Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp3659857pxb; Tue, 19 Apr 2022 07:26:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwaVUpaXs0nc+PERjQnZfsaTvD068CoqdJmWjyOEO+PeCSNZVrx8417pwDkVWJ7tz4dpbJB X-Received: by 2002:a05:6402:358e:b0:423:fd1c:3453 with SMTP id y14-20020a056402358e00b00423fd1c3453mr4204360edc.403.1650378400102; Tue, 19 Apr 2022 07:26:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650378400; cv=none; d=google.com; s=arc-20160816; b=HFXaSrHd6l1pVxYPdUAxMttmqp3WsQgy5MvKNdqFuKUbdG/KK9iVOwb0L4RXod9Rxl dqHRsryiVn8XMQwOHAMedlr7y+/1KG7JU7oISiJb+oKkpZMlWNVPBubhMlguy18EPBdo WmYldniureUOfviAt+MUn1t9LCFsugPIySKk81yhai4Ys9KkDaFXEx5LcR9//1k9/g71 I6DQWxEXj5zlPIgdX1aauKRgExVcv2CEndhOANjBxy3bR6gkRTTHK4tnbANPWsoJ9KTD arKkqA4t3hwsw//RfEVkrewMjLxXwI/JzRJwg+qqayAE5QSNKu0HnUQR7559Cag3rnxN kgGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0HttSdAoSvzmOO7GvDOSkJI5SMr09JCQFk0XOw34MlE=; b=znLyWi3DVzJeLlc/57LMhQcoDFaM1dT0Wxa0u6ffQ4V8PvVHvvjZJJ8PXybph4tBlH STPj78dxFn6AmCxfbo/Kyhn+4g1Ie6ZvdUpIVevJ3/2WLa4NB3LTEU+gYj15k6Tfz5Wj ZsEbpfUwXukwwv82rbZ0OWqfm/Us8vkGhefZ0qOFNKwbjCkNOK3UOJaHylnAnK4+WRDD swcC4njj0rMeSHSi9Kw1D8lX2XH4w8TN7L8b7ZsZRcyPada33KD+zO2dFqamoXiMNeLh I4IBItxzDI8sa1qclLbaAsWQiX0kFSR+GgExkiAqg55FuEqnjAwbwaCSR0RqXRcGSbLA s0Dg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kNft6AFM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id p16-20020a1709060e9000b006e820adb218si8220040ejf.673.2022.04.19.07.26.12; Tue, 19 Apr 2022 07:26:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=kNft6AFM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238268AbiDRMT0 (ORCPT + 99 others); Mon, 18 Apr 2022 08:19:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48914 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238225AbiDRMSk (ORCPT ); Mon, 18 Apr 2022 08:18:40 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E13191AD92; Mon, 18 Apr 2022 05:15:59 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 8084760F09; Mon, 18 Apr 2022 12:15:59 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 8F1ECC385A1; Mon, 18 Apr 2022 12:15:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1650284158; bh=RTYJYJslaj/WnB1x3J4ALXHvzU3wR+9bstX5iCVP7jM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kNft6AFMub5H08gwMpt+WGjD+Vjnju88fFV/TTlrzFQ1DSFqZfQeFD9o2a8Cb7hcF xr/jagxcjM0InwCKDg9r0KPHePo2YmlGf4XKzLJUYXSan9ajlujyv3bDgwBSimaV/y +iOvDPsaA5j6mqf7r26PzEpHpztaMMRtslH9VvEA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Takashi Iwai Subject: [PATCH 5.17 024/219] ALSA: aw2: Fix the missing snd_card_free() call at probe error Date: Mon, 18 Apr 2022 14:09:53 +0200 Message-Id: <20220418121204.701764021@linuxfoundation.org> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220418121203.462784814@linuxfoundation.org> References: <20220418121203.462784814@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Takashi Iwai commit bf4067e8a19eae67c45659a956c361d59251ba57 upstream. The previous cleanup with devres may lead to the incorrect release orders at the probe error handling due to the devres's nature. Until we register the card, snd_card_free() has to be called at first for releasing the stuff properly when the driver tries to manage and release the stuff via card->private_free(). This patch fixes it by calling snd_card_free() manually on the error from the probe callback. Fixes: 33631012cd06 ("ALSA: aw2: Allocate resources with device-managed APIs") Cc: Link: https://lore.kernel.org/r/20220412102636.16000-32-tiwai@suse.de Signed-off-by: Takashi Iwai Signed-off-by: Greg Kroah-Hartman --- sound/pci/aw2/aw2-alsa.c | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) --- a/sound/pci/aw2/aw2-alsa.c +++ b/sound/pci/aw2/aw2-alsa.c @@ -275,7 +275,7 @@ static int snd_aw2_probe(struct pci_dev /* (3) Create main component */ err = snd_aw2_create(card, pci); if (err < 0) - return err; + goto error; /* initialize mutex */ mutex_init(&chip->mtx); @@ -294,13 +294,17 @@ static int snd_aw2_probe(struct pci_dev /* (6) Register card instance */ err = snd_card_register(card); if (err < 0) - return err; + goto error; /* (7) Set PCI driver data */ pci_set_drvdata(pci, card); dev++; return 0; + + error: + snd_card_free(card); + return err; } /* open callback */