Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3603007pxb; Mon, 24 Jan 2022 13:17:01 -0800 (PST) X-Google-Smtp-Source: ABdhPJyN6YHHAzC5BcQmlb4RN/DbVJeeqa/f3jWyYeYmihauZ+GuDnwJ3RadlogIKGC7fxRZMyav X-Received: by 2002:a17:903:4101:b0:14a:cae5:48a with SMTP id r1-20020a170903410100b0014acae5048amr16065782pld.25.1643059021251; Mon, 24 Jan 2022 13:17:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643059021; cv=none; d=google.com; s=arc-20160816; b=xQerRZqNkrv1J/Rxxd8D+Rf2K42oOd4qNxL1c++9WbHvkcjP6+L1tkzLVBhacgGuTT 2AQxoRDLlhzqsyh0sF4UktsgBH/7wUR6AUZdzHYLANhhLNYD6OeFVGeotnFbtAAnREOS zSZoyJtE13zJOOwTuYwmxMMxJv2OaefrvVFI1sQTWLTnglWVYOW2/eAJYqC19Rg5RXiR y+uWNVNvhoa2+2shukkYAaIiPVCsGxFKAMiXVGgmDon2LY78HsTLTC6RQK+Bj1ClRJxJ SYhZ4yZa4e7xPsNyrbP25pfEhJljyuIMmpGyupB1a/UZ20x5KSILAqpOqC3fcqqUmauI GvRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=U7tqOKJzyvVhZ1rjHRQAS98nwq2mVBy2IRnbyZvURaM=; b=V0QS6QetlerleaKC0BezJ23EPdkncXUYoXGLPB7lQJBY23qqnaR/Bxqrs/Rp60Q/Z1 udj79c+ao5Dj9P1heJ8MetKsj9dqt9NqAwNUfYoZ0WNofwVy24q1qNf73GU50ROzWbYY DCdai/htg2j2N5rNdcJI3DgX8/EI7AurwzhrVQzDoK/0usQLVHgNm2wmGxZm8VxJxKDx k8Vw8LAZFJJ8Md3VDvZjf/aDTcBRM9WWOYqFAfpvACIlXzqXrMW4HmWcWsY6DodzaFDf dhpJ5cAVpMppxfFsuD3ny5RxrvQNwWdSTAn0GYvcJLB1khRwuJl90wpvhkbrFYXUZWTX a3cQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=myuPjuFj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v20si150494plg.520.2022.01.24.13.16.48; Mon, 24 Jan 2022 13:17:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=myuPjuFj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1392628AbiAXUvi (ORCPT + 99 others); Mon, 24 Jan 2022 15:51:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38038 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1383988AbiAXU2e (ORCPT ); Mon, 24 Jan 2022 15:28:34 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D22B7C082569; Mon, 24 Jan 2022 11:42:16 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 742046131E; Mon, 24 Jan 2022 19:42:16 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 5D8DBC340E5; Mon, 24 Jan 2022 19:42:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643053335; bh=iQYvZKOwn04GejAiJzx17eTC96LSLpLWKisII9IwQuA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=myuPjuFjk4rSHMOiV2h3t49InYLtldPliquCn41QxdUa5Dyb+i5DTelQrQ7lOnd3I KF5nz6nRhU/SKS3wb7l4w24w2hOeUrukbxk1ed4ZstWDntB5wgVGhTUzIMx6kws7ap P3hSdBLkx+5q5401ApFxa87YtnlnlCYpJTQJGAqU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Marc Kleine-Budde Subject: [PATCH 5.10 030/563] can: softing_cs: softingcs_probe(): fix memleak on registration failure Date: Mon, 24 Jan 2022 19:36:35 +0100 Message-Id: <20220124184025.465893806@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit ced4913efb0acc844ed65cc01d091a85d83a2082 upstream. In case device registration fails during probe, the driver state and the embedded platform device structure needs to be freed using platform_device_put() to properly free all resources (e.g. the device name). Fixes: 0a0b7a5f7a04 ("can: add driver for Softing card") Link: https://lore.kernel.org/all/20211222104843.6105-1-johan@kernel.org Cc: stable@vger.kernel.org # 2.6.38 Signed-off-by: Johan Hovold Reviewed-by: Greg Kroah-Hartman Signed-off-by: Marc Kleine-Budde Signed-off-by: Greg Kroah-Hartman --- drivers/net/can/softing/softing_cs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/can/softing/softing_cs.c +++ b/drivers/net/can/softing/softing_cs.c @@ -293,7 +293,7 @@ static int softingcs_probe(struct pcmcia return 0; platform_failed: - kfree(dev); + platform_device_put(pdev); mem_failed: pcmcia_bad: pcmcia_failed: