Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1570482imu; Wed, 16 Jan 2019 23:04:12 -0800 (PST) X-Google-Smtp-Source: ALg8bN7HgJpK0ZtsaOGQ3ekKBuRVmKS/wEqkperfMtDt5sgP22sTZ9LbrLxwUleOqEnxu0E+emZL X-Received: by 2002:a62:938f:: with SMTP id r15mr13712408pfk.27.1547708652235; Wed, 16 Jan 2019 23:04:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547708652; cv=none; d=google.com; s=arc-20160816; b=OAMJWUoaaaBac4rzHESkKkxu49Qwe+ue0aJP3bmTQMy8aTXRhnl4T8z8gRdVbHL+rs /w514uaBLMQ2RQQ6LqoLGB4F4lbiGOwR4lB1q4NEkT8IcCNHyh3DYhbcyxs0wStnMnZJ MArLVxy7Ipw0TMANdaENEr9raSi6qpqvU+KI36KbuWyNEr5o5MUvA9rgLZylthIPxhll 1ytQIYTJHPFOMk28FJKu67VpGDXgfhkMZ+HVmowcB1w6pZBKTw1Co/av9y7YpbNvPmKm 2JwmindCLpCo+Dt0h4/RP5Km1goIRnYBzbHpuX0Y0zEbfhpq0aRzNRnRkoFeHrDNuHXa Axig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from; bh=zZB50k6uYvmjMqD7DR03DRTVd6hFKYRrY8ADNGeQwhw=; b=wybULY5ZEMTYhimzfjFZ6lti8W1jT7UlhVNPPOvRRrDkayNfZHj+voBRwnvIzbZ3QF VmK577+RJ0XUXzm5ItddvbT+QBHFpp+2WyKmGeyNEZMAqFdRUjGQ+fo4+AejQug0Y31o cx/K918wy//XPuqy42emUbY0O26a3KDm6mQy7vvRpHCzXpFGI3u/9VuELm1s1YhHdGV8 hjKYqbLsJMiYxjQEJV+2NjJszmpuxggljHaRLNxOjXS5P5oa7VADtjvSFbaZaMv7Rmkn cw9iOg75pAj7Rcg/vEFdSGwVFtgjoGgxL+lvPLF3CFSO/5t13x4T8N5h9VSqRoXmH9j5 +O6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t3si911985pgl.108.2019.01.16.23.03.54; Wed, 16 Jan 2019 23:04:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730347AbfAPTMk (ORCPT + 99 others); Wed, 16 Jan 2019 14:12:40 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:40234 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729879AbfAPTMk (ORCPT ); Wed, 16 Jan 2019 14:12:40 -0500 Received: from pps.filterd (m0098414.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id x0GJ3k2B139752 for ; Wed, 16 Jan 2019 14:12:38 -0500 Received: from e06smtp02.uk.ibm.com (e06smtp02.uk.ibm.com [195.75.94.98]) by mx0b-001b2d01.pphosted.com with ESMTP id 2q29ptj2e0-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 16 Jan 2019 14:12:38 -0500 Received: from localhost by e06smtp02.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Wed, 16 Jan 2019 19:12:36 -0000 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp02.uk.ibm.com (192.168.101.132) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Wed, 16 Jan 2019 19:12:32 -0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x0GJCVuf42729642 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 16 Jan 2019 19:12:31 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 89D5D52051; Wed, 16 Jan 2019 19:12:31 +0000 (GMT) Received: from tuxmaker.boeblingen.de.ibm.com (unknown [9.152.85.9]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTPS id 4034052050; Wed, 16 Jan 2019 19:12:31 +0000 (GMT) From: Gerald Schaefer To: Joerg Roedel Cc: David Woodhouse , Robin Murphy , linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, kvm@vger.kernel.org, Alex Williamson , Eric Auger , Gerald Schaefer Subject: [PATCH] iommu/intel-iommu: fix memory leak in intel_iommu_put_resv_regions() Date: Wed, 16 Jan 2019 20:11:44 +0100 X-Mailer: git-send-email 2.16.4 X-TM-AS-GCONF: 00 x-cbid: 19011619-0008-0000-0000-000002B1F41F X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19011619-0009-0000-0000-0000221E0EA9 Message-Id: <20190116191144.15652-1-gerald.schaefer@de.ibm.com> Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7BIT MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-01-16_08:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=889 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1901160153 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 9d3a4de4cb8d ("iommu: Disambiguate MSI region types") changed the reserved region type in intel_iommu_get_resv_regions() from IOMMU_RESV_RESERVED to IOMMU_RESV_MSI, but it forgot to also change the type in intel_iommu_put_resv_regions(). This leads to a memory leak, because now the check in intel_iommu_put_resv_regions() for IOMMU_RESV_RESERVED will never be true, and no allocated regions will be freed. Fix this by changing the region type in intel_iommu_put_resv_regions() to IOMMU_RESV_MSI, matching the type of the allocated regions. Fixes: 9d3a4de4cb8d ("iommu: Disambiguate MSI region types") Cc: # v4.11+ Signed-off-by: Gerald Schaefer --- drivers/iommu/intel-iommu.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c index 048b5ab36a02..b83e0f2025bb 100644 --- a/drivers/iommu/intel-iommu.c +++ b/drivers/iommu/intel-iommu.c @@ -5295,7 +5295,7 @@ static void intel_iommu_put_resv_regions(struct device *dev, struct iommu_resv_region *entry, *next; list_for_each_entry_safe(entry, next, head, list) { - if (entry->type == IOMMU_RESV_RESERVED) + if (entry->type == IOMMU_RESV_MSI) kfree(entry); } } -- 2.16.4