Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp5418524rwr; Mon, 24 Apr 2023 04:04:13 -0700 (PDT) X-Google-Smtp-Source: AKy350YcTm/f7yWBUrtN+hWan2061oYazaxA97X581f4IhK1RlqV+/oQVxV8ZMoOwEKYoc5Tbki7 X-Received: by 2002:a92:c947:0:b0:32b:68e9:9ea7 with SMTP id i7-20020a92c947000000b0032b68e99ea7mr4871127ilq.11.1682334253313; Mon, 24 Apr 2023 04:04:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682334253; cv=none; d=google.com; s=arc-20160816; b=O7wRaH08cbu2d1ujLwruEbVNVLI3v73axW8ogN+DObe8wZ2oHNIvPbEGz1NgizMpNb hGerFXQV2uE1ZM0H5VcEFoMQF/nhN9+Vi+ej+1Jo+WrBe7mG6rKgtiCub8ync7JlcwNq 1EfOKPvyk+VrzsoTarp+Tl0gZ/noV6ptOCLSlqYWZErNs9FEU7Rw1Hqu+C6fm2eMVPDi KxNV0woYjYMbnubGsBTIx9iLivLn/FLKhIBc4YvKw60jyOmHq3h07i8Ui/4ALdw9Comt s57ucmlVw+EojJq8gPInmGMkUlmfdYykIEK1EwcZYEq5g4tLMf2tKec6z61wCJEHt6SL cKGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=E7zDaJiqZlyklRAoSOOlbIQdFd0dcMvh4ZPQmMBKwy8=; b=lvZcX1HZvcjViF77lMhuUnuGwyTKWI75vjHjnvxIrLFFO/OY5mq9ONVtT3Zv8EBm/p TciixXo/dnCngl0sH4JzPNpDcxK4eIuZqIgaJMjS9UBhFVgNTG25qJQoUYqQbe/MpCOe mSblV17mbXXmSK6A7nTq5hm5PbZBkHRBEB5hVhDr8QMVm9E5X+gZMME/aSpXIZFNe5qR s64ImQXZYUMkt8EmI5aBa+UK32GhgBiJynb48HQgeNbfgpfpaXem7wwxCLv27nAmsrZi Bb4IrXdZJOC+arrBZY15FMOyLssPAwM7RwkAd/18vA7YHJqHLlNhgMCznn0HYsbm3Bo/ BThA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z7-20020a92d6c7000000b0032855378ee9si9809271ilp.12.2023.04.24.04.03.36; Mon, 24 Apr 2023 04:04:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231596AbjDXLAD (ORCPT + 99 others); Mon, 24 Apr 2023 07:00:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43344 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230319AbjDXLAA (ORCPT ); Mon, 24 Apr 2023 07:00:00 -0400 Received: from hust.edu.cn (unknown [202.114.0.240]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 577DB2D79; Mon, 24 Apr 2023 03:59:58 -0700 (PDT) Received: from liber-MS-7D42.. ([10.12.190.56]) (user=gangecen@hust.edu.cn mech=LOGIN bits=0) by mx1.hust.edu.cn with ESMTP id 33OAkiQM018241-33OAkiQN018241 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 24 Apr 2023 18:46:49 +0800 From: Gencen Gan To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Gan Gecen Cc: hust-os-kernel-patches@googlegroups.com, Simon Horman , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v4] net: amd: Fix link leak when verifying config failed Date: Mon, 24 Apr 2023 18:46:43 +0800 Message-Id: <20230424104643.182296-1-gangecen@hust.edu.cn> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-FEAS-AUTH-USER: gangecen@hust.edu.cn X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After failing to verify configuration, it returns directly without releasing link, which may cause memory leak. Paolo Abeni thinks that the whole code of this driver is quite "suboptimal" and looks unmainatained since at least ~15y, so he suggests that we could simply remove the whole driver, please take it into consideration. Simon Horman suggests that the fix label should be set to "Linux-2.6.12-rc2" considering that the problem has existed since the driver was introduced and the commit above doesn't seem to exist in net/net-next. Fixes: 99c3b0265649 ("Linux-2.6.12-rc2") Signed-off-by: Gan Gecen Reviewed-by: Paolo Abeni Reviewed-by: Simon Horman --- v3->v4: modify the 'Fixes:' tag to make it more accurate. drivers/net/ethernet/amd/nmclan_cs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/amd/nmclan_cs.c b/drivers/net/ethernet/amd/nmclan_cs.c index 823a329a921f..0dd391c84c13 100644 --- a/drivers/net/ethernet/amd/nmclan_cs.c +++ b/drivers/net/ethernet/amd/nmclan_cs.c @@ -651,7 +651,7 @@ static int nmclan_config(struct pcmcia_device *link) } else { pr_notice("mace id not found: %x %x should be 0x40 0x?9\n", sig[0], sig[1]); - return -ENODEV; + goto failed; } } -- 2.34.1