Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp5784061rwr; Mon, 24 Apr 2023 08:57:05 -0700 (PDT) X-Google-Smtp-Source: AKy350bTaraYpI+14h2GOyJMAceoo4LR8gsmePC/dtzvTeE04MlsF9CLG+exWGEC6APkKQtAKoMc X-Received: by 2002:a05:6a21:3396:b0:f0:6aaf:1abf with SMTP id yy22-20020a056a21339600b000f06aaf1abfmr19948096pzb.4.1682351824776; Mon, 24 Apr 2023 08:57:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682351824; cv=none; d=google.com; s=arc-20160816; b=CK4rT7D/6uta08Kc7QvRVF61Is4AW9fJjQjDrZH2VH0zB9e/MCfdm3K6vW0A8+RDwS rNtawqu1AWIesps+6JvjR4jvz34NixXfrRjBu00ToMnUGRHhnQ2NYDQuqm5vorBfHjV7 7+SEFGeHbRuUd1Vt69SXr9hWL2sgHo9n+qz6P4CZDRktTxcJESP4f27ff9u1326u8anp LD8X++VIWJ2gbnCtqOKOjZZOwlMd7akI7DAdac1YwgdbyTw6PCWxhjqXk3nMYJgmYm9X 4dtEvo0yFda4+XPpl1efhEYrwB/xoI25HzNeDcCeKgkxRoJbfJpWNX7ieK/3jN5YPYQO BfDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=bHmMpx/Tb4g0rMasyOQZNRAedhzAxvNuXZdWPFthlmg=; b=NF2Mh4xCcjcp5sgyYqJIPR8AcS0S0SSPxO7kyuMMjaUjpzmmom8KNdQFgrOT8HNYiv S7QjflAzJpf/4MkKkKJw4FN62yEYLrEKjG24I6+tu8gX7zIHgv5ioeUWISka+A8N4Sw3 mI49ntyTsJEFBuIvwT8GwPXXTO/IqRMDDk0e3+UEllVWgRdGbv5vYqbQ6+T7WRqpyzwZ LO4Zil59VAL+1UyNtSWJ8ZrEqFc1lvhc+FJYafxUd1Y3/h95xXTlJq6VuilxCyEB+pg/ 5Yg7/zB3VsdgwO/EEvzbeHT6dTTlsiRFCqbc2ZFP0u1t2aSSCwuQMZVOpzSWFyN4gJ9r LEOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q4-20020a634304000000b00524b2358ffcsi11278870pga.574.2023.04.24.08.56.53; Mon, 24 Apr 2023 08:57:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232097AbjDXPpn (ORCPT + 99 others); Mon, 24 Apr 2023 11:45:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232093AbjDXPpl (ORCPT ); Mon, 24 Apr 2023 11:45:41 -0400 Received: from hust.edu.cn (mail.hust.edu.cn [202.114.0.240]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DE28B6EAB; Mon, 24 Apr 2023 08:45:37 -0700 (PDT) Received: from liber-MS-7D42.. ([10.12.190.56]) (user=gangecen@hust.edu.cn mech=LOGIN bits=0) by mx1.hust.edu.cn with ESMTP id 33OFSRmo021659-33OFSRmp021659 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 24 Apr 2023 23:28:32 +0800 From: Gencen Gan To: "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni Cc: hust-os-kernel-patches@googlegroups.com, Gan Gecen , Dongliang Mu , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v5] net: amd: Fix link leak when verifying config failed Date: Mon, 24 Apr 2023 23:28:01 +0800 Message-Id: <20230424152805.188004-1-gangecen@hust.edu.cn> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-FEAS-AUTH-USER: gangecen@hust.edu.cn X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org After failing to verify configuration, it returns directly without releasing link, which may cause memory leak. Paolo Abeni thinks that the whole code of this driver is quite "suboptimal" and looks unmainatained since at least ~15y, so he suggests that we could simply remove the whole driver, please take it into consideration. Simon Horman suggests that the fix label should be set to "Linux-2.6.12-rc2" considering that the problem has existed since the driver was introduced and the commit above doesn't seem to exist in net/net-next. Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2") Signed-off-by: Gan Gecen Reviewed-by: Dongliang Mu --- v4->v5: I have made some mistakes on patch rules, sorry for that. v3->v4: Modify the 'Fixes:' tag to make it more accurate. v2->v3: Add Fixes tag and add a suggestion about this driver. v1->v2: Fix the whitespace-damaged bug. drivers/net/ethernet/amd/nmclan_cs.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/amd/nmclan_cs.c b/drivers/net/ethernet/amd/nmclan_cs.c index 823a329a921f..0dd391c84c13 100644 --- a/drivers/net/ethernet/amd/nmclan_cs.c +++ b/drivers/net/ethernet/amd/nmclan_cs.c @@ -651,7 +651,7 @@ static int nmclan_config(struct pcmcia_device *link) } else { pr_notice("mace id not found: %x %x should be 0x40 0x?9\n", sig[0], sig[1]); - return -ENODEV; + goto failed; } } -- 2.34.1