Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4924761imc; Mon, 25 Feb 2019 13:45:47 -0800 (PST) X-Google-Smtp-Source: AHgI3Ia9t30sYhf9sqezmFFH7qEUEYToIs6j6yE3/7iWxebfvr+Upx0ZJOBVOkMwi1YALs0/w7Hf X-Received: by 2002:a62:f201:: with SMTP id m1mr22384101pfh.97.1551131147462; Mon, 25 Feb 2019 13:45:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551131147; cv=none; d=google.com; s=arc-20160816; b=UbHoN5c1JWMTjSDWMGSn1jR/RQvgJyhz3s83BBZZkQclb3bPhs5dHvnKfV1C1MHMtj Qbxs45TCCagTrv0Wpogr4BoFBd2EKiZJDwiKOTTQJ4XhV8QD09R5TJBi3cp4Ml/5pKsH LqayXoYwwY6nnGf6PWu7F1pRRzd/WO8kbeKVEugLMZk7N74Z+WyH4HSyVgVoUG0k767H d+A212P/X/8Vx1WHxHEjzXDPcunJehZkfebczIpLqW2fc7iicB0M0gg2GxXvUMO0NmQu VIQyW95rHcCVEX9Ttl9bFaEahGOUVOqrj51b9yxhOlgXaMM1Zy3Fz5BlXT5Mvt6v8I6A 6r6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Te3Q/tbOyPqb3wGPh5mDpISKZ6HG0mXN3n5GyNofndA=; b=T4eZIkQ1XSxgHhq7EgOKr2tav1Q35ya9JbBg4HC56MA7/EPewfBDB5jekRJ56lyHUW 6yJlVlV1fU+DOP7LLUuGiUT8RTSoKa+8QfXJpsX6sDZfNbJhvAP9boWCbIjTEpWt/ye8 ULJESVA86CuomMTli4kjDuFO+7FhAkCJeAe9NzAH+5Z7x79noVhwQFsIkYw0fUgjqpIZ YwnO1qQHYq/UvuOyR3wSM6kA/OsCmsQbUbenolS9aJDqom6tWuVv4uUe2r9CLzSLeF+M IAtwv05uzECJIOBUNjLz1PMU7zL+F5wdNi81swwlZYoe9MmOmDB/z/9blDRBdmdcR/ox u/HQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vr+RkBac; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k190si10517011pgc.264.2019.02.25.13.45.32; Mon, 25 Feb 2019 13:45:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Vr+RkBac; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731356AbfBYVa1 (ORCPT + 99 others); Mon, 25 Feb 2019 16:30:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:36090 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731904AbfBYVaZ (ORCPT ); Mon, 25 Feb 2019 16:30:25 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 354722184D; Mon, 25 Feb 2019 21:30:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130224; bh=+Ezxk4Bju/vmiPjHANSiN0WsM6dxPjVJM1c5vYNEfZI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Vr+RkBacvuyW/mpBfNAMKzC235x0+QO1yS8WsrwRusIbh6fxvRR6PBZPuPFZ7ClMU dgZO8ZLXP1v4mrpQT+bj7PEYcc7b2vzmwGdpcGjHcept/wuxyL2/UOnqoJBGDvYO+L ZB2b3XF0aLsun4HXNseJBJtltfl9eCwtBfrkr9zA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Chuck Lever , Anna Schumaker , Sasha Levin Subject: [PATCH 4.20 052/183] xprtrdma: Double free in rpcrdma_sendctxs_create() Date: Mon, 25 Feb 2019 22:10:25 +0100 Message-Id: <20190225195103.330170222@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 6e17f58c486d9554341f70aa5b63b8fbed07b3fa ] The clean up is handled by the caller, rpcrdma_buffer_create(), so this call to rpcrdma_sendctxs_destroy() leads to a double free. Fixes: ae72950abf99 ("xprtrdma: Add data structure to manage RDMA Send arguments") Signed-off-by: Dan Carpenter Reviewed-by: Chuck Lever Signed-off-by: Anna Schumaker Signed-off-by: Sasha Levin --- net/sunrpc/xprtrdma/verbs.c | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/net/sunrpc/xprtrdma/verbs.c b/net/sunrpc/xprtrdma/verbs.c index 919fddec01973..dffedf1df02ce 100644 --- a/net/sunrpc/xprtrdma/verbs.c +++ b/net/sunrpc/xprtrdma/verbs.c @@ -912,17 +912,13 @@ static int rpcrdma_sendctxs_create(struct rpcrdma_xprt *r_xprt) for (i = 0; i <= buf->rb_sc_last; i++) { sc = rpcrdma_sendctx_create(&r_xprt->rx_ia); if (!sc) - goto out_destroy; + return -ENOMEM; sc->sc_xprt = r_xprt; buf->rb_sc_ctxs[i] = sc; } return 0; - -out_destroy: - rpcrdma_sendctxs_destroy(buf); - return -ENOMEM; } /* The sendctx queue is not guaranteed to have a size that is a -- 2.19.1