lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 24 Sep 2021 02:11:19 +0300 From: Leon Romanovsky <leon@...nel.org> To: Edwin Peer <edwin.peer@...adcom.com> Cc: "David S . Miller" <davem@...emloft.net>, Jakub Kicinski <kuba@...nel.org>, Alexander Lobakin <alobakin@...me>, Anirudh Venkataramanan <anirudh.venkataramanan@...el.com>, Ariel Elior <aelior@...vell.com>, GR-everest-linux-l2@...vell.com, GR-QLogic-Storage-Upstream@...vell.com, Igor Russkikh <irusskikh@...vell.com>, intel-wired-lan@...ts.osuosl.org, "James E.J. Bottomley" <jejb@...ux.ibm.com>, Javed Hasan <jhasan@...vell.com>, Jeff Kirsher <jeffrey.t.kirsher@...el.com>, Jesse Brandeburg <jesse.brandeburg@...el.com>, Jiri Pirko <jiri@...dia.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, linux-scsi@...r.kernel.org, "Martin K. Petersen" <martin.petersen@...cle.com>, Michael Chan <michael.chan@...adcom.com>, Michal Kalderon <michal.kalderon@...vell.com>, netdev <netdev@...r.kernel.org>, Sathya Perla <sathya.perla@...adcom.com>, Saurav Kashyap <skashyap@...vell.com>, Tony Nguyen <anthony.l.nguyen@...el.com>, Vasundhara Volam <vasundhara-v.volam@...adcom.com> Subject: Re: [PATCH net-next 1/6] bnxt_en: Check devlink allocation and registration status On Thu, Sep 23, 2021 at 02:11:40PM -0700, Edwin Peer wrote: > On Thu, Sep 23, 2021 at 11:13 AM Leon Romanovsky <leon@...nel.org> wrote: > > > > From: Leon Romanovsky <leonro@...dia.com> > > > > devlink is a software interface that doesn't depend on any hardware > > capabilities. The failure in SW means memory issues, wrong parameters, > > programmer error e.t.c. > > > > Like any other such interface in the kernel, the returned status of > > devlink APIs should be checked and propagated further and not ignored. > > > > Fixes: 4ab0c6a8ffd7 ("bnxt_en: add support to enable VF-representors") > > Signed-off-by: Leon Romanovsky <leonro@...dia.com> > > --- > > drivers/net/ethernet/broadcom/bnxt/bnxt.c | 5 ++++- > > drivers/net/ethernet/broadcom/bnxt/bnxt_devlink.c | 13 ++++++------- > > drivers/net/ethernet/broadcom/bnxt/bnxt_devlink.h | 13 ------------- > > 3 files changed, 10 insertions(+), 21 deletions(-) <...> > > @@ -835,9 +837,6 @@ void bnxt_dl_unregister(struct bnxt *bp) > > { > > struct devlink *dl = bp->dl; > > > > - if (!dl) > > - return; > > - > > minor nit: There's obviously nothing incorrect about doing this (and > adding the additional error label in the cleanup code above), but bnxt > has generally adopted a style of having cleanup functions being > idempotent. It generally makes error handling simpler and less error > prone. I would argue that opposite is true. Such "impossible" checks hide unwind flow errors, missing releases e.t.c. <...> > > > > Reviewed-by: Edwin Peer <edwin.peer@...adcom.com> Thanks for the review. > > Regards, > Edwin Peer
Powered by blists - more mailing lists