Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp2646965rwr; Fri, 21 Apr 2023 11:46:12 -0700 (PDT) X-Google-Smtp-Source: AKy350bbQySweGpi1zl/RkIMW6AW0BRSrVHDII4S4vgN+H5BlrlxoldH3vW4CnEsiLdOUrPkFo4y X-Received: by 2002:a05:6a00:f0e:b0:63f:21e:cad8 with SMTP id cr14-20020a056a000f0e00b0063f021ecad8mr6643804pfb.3.1682102771770; Fri, 21 Apr 2023 11:46:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682102771; cv=none; d=google.com; s=arc-20160816; b=zcSHLoShq3fNnapXRDuC08BpDgliS4+N6q329T++xWYkOFypqo0y3BNOgffD/CeVM6 pjAtIO9QWdKH5pjNRyyxKDBVDudNgC6nQrG2/f/XnN806G6gw7w5GfM1qvgK3RncTR4e 5pPC2uvOA4B7JhmF0zgiRG44mrvxiPH0q8HsTM62OziTRInxLoema7a1e29f0ruMkWIN 66bnA76w2DkEdPenRe4sw2Ts4n/AZT5gg/FRZMjvsukL/siEqO7hN5Z5xS4tEgfS2rov 6PhsKLCqZaMlLZlG2G6IiGIis2CBhVcpAQTVmY56nnwoi2vtVUdLyLE08Uj3Vs9fuhOO ntvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=2uPv6X2rBSp6+FdDoFLC6zqRFEUtkpleKOv1pQszWEM=; b=gSX4Zgrik4aQbVJzU8aTX8g4J0yZFpLdugswLqcIs6flznIOhnkiPANbDeUGNKOwf6 Vdz3ZFXbhoxtdnvLhEd82x2R4yGhUb1El4H7tV71I0icR/tgH5RAec/Me074OEalgc39 U8LFSaw3FZtXNS/28VubA+U3UT0OWnUVWA0cqYuN/oWEYglB7OLNLjRb5iN7j0pzuWEJ xkS48LuaoBLUouSABrIpfxuAMvHQCnMc2sI9cJkaFGOVjqvbvXJjE/1D8XzpoicwIarV LI02xa+Pp3ge1bsIdxoqeWiDqGqm17QMJ9u5AWiEu6S7PgkgUlAi4jEsOYmp+jDR4P+f ngSA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y28-20020aa79afc000000b0063d2b810fcbsi5058152pfp.208.2023.04.21.11.45.59; Fri, 21 Apr 2023 11:46:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233306AbjDUSeb (ORCPT + 99 others); Fri, 21 Apr 2023 14:34:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46890 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233276AbjDUSe3 (ORCPT ); Fri, 21 Apr 2023 14:34:29 -0400 Received: from hust.edu.cn (mail.hust.edu.cn [202.114.0.240]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 629861FDF; Fri, 21 Apr 2023 11:34:25 -0700 (PDT) Received: from liber-MS-7D42.. ([10.12.190.56]) (user=gangecen@hust.edu.cn mech=LOGIN bits=0) by mx1.hust.edu.cn with ESMTP id 33LIXGFS021888-33LIXGFT021888 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Sat, 22 Apr 2023 02:33:21 +0800 From: Gencen Gan To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Gan Gecen Cc: hust-os-kernel-patches@googlegroups.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3] net: amd: Fix link leak when verifying config failed Date: Sat, 22 Apr 2023 02:33:03 +0800 Message-Id: <20230421183304.155460-1-gangecen@hust.edu.cn> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-FEAS-AUTH-USER: gangecen@hust.edu.cn X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After failing to verify configuration, it returns directly without releasing link, which may cause memory leak. Paolo Abeni thinks that the whole code of this driver is quite "suboptimal" and looks unmainatained since at least ~15y, so he suggests that we could simply remove the whole driver, please take it into consideration. Fixes: 2b3af54dc373 ("net: amd: Fix link leak when verifying config failed") Signed-off-by: Gan Gecen Reviewed-by: Paolo Abeni --- v2->v3: Add Fixes tag and add a suggestion about this driver. drivers/net/ethernet/amd/nmclan_cs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/amd/nmclan_cs.c b/drivers/net/ethernet/amd/nmclan_cs.c index 823a329a921f..0dd391c84c13 100644 --- a/drivers/net/ethernet/amd/nmclan_cs.c +++ b/drivers/net/ethernet/amd/nmclan_cs.c @@ -651,7 +651,7 @@ static int nmclan_config(struct pcmcia_device *link) } else { pr_notice("mace id not found: %x %x should be 0x40 0x?9\n", sig[0], sig[1]); - return -ENODEV; + goto failed; } } -- 2.34.1