Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2466043imd; Fri, 2 Nov 2018 11:54:07 -0700 (PDT) X-Google-Smtp-Source: AJdET5dQXIEux0NQKw8BWLBOb+QYDDafgpxfI/XUJbZqLXwArJh6mhT43OWma61NPbY6xvOfXwbx X-Received: by 2002:a63:181c:: with SMTP id y28mr11635174pgl.75.1541184846991; Fri, 02 Nov 2018 11:54:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541184846; cv=none; d=google.com; s=arc-20160816; b=RuppX2NTEzIWi1LjlIxPw4aV+O7yjUtSIfM77bkr8pOzNibItJnhoAdEZ3MILIIDD2 DLatOTukC2P6p4iv2pfYCQI2WGJ3xzPPgTuffztSfumXdfZcSKutcW7PLhv5Q3I/gugU SxIGCkfX+L5gt3JyiQFH8F2OSPyznRmQA97+URhbOq8/tKiUZdMv/h1gqX4LNPAWywvz /bZlsH+ukSi+qJCBBaBPTl4DmO2yljbWf37FC4ZCcZdRkd7LsCK/DzWrdkVPLQ5m7rIA HjkvgbIPrUXO1G7zHXlUbfILsH8sSUZc12N4c2R040Y6O0hTeuAAnNwThxIa3D+4Xfu6 vnfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pVsUTwp7H70Xf/8hN5nqmPlCo6ccRFRI7VddHVwzFBk=; b=N+2mkvwpn+/NuugnHRshZlL/1VIQ/aFnpt19Chsd+WrSL6JS+xMZKWO2PIbkddmk3g 6xbEnY7fGc93/bRvILCLSTMNx26SaSfAXVTeLfw6nMWZ0EFXY8GQjZOGLB+vurw8RTrH dX4NBKR63AZY/YdjhDFMRK8xtDo5AkGsCZRTWBdjHlBd0wp9SPE1w88YfWK0euaIe1zA eseM2oRumVppmeLp3KWHaP6q02d50gIhX5rJNyh97nEdyNX8pyXGIfF4EYiygVjVH/7N /1/yUh/6UaeZrXAodk7dOj4NciHhjWUDK6tgSzNsf4BfMmpSXJUJtXHVyJ2AvhsMVAHA ZRtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ow7nwM9d; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1-v6si1870284plh.96.2018.11.02.11.53.52; Fri, 02 Nov 2018 11:54:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Ow7nwM9d; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730721AbeKCEAd (ORCPT + 99 others); Sat, 3 Nov 2018 00:00:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:56358 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726081AbeKCEAc (ORCPT ); Sat, 3 Nov 2018 00:00:32 -0400 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 531012084A; Fri, 2 Nov 2018 18:52:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541184737; bh=Zk8VdP6Z8UoLaD9eCfSnB/AN992Amv8su2BXWEU/aEI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Ow7nwM9dhwleLNPzd4xwI8hEJBLcWasqdZv50m+k2KVk2uIoiPZ6X+qViBkio2ux8 fjeVN1+ASJdJxvleEDl4ynJ2DIBik4qVoe7NILq7OPgdcrqzHRnfhlIpLQCk3kTTRX B6ue6SdPn72u4CLWIumtlkqBEURolvajNuwoQATw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ben Hutchings , Govindarajulu Varadarajan , "David S. Miller" , Sasha Levin Subject: [PATCH 4.14 084/143] enic: do not overwrite error code Date: Fri, 2 Nov 2018 19:34:29 +0100 Message-Id: <20181102182904.393997109@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181102182857.064326086@linuxfoundation.org> References: <20181102182857.064326086@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 56f772279a762984f6e9ebbf24a7c829faba5712 ] In failure path, we overwrite err to what vnic_rq_disable() returns. In case it returns 0, enic_open() returns success in case of error. Reported-by: Ben Hutchings Fixes: e8588e268509 ("enic: enable rq before updating rq descriptors") Signed-off-by: Govindarajulu Varadarajan Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/cisco/enic/enic_main.c | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/drivers/net/ethernet/cisco/enic/enic_main.c b/drivers/net/ethernet/cisco/enic/enic_main.c index 2bfaf3e118b1..03f4fee1bbc9 100644 --- a/drivers/net/ethernet/cisco/enic/enic_main.c +++ b/drivers/net/ethernet/cisco/enic/enic_main.c @@ -1879,7 +1879,7 @@ static int enic_open(struct net_device *netdev) { struct enic *enic = netdev_priv(netdev); unsigned int i; - int err; + int err, ret; err = enic_request_intr(enic); if (err) { @@ -1936,10 +1936,9 @@ static int enic_open(struct net_device *netdev) err_out_free_rq: for (i = 0; i < enic->rq_count; i++) { - err = vnic_rq_disable(&enic->rq[i]); - if (err) - return err; - vnic_rq_clean(&enic->rq[i], enic_free_rq_buf); + ret = vnic_rq_disable(&enic->rq[i]); + if (!ret) + vnic_rq_clean(&enic->rq[i], enic_free_rq_buf); } enic_dev_notify_unset(enic); err_out_free_intr: -- 2.17.1