Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3358842pxb; Mon, 17 Jan 2022 18:32:08 -0800 (PST) X-Google-Smtp-Source: ABdhPJysxtrhKaLfZj/wC6iaNA0RGgaT6Zi1dttuCAidd7/985MeRIWYghk7uzu0I+bQPZhoevUT X-Received: by 2002:a17:902:7603:b0:148:daa7:ed7e with SMTP id k3-20020a170902760300b00148daa7ed7emr24988290pll.150.1642473128606; Mon, 17 Jan 2022 18:32:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1642473128; cv=none; d=google.com; s=arc-20160816; b=0yBc4BsO3GVWOAMS6cN0w+/r2jYflh2SwdUuX4s9BB9yw0Fu3w6wXo1YX60pUlf8nw y1YRrNGRYDeJ5OxaeEVsnd5Swdze0kqng1nhYLBmw3hloAP+xNXbBEGYlJZ/FdG9uhPt ikQrTRPI1GqtqElL6M39i+KRoqzsaDuaCzXQKOIKRxdmEj06r7ZX3qcVzmDLE9eSKNXg fAHmjHM5tKA62ssI5gfOI7BdFAMfSjcR40QmDOBoMBUuhUvF+mSQI3Jz1WqWgRsDbWrO HTmyMcXWdZ9P0nptrGEJEXX91wL0O+0YQRAeXVqOwviLbzt5Bn5UbhDBK+0w/OM/wLv2 Q1vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=rGqs6LqpxNCpoxbTZZpaIJNGo6cUyfCXeqXk7ENmf7w=; b=xBNFRBbJ9GJsRXSUTTU11Ac9TmhmfZQnk2RUgkicy+wrOPlENF0CNerBU60CbZmZJI kbbW4630nyhr4lfxPPZBDglEETVz4eSFCB6VuPYCAV6IL/z0LTY/9HB9eHBzgmvig5r9 CpRPLzCzZZK8XDw7l45NldEmLpvflMNQbsWGW1zjvyXYuZVWLUPbZs7PNUXctxRDQl6i hZrqD7j3vkyFV6Tyfe2UQFd5kY3HYApRvCnW+VHkSx4zFdhpx6ITZWh1thah3VNN5mAI WQEPFEey5urYiux7S7QEBuy0905W0ckpdtFmUu9HgNMhmnLnzBsKY4906JE2nt2ktlgK OH8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=marcan.st Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e9si8608255pgs.279.2022.01.17.18.31.59; Mon, 17 Jan 2022 18:32:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=marcan.st Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238934AbiAQOae (ORCPT + 70 others); Mon, 17 Jan 2022 09:30:34 -0500 Received: from marcansoft.com ([212.63.210.85]:55760 "EHLO mail.marcansoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238653AbiAQOad (ORCPT ); Mon, 17 Jan 2022 09:30:33 -0500 Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: hector@marcansoft.com) by mail.marcansoft.com (Postfix) with ESMTPSA id 1055041E96; Mon, 17 Jan 2022 14:30:22 +0000 (UTC) From: Hector Martin To: Kalle Valo , "David S. Miller" , Jakub Kicinski , Rob Herring , "Rafael J. Wysocki" , Len Brown , Arend van Spriel , Franky Lin , Hante Meuleman , Chi-hsien Lin , Wright Feng , Dmitry Osipenko Cc: Hector Martin , Sven Peter , Alyssa Rosenzweig , Mark Kettenis , =?UTF-8?q?Rafa=C5=82=20Mi=C5=82ecki?= , Pieter-Paul Giesberts , Linus Walleij , Hans de Goede , "John W. Linville" , "brian m. carlson" , Andy Shevchenko , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org, brcm80211-dev-list.pdl@broadcom.com, SHA-cyfmac-dev-list@infineon.com Subject: [PATCH v3 1/9] brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path Date: Mon, 17 Jan 2022 23:29:11 +0900 Message-Id: <20220117142919.207370-2-marcan@marcan.st> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20220117142919.207370-1-marcan@marcan.st> References: <20220117142919.207370-1-marcan@marcan.st> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org This avoids leaking memory if brcmf_chip_get_raminfo fails. Note that the CLM blob is released in the device remove path. Fixes: 82f93cf46d60 ("brcmfmac: get chip's default RAM info during PCIe setup") Reviewed-by: Linus Walleij Signed-off-by: Hector Martin --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c index 8b149996fc00..f876b1d8d00d 100644 --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/pcie.c @@ -1777,6 +1777,8 @@ static void brcmf_pcie_setup(struct device *dev, int ret, ret = brcmf_chip_get_raminfo(devinfo->ci); if (ret) { brcmf_err(bus, "Failed to get RAM info\n"); + release_firmware(fw); + brcmf_fw_nvram_free(nvram); goto fail; } -- 2.33.0