Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1876615pxj; Sat, 5 Jun 2021 05:56:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzAF4J6asutFJ0pfTv01d/yeuflM8yTpoxZtCypSz8aIf5EzrZ+9Di3kmY/O48qS/2XlBtA X-Received: by 2002:aa7:c913:: with SMTP id b19mr9868221edt.323.1622897799746; Sat, 05 Jun 2021 05:56:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622897799; cv=none; d=google.com; s=arc-20160816; b=heKfLZ6evZa/OeVJggv/1iG9nZfEwEVNCCPWSxtoZVZt0Ia9R7FJE8MXOU/RkecOPV TbBb8MPGc6nU2sf0z1qfEEm/JuNQx1g/GG8Spc66wrf90i4GFqriRxZ0xuhUJrLvb2rF TBYK7HhpUN2+X9uBHeftTosWv3PGKr/XbV14aXJhy4PE2GzzKdym1JjJtDM9d9Gq7ZYz HLcjqhXPU+2CLfYwfCidUosEEWNQP7hNXMMp/XESeMJIt4SPJDvYUxNL4vL/HUWopjAj WXWD7UgHeMB/h2c6eHbEdS/MU6EbyDePaCaOaGwsLtgYjidpuABk62K2HW/+dLueioWH 0J+Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=EiT+vUoMmotFAphU3H8OO8U15d0IL3gQ6TfBNGF3lU8=; b=Uc6Zy0gDyLs23GMdL0o85JRcabdqVaawlmCia0L/UQYHUaxHp/t+R/xGvzv9LY9TAe MgdZg28XZmmlr4FPpNiz/VO4L1K8us0dZPsIGGTiI1+66uRB0iAyKYDk4u8+JVkKpQYF 8Z9xhWl4djsoSVigulqEI9jrbTvAMqkDZaijJ3BjdUwoSd2qe+XVvra/vLf7pKFkIBe5 DuvCKpFDL5HKcoym+7DWBM206u1roc8F+/gDRdDa+wbigRXrV8VZCajBaUi+Kns1O9Wx AY0xmHyd3dGBsDeMlieUk1u6FwDBDmMAmK2t6i3MOV8jptOo7KGhQ27S45ylT1e4Vmlh 7X+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i2si8366387ejp.119.2021.06.05.05.56.06; Sat, 05 Jun 2021 05:56:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229930AbhFEM5w (ORCPT + 99 others); Sat, 5 Jun 2021 08:57:52 -0400 Received: from smtp02.smtpout.orange.fr ([80.12.242.124]:56233 "EHLO smtp.smtpout.orange.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229957AbhFEM5w (ORCPT ); Sat, 5 Jun 2021 08:57:52 -0400 Received: from localhost.localdomain ([86.243.172.93]) by mwinf5d78 with ME id DQvx2500221Fzsu03QvxbN; Sat, 05 Jun 2021 14:56:02 +0200 X-ME-Helo: localhost.localdomain X-ME-Auth: Y2hyaXN0b3BoZS5qYWlsbGV0QHdhbmFkb28uZnI= X-ME-Date: Sat, 05 Jun 2021 14:56:02 +0200 X-ME-IP: 86.243.172.93 From: Christophe JAILLET To: herbert@gondor.apana.org.au, davem@davemloft.net, gregkh@linuxfoundation.org, acostag.ubuntu@gmail.com, lee.jones@linaro.org, Jampala.Srikanth@cavium.com Cc: linux-crypto@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-janitors@vger.kernel.org, Christophe JAILLET Subject: [PATCH] crypto: cavium/nitrox - Fix an erro rhandling path in 'nitrox_probe()' Date: Sat, 5 Jun 2021 14:55:56 +0200 Message-Id: <26f71d3925541924bfda1dca9114a48db5ffafe4.1622897629.git.christophe.jaillet@wanadoo.fr> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org If an error occurs after a successful 'ioremap()' call, it must be undone by a corresponding 'iounmap()' call, as already done in the remove function. Ass a 'pf_sw_fail' label in the error handling path and add the missing 'iounmap()'. While at it, also add a 'flr_fail' label in the error handling path and use it to avoid some code duplication. Fixes: 14fa93cdcd9b ("crypto: cavium - Add support for CNN55XX adapters.") Signed-off-by: Christophe JAILLET --- drivers/crypto/cavium/nitrox/nitrox_main.c | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/drivers/crypto/cavium/nitrox/nitrox_main.c b/drivers/crypto/cavium/nitrox/nitrox_main.c index 144d554bd44d..96bc7b5c6532 100644 --- a/drivers/crypto/cavium/nitrox/nitrox_main.c +++ b/drivers/crypto/cavium/nitrox/nitrox_main.c @@ -424,8 +424,7 @@ static int nitrox_probe(struct pci_dev *pdev, err = nitrox_device_flr(pdev); if (err) { dev_err(&pdev->dev, "FLR failed\n"); - pci_disable_device(pdev); - return err; + goto flr_fail; } if (!dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(64))) { @@ -434,16 +433,13 @@ static int nitrox_probe(struct pci_dev *pdev, err = dma_set_mask_and_coherent(&pdev->dev, DMA_BIT_MASK(32)); if (err) { dev_err(&pdev->dev, "DMA configuration failed\n"); - pci_disable_device(pdev); - return err; + goto flr_fail; } } err = pci_request_mem_regions(pdev, nitrox_driver_name); - if (err) { - pci_disable_device(pdev); - return err; - } + if (err) + goto flr_fail; pci_set_master(pdev); ndev = kzalloc(sizeof(*ndev), GFP_KERNEL); @@ -479,7 +475,7 @@ static int nitrox_probe(struct pci_dev *pdev, err = nitrox_pf_sw_init(ndev); if (err) - goto ioremap_err; + goto pf_sw_fail; err = nitrox_pf_hw_init(ndev); if (err) @@ -509,12 +505,15 @@ static int nitrox_probe(struct pci_dev *pdev, smp_mb__after_atomic(); pf_hw_fail: nitrox_pf_sw_cleanup(ndev); +pf_sw_fail: + iounmap(ndev->bar_addr); ioremap_err: nitrox_remove_from_devlist(ndev); kfree(ndev); pci_set_drvdata(pdev, NULL); ndev_fail: pci_release_mem_regions(pdev); +flr_fail: pci_disable_device(pdev); return err; } -- 2.30.2