Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp3899213ybz; Mon, 4 May 2020 11:45:55 -0700 (PDT) X-Google-Smtp-Source: APiQypKhFQ7fAiNtJe6/v/3Ou9WvCBbW8r9LpNy6TaW7h3BR2OPTuIZ445M2957rnjzOZTo96bxN X-Received: by 2002:a05:6402:712:: with SMTP id w18mr16185693edx.386.1588617955616; Mon, 04 May 2020 11:45:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588617955; cv=none; d=google.com; s=arc-20160816; b=xoHKjELq+kCfe/XlNTsc8VR5OvHi9joIGlfes0S3vGaf6X25L8HtbeOHgTziX+nslj vBV4YbNRI6OrqNngcFa+d1K/btcgpzYa5/mljayZ378f2LS2yQ5p2F1OsCN8Hsa1I2sI baL1OopE5kcpmgtvJKCMNgMVgJ9FqibhPZxFi8ehac7nbrO0EhvaQKBURB/d9Mr7BGuS /5G/QBOiAW46kAMLBKLXCyp0dJx6FIxkdUNIGCmGxHv2gk+oe70viZO4nXibiO3iWkC3 XitzUjDm5mn0Or8OYZWomJ8p3voC5330IEb+YSiBDSd/f3iMVFzOuxaompWnXXfP9mhj fihw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=WskD23ILu6bb7LRmXX0wzsmqnD0QHbIy0YAZG4TgRaY=; b=Aa8YW3pYQHlzJcd/zqdxYSU6PMhSdM2kwIeemaTAkV8jUeUuUTmQ36aWg4D5g5fIta ZN2KSVoftEx2wRH+63scL+nm3SlJAh7XZKQdR/A5cQaSHZqs6F0bpC2/Tm2hUMUASePw US03naQ85m/85O2k0zCWxcKXqcLhz+thRdjL7kj9PbHq+kKcF2yAQQzrnCJx4YC5fQhs 67TBz2R13FCQr/EkObYgsENy73zDZ5tXmU9AG9MLjPLgnkYU2o/fFcufx5PEJSBA1SmI S4xAlpUURZV1/e39ZhpDE1lBybH9pth2Ce5pEfKRZDW4xd5y6/ttcOzX+bAg6XQPLHpc u+xQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="K/DnChfy"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cn25si7183075edb.589.2020.05.04.11.45.31; Mon, 04 May 2020 11:45:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="K/DnChfy"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729918AbgEDRDD (ORCPT + 99 others); Mon, 4 May 2020 13:03:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:39388 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729768AbgEDRDC (ORCPT ); Mon, 4 May 2020 13:03:02 -0400 Received: from kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com (unknown [163.114.132.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 22A7B206D7; Mon, 4 May 2020 17:03:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588611782; bh=fU2OdBYZA3fWd3pNJxXMgGwZS3ICj4CFvix6NgOJKow=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=K/DnChfyBjkZKibeB1+dx1O2X/yrkrgBjERDskR3UANYJfz/GyTxkY3IezZbsdsLf eoSWZx+p7q5T8eQtTwjXrZKm8sERrTl3cVWxEZIvc5l10loQRLzMixYkMqAGlZsOdP d0gTFQYOlpdepbZ7rsY2gwWogY5j8NxRmJtcm7mI= Date: Mon, 4 May 2020 10:03:00 -0700 From: Jakub Kicinski To: wu000273@umn.edu Cc: davem@davemloft.net, Markus.Elfring@web.de, oss-drivers@netronome.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kjlu@umn.edu Subject: Re: [PATCH v3] nfp: abm: Fix incomplete release of system resources in nfp_abm_vnic_set_mac() Message-ID: <20200504100300.28438c70@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> In-Reply-To: <20200503204932.11167-1-wu000273@umn.edu> References: <20200503204932.11167-1-wu000273@umn.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 3 May 2020 15:49:32 -0500 wu000273@umn.edu wrote: > From: Qiushi Wu >=20 > In function nfp_abm_vnic_set_mac, pointer nsp is allocated by nfp_nsp_ope= n. > But when nfp_nsp_has_hwinfo_lookup fail, the pointer is not released, > which can lead to a memory leak bug. Thus add a call of the function > =E2=80=9Cnfp_nsp_close=E2=80=9D for the completion of the exception handl= ing. >=20 > Fixes: f6e71efdf9fb1 ("nfp: abm: look up MAC addresses via management FW") > Signed-off-by: Qiushi Wu This just makes the code longer. v1 was perfectly fine, thanks for the fix.=20