Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp2888249ybz; Sun, 3 May 2020 11:44:11 -0700 (PDT) X-Google-Smtp-Source: APiQypL88P4w0/rEWJyEB4DMi6m+Bfnwle9O4Y1IF7mhGvaQBuuK2HZB6zYFCaT9yRhREU2HMBMX X-Received: by 2002:a05:6402:1841:: with SMTP id v1mr11445422edy.182.1588531451324; Sun, 03 May 2020 11:44:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588531451; cv=none; d=google.com; s=arc-20160816; b=ajmlr0ISlQ2ERUfij3jRLwsQZIUhGLtCQXgpl70zrR7SzcmrSeQAmo6yMnZJ8Kwg4F fvjEUnhaqdIkZMyGqCYRXkDp2raupbZNRVNVLJnBP1lC5gMKCoRvea/EBkejanTEgvk0 5r57DPs2VEr4oQHuew41Apxwo26wduNgc7LSHikns3Lb0Ee3LRqiRW5NMdUBBDS/wsUc WUcegVV4nwsRLQY1oQoVLg2ScMpXmvQ3rDgfi82NeC0PHCi19OjH24XsENUiM/lqHnCJ GTpmYga2QIswIDmzXNZ4rP7MoXrARCx87M84qTABT3K8tPVEIFSTOYNzizqCcipUHS6r g31g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bERp/MYvY8iJVrv+YyRIQ4+dlCYQm4dIrcl0kh2LDyo=; b=mU3SBG/mLCFcnllH7pFwUkgxjv0fv9jgEsy2m6BRxevlNqGun9dO1oAY17uB+eevY/ K9ygwNvyI5SReKvzO0CtRYCbphEXsC6rCJSAxMte3B097Wo282JXiOGJJDLY7pJO8xHE Tueql5mb/7NOF64sGo/VkzBUOiELu6ulxU/xMOC5ZFg0p/0QPx5qlqbiTjzl4UtBRmtp DBnOAbLEgENyeCTGjYue94K2jNXPmUSAFfrsbRmKkI0MpLbZWJcuIupZHRPKOLzE30y3 jfwPnDQlQNzo74zeHPYn+WJqjXkEzec3Qoo8BK82mXXAmQR2lp6R4FP+CA0d5oR5N+u0 jAqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=hfOL75fL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umn.edu Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l16si5676154ejq.268.2020.05.03.11.43.48; Sun, 03 May 2020 11:44:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@umn.edu header.s=google header.b=hfOL75fL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=umn.edu Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728985AbgECSmb (ORCPT + 99 others); Sun, 3 May 2020 14:42:31 -0400 Received: from mta-p7.oit.umn.edu ([134.84.196.207]:44842 "EHLO mta-p7.oit.umn.edu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728863AbgECSmb (ORCPT ); Sun, 3 May 2020 14:42:31 -0400 Received: from localhost (unknown [127.0.0.1]) by mta-p7.oit.umn.edu (Postfix) with ESMTP id 49FZbn5mV9z9vJrX for ; Sun, 3 May 2020 18:42:29 +0000 (UTC) X-Virus-Scanned: amavisd-new at umn.edu Received: from mta-p7.oit.umn.edu ([127.0.0.1]) by localhost (mta-p7.oit.umn.edu [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CRPFh1c9B_0U for ; Sun, 3 May 2020 13:42:29 -0500 (CDT) Received: from mail-qk1-f199.google.com (mail-qk1-f199.google.com [209.85.222.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mta-p7.oit.umn.edu (Postfix) with ESMTPS id 49FZbn4VhTz9vJrc for ; Sun, 3 May 2020 13:42:29 -0500 (CDT) Received: by mail-qk1-f199.google.com with SMTP id 11so16315793qkh.7 for ; Sun, 03 May 2020 11:42:29 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=umn.edu; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bERp/MYvY8iJVrv+YyRIQ4+dlCYQm4dIrcl0kh2LDyo=; b=hfOL75fLvjbGbVxKB87MExbY9F02snj66SbPvO8kdUaggICaYHLVp/qCtZzzCtC2mH E2uKFokuep4sIyLzQYmN71qOvzZ03GmkhPSYyad+8vAO1rX/1by6o04eyUBIdgcycLy3 ffS88SixMFKoZpu7h2Csig3yiBI6SmAtQEiy8pcR/sVN42R5cMpVzs5SMrtQ9bDLoAPA /YTHguQZSjHIE/Y8a+4QOKF3UvmEVEZc+4OAth5ke/1r9wCOaemnCs/KTs53YlmjZdlT /FR0lpGugJIeUNHJra/mQ2KUZh7IgRCPGhTgbgZdtb8/JtBolkkb9eOGFv4pyUA9VPB0 E7Yw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=bERp/MYvY8iJVrv+YyRIQ4+dlCYQm4dIrcl0kh2LDyo=; b=HRL7zSKNNb5GtaVrpGbk0RuSVk8fjtGfUVdKHw+lBlf77AeNxQuf2OLLVK4fbuAya+ y1OK8lN24SxvgkrpUCEJUIaxfRqoo2n3TmcrD5tR7G6gXNLQO89lXFmjX503wwB0yjTV CxDCCsXry9k7aTb/KI3UGXTW3oPh1dxrcFXYZ36hVzv+Ayqm0N78N9P5k7uWcw2LB1fK NSrstOnyp+iX6ypE4wrDNAYlft//uCeQIoyNFarVN6dNZRmCN1HT1qZCAcwsJbZAvk/W 2H6wgsS494ZodVZTRD4p92w+ufTWhgs5yGD914t/tgXW7nJpa92MWsY2LwvniHQbSkAJ kj4Q== X-Gm-Message-State: AGi0PuYO8w4Nl5XMbsQJAb/sZ0/sGUsqLj8YjP22rsygWCaIUEPny+wg BJWgKTVj0HcJmrgIISnW9k4ErHYUEwBOicmFRtK0rArBUYRdmWS8xnTZIVH5ZY3CHPGDFj2P9/V xZ3NfKGjGIYqq4oIHmxb7zve8B4f9 X-Received: by 2002:a05:620a:137a:: with SMTP id d26mr2038285qkl.326.1588531348879; Sun, 03 May 2020 11:42:28 -0700 (PDT) X-Received: by 2002:a05:620a:137a:: with SMTP id d26mr2038270qkl.326.1588531348490; Sun, 03 May 2020 11:42:28 -0700 (PDT) Received: from qiushi.dtc.umn.edu (cs-kh5248-02-umh.cs.umn.edu. [128.101.106.4]) by smtp.gmail.com with ESMTPSA id o43sm8769039qtb.49.2020.05.03.11.42.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 03 May 2020 11:42:27 -0700 (PDT) From: wu000273@umn.edu To: kuba@kernel.org Cc: davem@davemloft.net, Markus.Elfring@web.de, oss-drivers@netronome.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kjlu@umn.edu, wu000273@umn.edu Subject: [PATCH v2] nfp: abm: Fix incomplete release of system resources in nfp_abm_vnic_set_mac() Date: Sun, 3 May 2020 13:42:20 -0500 Message-Id: <20200503184220.6209-1-wu000273@umn.edu> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qiushi Wu In function nfp_abm_vnic_set_mac, pointer nsp is allocated by nfp_nsp_open. But when nfp_nsp_has_hwinfo_lookup fail, the pointer is not released, which can lead to a memory leak bug. Thus add a call of the function “nfp_nsp_close” for the completion of the exception handling. Fixes: f6e71efdf9fb1 ("nfp: abm: look up MAC addresses via management FW") Signed-off-by: Qiushi Wu --- drivers/net/ethernet/netronome/nfp/abm/main.c | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/drivers/net/ethernet/netronome/nfp/abm/main.c b/drivers/net/ethernet/netronome/nfp/abm/main.c index 9183b3e85d21..a5152f11e2f5 100644 --- a/drivers/net/ethernet/netronome/nfp/abm/main.c +++ b/drivers/net/ethernet/netronome/nfp/abm/main.c @@ -265,8 +265,7 @@ nfp_abm_vnic_set_mac(struct nfp_pf *pf, struct nfp_abm *abm, struct nfp_net *nn, if (id > pf->eth_tbl->count) { nfp_warn(pf->cpp, "No entry for persistent MAC address\n"); - eth_hw_addr_random(nn->dp.netdev); - return; + goto generate_random_address; } snprintf(hwinfo, sizeof(hwinfo), "eth%u.mac.pf%u", @@ -276,14 +275,13 @@ nfp_abm_vnic_set_mac(struct nfp_pf *pf, struct nfp_abm *abm, struct nfp_net *nn, if (IS_ERR(nsp)) { nfp_warn(pf->cpp, "Failed to access the NSP for persistent MAC address: %ld\n", PTR_ERR(nsp)); - eth_hw_addr_random(nn->dp.netdev); - return; + goto generate_random_address; } if (!nfp_nsp_has_hwinfo_lookup(nsp)) { nfp_warn(pf->cpp, "NSP doesn't support PF MAC generation\n"); - eth_hw_addr_random(nn->dp.netdev); - return; + nfp_nsp_close(nsp); + goto generate_random_address; } err = nfp_nsp_hwinfo_lookup(nsp, hwinfo, sizeof(hwinfo)); @@ -291,8 +289,7 @@ nfp_abm_vnic_set_mac(struct nfp_pf *pf, struct nfp_abm *abm, struct nfp_net *nn, if (err) { nfp_warn(pf->cpp, "Reading persistent MAC address failed: %d\n", err); - eth_hw_addr_random(nn->dp.netdev); - return; + goto generate_random_address; } if (sscanf(hwinfo, "%02hhx:%02hhx:%02hhx:%02hhx:%02hhx:%02hhx", @@ -300,12 +297,15 @@ nfp_abm_vnic_set_mac(struct nfp_pf *pf, struct nfp_abm *abm, struct nfp_net *nn, &mac_addr[3], &mac_addr[4], &mac_addr[5]) != 6) { nfp_warn(pf->cpp, "Can't parse persistent MAC address (%s)\n", hwinfo); - eth_hw_addr_random(nn->dp.netdev); - return; + goto generate_random_address; } ether_addr_copy(nn->dp.netdev->dev_addr, mac_addr); ether_addr_copy(nn->dp.netdev->perm_addr, mac_addr); + +generate_random_address: + eth_hw_addr_random(nn->dp.netdev); + return; } static int -- 2.17.1