Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2472982imm; Mon, 28 May 2018 08:44:44 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIHSwpiwnI2cUwwUGVu/Ln4DSSuC9C/N6Xkzdp+PYvxxeQNxFZXJCxO6tDa/nOwiYQfiEZp X-Received: by 2002:a63:be4f:: with SMTP id g15-v6mr6852347pgo.115.1527522284829; Mon, 28 May 2018 08:44:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527522284; cv=none; d=google.com; s=arc-20160816; b=ui1rwvGUdu24+eHC1v0OtbtyI4fxgfPtaq58burN0Tw7y4CUpn0WGAAXxY65goFldW f9otQgNTncICenCcDKAObYBD7WYlgrH4vhj/MbI93erNf/3eSNk+R2b4OaI2Pj4RW5Na xzb2ijld6DTtKilFZdp+4fNsI8JRX7ax/YiC6vnECEXTXPMcJFX7LV+E13gN+UWJzz85 EKa4+FzCCEECNYSOYGZ1XQQaLDDHEl9Vpk5hLYzWD6dB5UxYV4xVw3KNxGbm3D/1kh5P PUtdVDP17MrJgHNabSn3SFzU7g9618qhfIS7bR0UaQeVswW/WZwuxhh09VkMwzU5C+kb fF8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=KPfPJscJeepoiye+S/1IvOr1+Qp9XT5kk38nXpN6DuY=; b=R3GKulMPBwdR895EJM8VMCFyK33dxrq4/Bru2VwCLEEfTRLTZ9bR5FKQvCAlIHAPYN a652atcnc8tZ0dLJtErBdr4aNjxEwaw1VS9shzt26MWuzOYfDwRm2wixZwhJ4zMdO0yd SoKU8OTIXp0STb7roW0nLHG30InUT2fpZ6kW0BEm3nFi64AjQUyqKFMpPX8M51C4sQ6F 1KRmjZ5nhxvmBL5kitpu8J49BaGcXQ+8btklILg5ziOBR6ZB8/n1agGIfQ2TVGaxzrRP M4x7pJGYbK5f9oN7X5wSpJWmusYmcjwp2giP4Vd0lwJ4UqqQwtsQYboZSnvgbYkWlyr1 FXQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QvArzD1C; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c21-v6si30491174plo.51.2018.05.28.08.44.30; Mon, 28 May 2018 08:44:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QvArzD1C; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S968672AbeE1KRS (ORCPT + 99 others); Mon, 28 May 2018 06:17:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:37338 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S968655AbeE1KRL (ORCPT ); Mon, 28 May 2018 06:17:11 -0400 Received: from localhost (LFbn-1-12247-202.w90-92.abo.wanadoo.fr [90.92.61.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B8E62086D; Mon, 28 May 2018 10:17:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1527502630; bh=aynwAo48C0YofvUFNeC1TwXQ5g03cHEUA/9HtubGa+A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QvArzD1C6cUh7DjEvI8FgB7n69Z3CfzBZfkZgCzrOiXeckgcEkVglJ1kFhMU0hkKL FvWP6TzoISTW4gCL1MaPS9JeRlDH5cPlLs1YXynniOB+Pgm2bH2rp7hLFLOTDJosjm jIaU1PLVsAaiNB3/Gh7NX8n2wtG4AzzDJKerhjaY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Majd Dibbiny , Leon Romanovsky , Yuval Shaia , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.4 044/268] RDMA/mlx5: Avoid memory leak in case of XRCD dealloc failure Date: Mon, 28 May 2018 12:00:18 +0200 Message-Id: <20180528100207.064350989@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180528100202.045206534@linuxfoundation.org> References: <20180528100202.045206534@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Leon Romanovsky [ Upstream commit b081808a66345ba725b77ecd8d759bee874cd937 ] Failure in XRCD FW deallocation command leaves memory leaked and returns error to the user which he can't do anything about it. This patch changes behavior to always free memory and always return success to the user. Fixes: e126ba97dba9 ("mlx5: Add driver for Mellanox Connect-IB adapters") Reviewed-by: Majd Dibbiny Signed-off-by: Leon Romanovsky Reviewed-by: Yuval Shaia Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- drivers/infiniband/hw/mlx5/qp.c | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) --- a/drivers/infiniband/hw/mlx5/qp.c +++ b/drivers/infiniband/hw/mlx5/qp.c @@ -3161,12 +3161,9 @@ int mlx5_ib_dealloc_xrcd(struct ib_xrcd int err; err = mlx5_core_xrcd_dealloc(dev->mdev, xrcdn); - if (err) { + if (err) mlx5_ib_warn(dev, "failed to dealloc xrcdn 0x%x\n", xrcdn); - return err; - } kfree(xrcd); - return 0; }