/net/wireless/microchip/wilc1000/spi.c b/drivers/net/wireless/microchip/wilc1000/spi.c index 3f19e3f38a397..a18dac0aa6b67 100644 --- a/drivers/net/wireless/microchip/wilc1000/spi.c +++ b/drivers/net/wireless/microchip/wilc1000/spi.c @@ -112,9 +112,10 @@ static int wilc_bus_probe(struct spi_device *spi) wilc->dev_irq_num = spi->irq; wilc->rtc_clk = devm_clk_get(&spi->dev, "rtc_clk"); - if (PTR_ERR_OR_ZERO(wilc->rtc_clk) == -EPROBE_DEFER) + if (PTR_ERR_OR_ZERO(wilc->rtc_clk) == -EPROBE_DEFER) { + kfree(spi_priv); return -EPROBE_DEFER; - else if (!IS_ERR(wilc->rtc_clk)) + } else if (!IS_ERR(wilc->rtc_clk)) clk_prepare_enable(wilc->rtc_clk); return 0; -- 2.25.1