Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp2913890pxb; Tue, 24 Aug 2021 10:28:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx8OpPNZ54u+n154jU2E/O9gH3dtWd5JIc6Lurj47L2mFO6+KVmpjBgNf1rGoLwV6aE92hD X-Received: by 2002:a17:906:3a57:: with SMTP id a23mr42011144ejf.469.1629826118110; Tue, 24 Aug 2021 10:28:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629826118; cv=none; d=google.com; s=arc-20160816; b=0LyHzRSlk6VEDAQzr3rV1ne5TH4uMBvFKmLhkLnOlxDmZ7gl9fY9Fhg6tx+SWWOo8G l/EZMeRmUJfLKgC6l9I2l68K9wTQ46kZDEaF9iyF//flKY+2yLy9KV1J/IHRX8K7GTJ+ MApdyOAVAFzGfV6ezK8qiC6P0GmUIzkgnTj9Yen3V/+xaqbJ6AW/RtfmlLqZiv4QwRBb zDH/oua6lkxeJwLBBokw5igeyofxALonlurQ0Gihytmh2bZEbAd6t5eyd25ev6eOo4HU eks4B0jjmqOu4dJgaTu8LsXoIamDwlK5fbzCKalbey3IUgvpRgH41BbEb2CAkV6nUW/j MX5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=ebwa6u5hXoyPREzTZLl32g2B+u8fVUVrs3DNHrWE3r0=; b=DkhfAigpNMRSZERAeGDQfpwn+tEL8Rvk9ZvMDVslUkaQThhn5WcPqclX+jIHL/zse+ d+TFQ+/hDcXOCzFJfpzGlE5SQdVZCVzN3iZOBXSAT91Q1uDtxUjc6M7y02wG0nyv/y/c c3sVE/46T3yC2mLnmirh32bh2h6qy/6D944nER0HuvCJXEZbTuZnm2J9tzKp2tz724Ck YEM3I/PzhHLNeB78R8vLDMMS9/uKOIUSBPZGJ6VZ1AFJrjzjxJxzszNcZTlBRM92ZY3A kM+31XOjNTV/Lwauahan6+acIIw5PmTr4hHLI43moxR4cryclF9x8rpOhTHBgISad8kg mp9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QuOF4Lzy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g6si18121885edb.449.2021.08.24.10.28.13; Tue, 24 Aug 2021 10:28:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QuOF4Lzy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241345AbhHXR1h (ORCPT + 99 others); Tue, 24 Aug 2021 13:27:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:59744 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241384AbhHXRYk (ORCPT ); Tue, 24 Aug 2021 13:24:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A65D761B2A; Tue, 24 Aug 2021 17:03:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1629824637; bh=h+YeNfH66MeNb6WUgwhqBZ4WAHXSEvz0AE0irN4zS/o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QuOF4Lzyb2bRm4pD6VPLmSzrF7n7H9rEd5X3J+0cROHjqfDUnyALgvaMNS+Ls4fL8 nIPHyJwvgcjr/wbsgbXm+vx99poNAg9SpD81opB4D7flUhY7bSk7z3EOe/JtdHaMh1 L+gWnEAfdju91i3Zcx+IBpNtXLGFP15Sw454jVqNLrw52uU2X51/xgVwugJQONVHrK SVN2Gp5gwXT4mJH1mDWcloWLfNRnwo+thoMCwzYnf7frNV1eni27xHT2UxHAXw6MEZ ryQrRpaC9ib5fWOaHtEVxzkv/sK0t8kAOtxgVV8ioEO04IOkXX/v2BFQifwDcY0rN4 Agu/1qNmpZInQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Saravana Kannan , Andrew Lunn , Marc Zyngier , Kevin Hilman , "David S . Miller" , Sasha Levin Subject: [PATCH 4.19 68/84] net: mdio-mux: Don't ignore memory allocation errors Date: Tue, 24 Aug 2021 13:02:34 -0400 Message-Id: <20210824170250.710392-69-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210824170250.710392-1-sashal@kernel.org> References: <20210824170250.710392-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.19.205-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.19.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.19.205-rc1 X-KernelTest-Deadline: 2021-08-26T17:02+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Saravana Kannan [ Upstream commit 99d81e942474cc7677d12f673f42a7ea699e2589 ] If we are seeing memory allocation errors, don't try to continue registering child mdiobus devices. It's unlikely they'll succeed. Fixes: 342fa1964439 ("mdio: mux: make child bus walking more permissive and errors more verbose") Signed-off-by: Saravana Kannan Reviewed-by: Andrew Lunn Acked-by: Marc Zyngier Tested-by: Marc Zyngier Acked-by: Kevin Hilman Tested-by: Kevin Hilman Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/phy/mdio-mux.c | 28 ++++++++++++++++++---------- 1 file changed, 18 insertions(+), 10 deletions(-) diff --git a/drivers/net/phy/mdio-mux.c b/drivers/net/phy/mdio-mux.c index 0a86f1e4c02f..bb7e3f12a003 100644 --- a/drivers/net/phy/mdio-mux.c +++ b/drivers/net/phy/mdio-mux.c @@ -85,6 +85,17 @@ out: static int parent_count; +static void mdio_mux_uninit_children(struct mdio_mux_parent_bus *pb) +{ + struct mdio_mux_child_bus *cb = pb->children; + + while (cb) { + mdiobus_unregister(cb->mii_bus); + mdiobus_free(cb->mii_bus); + cb = cb->next; + } +} + int mdio_mux_init(struct device *dev, struct device_node *mux_node, int (*switch_fn)(int cur, int desired, void *data), @@ -147,7 +158,7 @@ int mdio_mux_init(struct device *dev, cb = devm_kzalloc(dev, sizeof(*cb), GFP_KERNEL); if (!cb) { ret_val = -ENOMEM; - continue; + goto err_loop; } cb->bus_number = v; cb->parent = pb; @@ -155,8 +166,7 @@ int mdio_mux_init(struct device *dev, cb->mii_bus = mdiobus_alloc(); if (!cb->mii_bus) { ret_val = -ENOMEM; - devm_kfree(dev, cb); - continue; + goto err_loop; } cb->mii_bus->priv = cb; @@ -185,6 +195,10 @@ int mdio_mux_init(struct device *dev, dev_err(dev, "Error: No acceptable child buses found\n"); devm_kfree(dev, pb); + +err_loop: + mdio_mux_uninit_children(pb); + of_node_put(child_bus_node); err_pb_kz: put_device(&parent_bus->dev); err_parent_bus: @@ -196,14 +210,8 @@ EXPORT_SYMBOL_GPL(mdio_mux_init); void mdio_mux_uninit(void *mux_handle) { struct mdio_mux_parent_bus *pb = mux_handle; - struct mdio_mux_child_bus *cb = pb->children; - - while (cb) { - mdiobus_unregister(cb->mii_bus); - mdiobus_free(cb->mii_bus); - cb = cb->next; - } + mdio_mux_uninit_children(pb); put_device(&pb->mii_bus->dev); } EXPORT_SYMBOL_GPL(mdio_mux_uninit); -- 2.30.2