Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp996393pxb; Wed, 6 Apr 2022 06:18:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxlGzrJcv+mH/j63vkJLESY1Bu54rCB9xYItR0E74jKi2LCbrVX1+0lGDieywYE+EHXjlk1 X-Received: by 2002:a17:903:2283:b0:156:a2c6:f296 with SMTP id b3-20020a170903228300b00156a2c6f296mr8442131plh.10.1649251134619; Wed, 06 Apr 2022 06:18:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649251134; cv=none; d=google.com; s=arc-20160816; b=TaKYXRnLc83j2nQX6t7fGt47njNRApx5JjF0YVzUNiZBrBAA7yHjUnXYQAqJx+thmL 7RjKTNFXIaakpPpRbTxiPWBSpqYMPdRnVqMsOafwwFC69ERNrWMbZKz11WxupyMzhBxA 9s7HS43lARKN35WX8elUAJaTiqAjufofJgZR7n3ZHTx1Y+IZROE099xjtkVGau56OqbB wN96MOq0KY0fwjT/JvFiJdjZ+yuVo6hv7FPcTR9/zKZLDdgXVyGtXo3KJH+5GvVPC3Rv +xLf1mPTJA0ps4RwkyI9W7khexMkkjxaatP6u1EujWjxa7N/VlIHkFyWHyjJUTRHfEe6 IZxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nI9/hcuB0vrPtEhqlsuMYew3poV5g8isGeVzG95RiJE=; b=rT7h4NlA3AeHjPRCASN7fizRP5zwM9cLVi3Hq5dqGpXcN+Pcl/gO6SR11RLtzbBDnN DMQO2prXpRnybuJ6zmNg/Q+u5RpVXZ6aci+C87+m46S1qzhc9euHY/4Nbef3+zWvc2C0 7Gu1morDtHPi/bPe9qaBzSzYgIQNi2aDP0cBeGFTi2kieWAepnnBefcoySIVZ1kO7G8A xyOcMVXYazW2mTMPYln+93XooE9i/O0z0TpoFimAfWTHKjOrINcllSEHk3OpUm1p55T7 7OwIFhlB9mtSnjwqmWeY2i2iu1CON6JjyrKInGCBHVN0/tkqr8vbqisXkDWtU/jvhhuZ bsMw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TFRb0JRt; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id n33-20020a634d61000000b0038205c14f7dsi14620512pgl.170.2022.04.06.06.18.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 06:18:54 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=TFRb0JRt; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B598C2174AD; Wed, 6 Apr 2022 03:57:41 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1587423AbiDFAJJ (ORCPT + 99 others); Tue, 5 Apr 2022 20:09:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46718 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358461AbiDEK2Z (ORCPT ); Tue, 5 Apr 2022 06:28:25 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2EB0BA325; Tue, 5 Apr 2022 03:18:03 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5CBB461777; Tue, 5 Apr 2022 10:18:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6FBF4C385A0; Tue, 5 Apr 2022 10:18:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649153882; bh=3SyFg1Ox2BVv77hwr5Q+brbLvYJwdOjO6I/B8CTdJ5k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TFRb0JRtSmUneYTMtm+T523bX1K3ipI78fWC3Yth0iUMDWYK3gEFwCowNmdfehZ75 YfAgVlD5ijA/P2BSUoq6h2d2HCbNKjScUBbwt5Xd7kMloEp+R7JmQHlUQNKD1QdvfM tyH/L3bOpUWO9Qz1pnV+/3DyJBWy/5AcsF1S2cjg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Oleksij Rempel , Christophe JAILLET , Sasha Levin Subject: [PATCH 5.10 382/599] misc: alcor_pci: Fix an error handling path Date: Tue, 5 Apr 2022 09:31:16 +0200 Message-Id: <20220405070310.198300048@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070258.802373272@linuxfoundation.org> References: <20220405070258.802373272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe JAILLET [ Upstream commit 5b3dc949f554379edcb8ef6111aa5ecb78feb798 ] A successful ida_simple_get() should be balanced by a corresponding ida_simple_remove(). Add the missing call in the error handling path of the probe. While at it, switch to ida_alloc()/ida_free() instead to ida_simple_get()/ida_simple_remove(). The latter is deprecated and more verbose. Fixes: 4f556bc04e3c ("misc: cardreader: add new Alcor Micro Cardreader PCI driver") Reviewed-by: Oleksij Rempel Signed-off-by: Christophe JAILLET Link: https://lore.kernel.org/r/918a9875b7f67b7f8f123c4446452603422e8c5e.1644136776.git.christophe.jaillet@wanadoo.fr Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/misc/cardreader/alcor_pci.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/drivers/misc/cardreader/alcor_pci.c b/drivers/misc/cardreader/alcor_pci.c index de6d44a158bb..3f514d77a843 100644 --- a/drivers/misc/cardreader/alcor_pci.c +++ b/drivers/misc/cardreader/alcor_pci.c @@ -266,7 +266,7 @@ static int alcor_pci_probe(struct pci_dev *pdev, if (!priv) return -ENOMEM; - ret = ida_simple_get(&alcor_pci_idr, 0, 0, GFP_KERNEL); + ret = ida_alloc(&alcor_pci_idr, GFP_KERNEL); if (ret < 0) return ret; priv->id = ret; @@ -280,7 +280,8 @@ static int alcor_pci_probe(struct pci_dev *pdev, ret = pci_request_regions(pdev, DRV_NAME_ALCOR_PCI); if (ret) { dev_err(&pdev->dev, "Cannot request region\n"); - return -ENOMEM; + ret = -ENOMEM; + goto error_free_ida; } if (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM)) { @@ -324,6 +325,8 @@ static int alcor_pci_probe(struct pci_dev *pdev, error_release_regions: pci_release_regions(pdev); +error_free_ida: + ida_free(&alcor_pci_idr, priv->id); return ret; } @@ -337,7 +340,7 @@ static void alcor_pci_remove(struct pci_dev *pdev) mfd_remove_devices(&pdev->dev); - ida_simple_remove(&alcor_pci_idr, priv->id); + ida_free(&alcor_pci_idr, priv->id); pci_release_regions(pdev); pci_set_drvdata(pdev, NULL); -- 2.34.1