Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2914742pxb; Tue, 24 Aug 2021 10:29:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzwc5L34kgxI218msfSKQzh7jfTepGEeMx8CTF0nJ49AcJiwj1Vm4TEAkcbJ+Rfc0FaVyID X-Received: by 2002:a17:906:93e1:: with SMTP id yl1mr1033520ejb.334.1629826177508; Tue, 24 Aug 2021 10:29:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629826177; cv=none; d=google.com; s=arc-20160816; b=YKTNu5IYMcupB2973jDEw9Ulq6KkTUYjmu+lTB3s01eRXwEhvbPBXgpjGLAik343Ds d+4DkA4/SbZycXCCAIZxbJG9oZskHSE9Tr9wnbWaQtebbUFkhqBYUDCEjXwBezm4HsYG ki014uI6ZyNOJbgSDvYtJ2Gw9m1V1wCnJsUpEqo29SCyHwm+GzjvwxCIW0AphS7KMkNl dRlk44bG/PKVoQYz7bdGygoWxIeMCejiWJ6rwD/aRY0TpdZs4BLdIPT2jyxQv6PxZNGX 4c/bu+gg1gkXLqi1GK1SZ4sARTW7b6yjXpgAm1BxGp1JY9KZ4Sr6Eo+QQaLyGBIOKwBb Hz4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OjwDLO47sLdt8JB2Sahat224KX+ASmQeIBSXnzW/Xb0=; b=jVahjKHZ9he3CntCU2Y67ZuDEmv40mYbU9I0LKSs5TUXBxFZa+nbrTWQvpxjZBaUyc FtpZBfqUoYMIevw+llUnwQHaoX4cy59tvYA/k5ThmDZSrDHRiK2BUmiAyXcnI3uWf9jc dTIWJAITwkmCdrenFqkVIVT++mWBKGxpSTgsHZG0HSlHAtaqPTtRkx5dbnmaa+kRIKX9 pG53GGGqWBOgOfJEi0WtlvJIo26EAEyGcYOPLcRMPmOhI9TXDXen3QFFcD0yeEN/zX0g i+v9gTVDujj11T8f546n54zi8N1138e7G5p1T+yr7A8XJ5oAGdxRwtI7OaTrcK+BHCth HxcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=t1hd0Ark; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q9si18859521edw.397.2021.08.24.10.29.13; Tue, 24 Aug 2021 10:29:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=t1hd0Ark; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238441AbhHXR2V (ORCPT + 99 others); Tue, 24 Aug 2021 13:28:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:34266 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239780AbhHXRZP (ORCPT ); Tue, 24 Aug 2021 13:25:15 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4625961371; Tue, 24 Aug 2021 17:04:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1629824645; bh=RY9B9PnT2nmYguFTNFdS5JiDp9YawCsTPsaJ/DLOTZ4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=t1hd0ArkFprCr8hSvf6eEtyPWDjb3cNzSn8iUJRKBuj56BadPj7LmHmO+f+RmRrEC sqepo3yB4x4PmvxXDsm9By8Bzr3yTsrOOJ+0bVuOsVGxGvfxS0eQbSTzvjuRSPWGyx T4KiR+0WhtLEPl3pKw9HCLfvgdAa2MLuOhU0SH1LiJ8bUlnZJ3ryatX78EjrZGVVQ2 PxuXb++BylKy1R3Fegq/JzlL6LZYfHTh+z7yDhFCwYC5CmjOHgbfhb2VzxTyZhdxNr RhMgIj7Ud7Q3C8oZEqPcHGgPAZpZHGiAH8uEx8pQaDkXZ7hpR6ZwNicLQtvThOJF/Z 4uq5+5IocrrVg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Dongliang Mu , Greg Kroah-Hartman , Sasha Levin Subject: [PATCH 4.19 77/84] ipack: tpci200: fix memory leak in the tpci200_register Date: Tue, 24 Aug 2021 13:02:43 -0400 Message-Id: <20210824170250.710392-78-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210824170250.710392-1-sashal@kernel.org> References: <20210824170250.710392-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.205-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.205-rc1 X-KernelTest-Deadline: 2021-08-26T17:02+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dongliang Mu [ Upstream commit 50f05bd114a46a74726e432bf81079d3f13a55b7 ] The error handling code in tpci200_register does not free interface_regs allocated by ioremap