Received: by 10.192.165.156 with SMTP id m28csp1109992imm; Wed, 11 Apr 2018 12:36:13 -0700 (PDT) X-Google-Smtp-Source: AIpwx499GsEQkTa/Ujbf/Ppwf7Vv19Yb6ohJfcys72bMxXUxpGFiEDRnyyA1M23C7jmRdmidxlkl X-Received: by 10.101.65.4 with SMTP id w4mr2973676pgp.413.1523475373198; Wed, 11 Apr 2018 12:36:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523475373; cv=none; d=google.com; s=arc-20160816; b=acYEZCwqoxg33f+b0z0Qmr4eurCXheFv6WEGMfgzuWHgp0SWQ8+yEWyJqMb+HOm+gU QXth98mdcVwjiMY1B9w4KzWC7GulswTH5DiFE9XlN6DmqQHg7Go8XscP/31U9ZzBVUQz dZSkuwTGZTQyj28ggjwpPvt9l6usisTUhd/sHyBZnlRPICRXYdnnkO4pae7MHIiTJqPJ puPCOBKVD3ZrrT7TuLdQuKT/anmGN/fmrFNbC9tj2U+54iHaXp97uHQG99SzwwwVqbhq eThq/iUu+BltikGi7HHocyd0hGcWzWCMS3ZlNL/pEIMzxxdzW8oJcwsJ6hyf1JqZPnlK EVxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=ES0OLoyVX01xlPQc8iT23uegxpe3O7Mu5UgGigxT9Xo=; b=ZPyWyn98WzcXRBTxhS84OH21Aq1sqwb5cjzIwVDrych3IxtsKwn4BE2aCQWbEwCd7q 9wdxv6jlCxz7v8FrJE4AF7xsvVkyZXTyyVCtEczlBZrxkty/IDoMekwCywXd4vakzgIH qM5LxlBh2W9kOA/pNQoGcjhgjxcFD45vGP5pCfy7ePHZLrWbC5jLAxTx8hR5SZMjgiGJ XqLLbz3QvVqRHiZK/i/S1+HrkL5mCg+2pF09TOgW3NTXuePjjZLVnw6FI0Y8QT+KszUz BfJaFBXNNbPDeck5cvotIZJ8O/WFJ02zPqZTwWz9ijxZolbJI+6KGLx9uHaPxtZ//lHS TjkA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 207si1295145pfz.108.2018.04.11.12.35.36; Wed, 11 Apr 2018 12:36:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934509AbeDKTCh (ORCPT + 99 others); Wed, 11 Apr 2018 15:02:37 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:38558 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934496AbeDKTCb (ORCPT ); Wed, 11 Apr 2018 15:02:31 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 16A47DAC; Wed, 11 Apr 2018 19:02:30 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Raju Rangoju , Steve Wise , Doug Ledford , Sasha Levin Subject: [PATCH 4.9 182/310] RDMA/iw_cxgb4: Avoid touch after free error in ARP failure handlers Date: Wed, 11 Apr 2018 20:35:21 +0200 Message-Id: <20180411183630.431115360@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180411183622.305902791@linuxfoundation.org> References: <20180411183622.305902791@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Raju Rangoju [ Upstream commit 1dad0ebeea1cd890b8892523f736916e245b0aef ] The patch 761e19a504af (RDMA/iw_cxgb4: Handle return value of c4iw_ofld_send() in abort_arp_failure()) from May 6, 2016 leads to the following static checker warning: drivers/infiniband/hw/cxgb4/cm.c:575 abort_arp_failure() warn: passing freed memory 'skb' Also fixes skb leak when l2t resolution fails Fixes: 761e19a504afa55 (RDMA/iw_cxgb4: Handle return value of c4iw_ofld_send() in abort_arp_failure()) Reported-by: Dan Carpenter Cc: Dan Carpenter Signed-off-by: Raju Rangoju Reviewed-by: Steve Wise Signed-off-by: Doug Ledford Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/cxgb4/cm.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/drivers/infiniband/hw/cxgb4/cm.c +++ b/drivers/infiniband/hw/cxgb4/cm.c @@ -488,6 +488,7 @@ static int _put_ep_safe(struct c4iw_dev ep = *((struct c4iw_ep **)(skb->cb + 2 * sizeof(void *))); release_ep_resources(ep); + kfree_skb(skb); return 0; } @@ -498,6 +499,7 @@ static int _put_pass_ep_safe(struct c4iw ep = *((struct c4iw_ep **)(skb->cb + 2 * sizeof(void *))); c4iw_put_ep(&ep->parent_ep->com); release_ep_resources(ep); + kfree_skb(skb); return 0; } @@ -569,11 +571,13 @@ static void abort_arp_failure(void *hand PDBG("%s rdev %p\n", __func__, rdev); req->cmd = CPL_ABORT_NO_RST; + skb_get(skb); ret = c4iw_ofld_send(rdev, skb); if (ret) { __state_set(&ep->com, DEAD); queue_arp_failure_cpl(ep, skb, FAKE_CPL_PUT_EP_SAFE); - } + } else + kfree_skb(skb); } static int send_flowc(struct c4iw_ep *ep)