Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp9201ybl; Tue, 7 Jan 2020 13:04:36 -0800 (PST) X-Google-Smtp-Source: APXvYqyFuxkPC9dYI2pEfw6nsnbR7H1g86zoXjAwGvdlFHxcn3V5+qocegn7IlNoqzmbKmaw6PD4 X-Received: by 2002:a9d:70cb:: with SMTP id w11mr1725879otj.230.1578431076584; Tue, 07 Jan 2020 13:04:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578431076; cv=none; d=google.com; s=arc-20160816; b=1F/6NGRH8XNLHTt/89jc9XQhTyxvZiZ8up1s1eV6fqPZTTExeflbqRCtchEvIfVg5+ Fbe5CQozg/FPP0gRXDwa2IvQeZCp1k3m5hOV7ReGLBLFEG7NJPvEfiXOigxH3tLcYwvA 00KaeduPuq12Rc0GCaQd8gWCDNKzoHXNkweNxO/OWsYubaPrKTAfyv1GKBiAN/kE4ccB gsz3DU7nMyv4FuqZQoFq2VX+eZQbzp6YETyqPYMCXv2poMVptc2rQA1H3Tc0LPDOxE64 Zlir6CPKR/Qi+ny7IMgeSO9OlZaWaIbowTswHunoE4VSP6M90PiLqRuv8az0pY8aiKnQ JiAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=22e183+SAxzlFF24Tk62BHCYGH5IJwZlBeM33dZQbB0=; b=Tc5Plj1aCc5bzUEGdCEm0NImIMDtb92rXilrDUfSl2QsEu9gT98kt6c/7ZeaZ0o0ny GXyUhm+4DEjEO3kVerF6dNp23CQPjnd/ztDm3B4ol1eKZ/DAZtVfoJj0bfBmP3T2qBz+ bpxMi8I6gvO8eRxXP23AGUlJWi3L0czSzkGwBdSqY3UnJRYz7ge4nxrnUP2xI80pREwQ 1s/rB2HM0rz9OD+KJRDWcteEC/qMThQodYJTA9OXj5TSthZ74/nvi++1a7E90cAj1Y2l uUcAKNF3ubOZCKxFah65xkr7IsYj8vxSL4o6OCNthN5oGEDciOWU9uKTHdhh4/loGWPe gwWw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L34ZGhJ5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12si494007otl.229.2020.01.07.13.04.23; Tue, 07 Jan 2020 13:04:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=L34ZGhJ5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728740AbgAGVDf (ORCPT + 99 others); Tue, 7 Jan 2020 16:03:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:45734 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728929AbgAGVDd (ORCPT ); Tue, 7 Jan 2020 16:03:33 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5EEB92077B; Tue, 7 Jan 2020 21:03:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578431012; bh=RQwPlijfxf7jo2do6WvjL3xxdq2kbHIzLdvt0P3xetg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=L34ZGhJ5OV0gWPeXG8qWk91hrqh6M4MvL5+E8Tt/GqxxENesz7ikoWCgrO50nSMsW dgeRFASLiItw9wKJbmvMnlB6Um5Ptt8ZzgxRkKKxnQHEIXMRgsvX1IB7aRB+Mm1hqy /az0Sq3wd2zRodavFYfRETZFTCYqo1GMcOVClGdU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Taehee Yoo , "David S. Miller" , Sasha Levin Subject: [PATCH 5.4 189/191] hsr: fix error handling routine in hsr_dev_finalize() Date: Tue, 7 Jan 2020 21:55:09 +0100 Message-Id: <20200107205343.102463024@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200107205332.984228665@linuxfoundation.org> References: <20200107205332.984228665@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Taehee Yoo [ Upstream commit 1d19e2d53e8ed9e4c98fc95e0067492cda7288b0 ] hsr_dev_finalize() is called to create new hsr interface. There are some wrong error handling codes. 1. wrong checking return value of debugfs_create_{dir/file}. These function doesn't return NULL. If error occurs in there, it returns error pointer. So, it should check error pointer instead of NULL. 2. It doesn't unregister interface if it fails to setup hsr interface. If it fails to initialize hsr interface after register_netdevice(), it should call unregister_netdevice(). 