and the current version of error handling code is problematic. Fix this by refactoring the error handling code and free interface_regs when necessary. Fixes: 43986798fd50 ("ipack: add error handling for ioremap_nocache") Cc: stable@vger.kernel.org Reported-by: Dongliang Mu Signed-off-by: Dongliang Mu Link: https://lore.kernel.org/r/20210810100323.3938492-2-mudongliangabcd@gmail.com Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/ipack/carriers/tpci200.c | 24 ++++++++++++++---------- 1 file changed, 14 insertions(+), 10 deletions(-) diff --git a/drivers/ipack/carriers/tpci200.c b/drivers/ipack/carriers/tpci200.c index 2172d1efa71e..4c8da6af2516 100644 --- a/drivers/ipack/carriers/tpci200.c +++ b/drivers/ipack/carriers/tpci200.c @@ -259,7 +259,7 @@ static int tpci200_register(struct tpci200_board *tpci200) "(bn 0x%X, sn 0x%X) failed to allocate PCI resource for BAR 2 !", tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); - goto out_disable_pci; + goto err_disable_device; } /* Request IO ID INT space (Bar 3) */ @@ -271,7 +271,7 @@ static int tpci200_register(struct tpci200_board *tpci200) "(bn 0x%X, sn 0x%X) failed to allocate PCI resource for BAR 3 !", tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); - goto out_release_ip_space; + goto err_ip_interface_bar; } /* Request MEM8 space (Bar 5) */ @@ -282,7 +282,7 @@ static int tpci200_register(struct tpci200_board *tpci200) "(bn 0x%X, sn 0x%X) failed to allocate PCI resource for BAR 5!", tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); - goto out_release_ioid_int_space; + goto err_io_id_int_spaces_bar; } /* Request MEM16 space (Bar 4) */ @@ -293,7 +293,7 @@ static int tpci200_register(struct tpci200_board *tpci200) "(bn 0x%X, sn 0x%X) failed to allocate PCI resource for BAR 4!", tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); - goto out_release_mem8_space; + goto err_mem8_space_bar; } /* Map internal tpci200 driver user space */ @@ -307,7 +307,7 @@ static int tpci200_register(struct tpci200_board *tpci200) tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); res = -ENOMEM; - goto out_release_mem8_space; + goto err_mem16_space_bar; } /* Initialize lock that protects interface_regs */ @@ -346,18 +346,22 @@ static int tpci200_register(struct tpci200_board *tpci200) "(bn 0x%X, sn 0x%X) unable to register IRQ !", tpci200->info->pdev->bus->number, tpci200->info->pdev->devfn); - goto out_release_ioid_int_space; + goto err_interface_regs; } return 0; -out_release_mem8_space: +err_interface_regs: + pci_iounmap(tpci200->info->pdev, tpci200->info->interface_regs); +err_mem16_space_bar: + pci_release_region(tpci200->info->pdev, TPCI200_MEM16_SPACE_BAR); +err_mem8_space_bar: pci_release_region(tpci200->info->pdev, TPCI200_MEM8_SPACE_BAR); -out_release_ioid_int_space: +err_io_id_int_spaces_bar: pci_release_region(tpci200->info->pdev, TPCI200_IO_ID_INT_SPACES_BAR); -out_release_ip_space: +err_ip_interface_bar: pci_release_region(tpci200->info->pdev, TPCI200_IP_INTERFACE_BAR); -out_disable_pci: +err_disable_device: pci_disable_device(tpci200->info->pdev); return res; } -- 2.30.2