3. Ignore failure of creation of debugfs If creating of debugfs dir and file is failed, creating hsr interface will be failed. But debugfs doesn't affect actual logic of hsr module. So, ignoring this is more correct and this behavior is more general. Fixes: c5a759117210 ("net/hsr: Use list_head (and rcu) instead of array for slave devices.") Signed-off-by: Taehee Yoo Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/hsr/hsr_debugfs.c | 15 +++++++-------- net/hsr/hsr_device.c | 19 ++++++++++--------- net/hsr/hsr_main.h | 11 ++++------- 3 files changed, 21 insertions(+), 24 deletions(-) diff --git a/net/hsr/hsr_debugfs.c b/net/hsr/hsr_debugfs.c index 6135706f03d5..6618a9d8e58e 100644 --- a/net/hsr/hsr_debugfs.c +++ b/net/hsr/hsr_debugfs.c @@ -77,15 +77,14 @@ static const struct file_operations hsr_fops = { * When debugfs is configured this routine sets up the node_table file per * hsr device for dumping the node_table entries */ -int hsr_debugfs_init(struct hsr_priv *priv, struct net_device *hsr_dev) +void hsr_debugfs_init(struct hsr_priv *priv, struct net_device *hsr_dev) { - int rc = -1; struct dentry *de = NULL; de = debugfs_create_dir(hsr_dev->name, NULL); - if (!de) { + if (IS_ERR(de)) { pr_err("Cannot create hsr debugfs root\n"); - return rc; + return; } priv->node_tbl_root = de; @@ -93,13 +92,13 @@ int hsr_debugfs_init(struct hsr_priv *priv, struct net_device *hsr_dev) de = debugfs_create_file("node_table", S_IFREG | 0444, priv->node_tbl_root, priv, &hsr_fops); - if (!de) { + if (IS_ERR(de)) { pr_err("Cannot create hsr node_table directory\n"); - return rc; + debugfs_remove(priv->node_tbl_root); + priv->node_tbl_root = NULL; + return; } priv->node_tbl_file = de; - - return 0; } /* hsr_debugfs_term - Tear down debugfs intrastructure diff --git a/net/hsr/hsr_device.c b/net/hsr/hsr_device.c index b01e1bae4ddc..e73549075a03 100644 --- a/net/hsr/hsr_device.c +++ b/net/hsr/hsr_device.c @@ -477,30 +477,31 @@ int hsr_dev_finalize(struct net_device *hsr_dev, struct net_device *slave[2], res = hsr_add_port(hsr, hsr_dev, HSR_PT_MASTER); if (res) - goto err_add_port; + goto err_add_master; res = register_netdevice(hsr_dev); if (res) - goto fail; + goto err_unregister; res = hsr_add_port(hsr, slave[0], HSR_PT_SLAVE_A); if (res) - goto fail; + goto err_add_slaves; + res = hsr_add_port(hsr, slave[1], HSR_PT_SLAVE_B); if (res) - goto fail; + goto err_add_slaves; + hsr_debugfs_init(hsr, hsr_dev); mod_timer(&hsr->prune_timer, jiffies + msecs_to_jiffies(PRUNE_PERIOD)); - res = hsr_debugfs_init(hsr, hsr_dev); - if (res) - goto fail; return 0; -fail: +err_add_slaves: + unregister_netdevice(hsr_dev); +err_unregister: list_for_each_entry_safe(port, tmp, &hsr->ports, port_list) hsr_del_port(port); -err_add_port: +err_add_master: hsr_del_self_node(&hsr->self_node_db); return res; diff --git a/net/hsr/hsr_main.h b/net/hsr/hsr_main.h index 96fac696a1e1..acab9c353a49 100644 --- a/net/hsr/hsr_main.h +++ b/net/hsr/hsr_main.h @@ -184,15 +184,12 @@ static inline u16 hsr_get_skb_sequence_nr(struct sk_buff *skb) } #if IS_ENABLED(CONFIG_DEBUG_FS) -int hsr_debugfs_init(struct hsr_priv *priv, struct net_device *hsr_dev); +void hsr_debugfs_init(struct hsr_priv *priv, struct net_device *hsr_dev); void hsr_debugfs_term(struct hsr_priv *priv); #else -static inline int hsr_debugfs_init(struct hsr_priv *priv, - struct net_device *hsr_dev) -{ - return 0; -} - +static inline void hsr_debugfs_init(struct hsr_priv *priv, + struct net_device *hsr_dev) +{} static inline void hsr_debugfs_term(struct hsr_priv *priv) {} #endif -- 2.20.1