Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp3353316ybd; Tue, 25 Jun 2019 00:50:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqzrtRUgSOnn5brnfKa0LbWDt8QR9hmdlpLV3qXJP/EtAXlFVeqeTttdljwoFCHnTLCDl2r8 X-Received: by 2002:a17:90a:7107:: with SMTP id h7mr29715768pjk.38.1561449015237; Tue, 25 Jun 2019 00:50:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561449015; cv=none; d=google.com; s=arc-20160816; b=RfszMAgVPDKuTs7uiXT/1FH1gVBsu40fmCPkGGzdsHTAhpynHndO4118nRBC7cD5+O DfU89UpPtyFP/sifRqS/3fES6GZwUe68xqQ9puxBmw88uojkhImr6bX7Qqimu1vgNfv3 Ox8N1oMGcnLA/0m5PbZ0XjfJqGUcMJgm7dn6I0SZrm/0o3mR/dCr81ncRIB7Hn9CnPK4 L0UQOCDNvcIXTmhAfrnUgYW7nOg6pGw192+YgWtY9WgxGEsoITuBURH1DXNmWRn8kqXX qB1BcNXcfzNIzISnPqEl5D6XTUzEC0FO3PtN3r6IZLWQnxt9QczFK3yfPCPFEJBSVoQM v7ug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=fDZfZt6+Xfg7JrBGI3veub2fCzEYjCwvi4ZYsQ7TWPc=; b=iwgL0QyybdfpAPmu3zi7zpIhpSa+NJRozl2y12oiKQjEhTgYCiEGa/mjfrHf5tcUhb Qb9YjvTMDCb7PXPFwY8NywDeddPfZuhK9D6SDukxOJCexWZ0Vo4VBbv0t+RdDwWckry1 ao+JWunyxvdBVFYwafyM3XRGpUo5Dg2gB9UyLBsHoAmNKbF+IUc80h4TmawVxcZ0L7PO j4GYT2J/Vh7gD1UN9DlDxMd469CkAt2QzzW4myusL9cvPamOYE5WP1gVvjGsiVZKiIHJ KPSZoUAqrjT9l8RDdNPfNtWp1DEN2RuTRLx/qw8G5McD//UNKHAl9aAbWw0j98sIbeds +bBg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2si8834865plr.425.2019.06.25.00.49.59; Tue, 25 Jun 2019 00:50:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729846AbfFYHJI (ORCPT + 99 others); Tue, 25 Jun 2019 03:09:08 -0400 Received: from verein.lst.de ([213.95.11.211]:60150 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726397AbfFYHJI (ORCPT ); Tue, 25 Jun 2019 03:09:08 -0400 Received: by newverein.lst.de (Postfix, from userid 2407) id D31E168B05; Tue, 25 Jun 2019 09:08:35 +0200 (CEST) Date: Tue, 25 Jun 2019 09:08:35 +0200 From: Christoph Hellwig To: Alan Mikhak Cc: linux-nvme@lists.infradead.org, linux-kernel@vger.kernel.org, keith.busch@intel.com, axboe@fb.com, hch@lst.de, sagi@grimberg.me, palmer@sifive.com, paul.walmsley@sifive.com Subject: Re: [PATCH] nvme-pci: Avoid leak if pci_p2pmem_virt_to_bus() returns null Message-ID: <20190625070835.GC30123@lst.de> References: <1561420642-21186-1-git-send-email-alan.mikhak@sifive.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1561420642-21186-1-git-send-email-alan.mikhak@sifive.com> User-Agent: Mutt/1.5.17 (2007-11-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jun 24, 2019 at 04:57:22PM -0700, Alan Mikhak wrote: > Modify nvme_alloc_sq_cmds() to call pci_free_p2pmem() > to free the memory it allocated using pci_alloc_p2pmem() > in case pci_p2pmem_virt_to_bus() returns null. > > Make sure not to call pci_free_p2pmem() if pci_alloc_p2pmem() > returned null which can happen if CONFIG_PCI_P2PDMA is not > configured. Can you > > Signed-off-by: Alan Mikhak > --- > drivers/nvme/host/pci.c | 14 +++++++++----- > 1 file changed, 9 insertions(+), 5 deletions(-) > > diff --git a/drivers/nvme/host/pci.c b/drivers/nvme/host/pci.c > index 524d6bd6d095..5dfa067f6506 100644 > --- a/drivers/nvme/host/pci.c > +++ b/drivers/nvme/host/pci.c > @@ -1456,11 +1456,15 @@ static int nvme_alloc_sq_cmds(struct nvme_dev *dev, struct nvme_queue *nvmeq, > > if (qid && dev->cmb_use_sqes && (dev->cmbsz & NVME_CMBSZ_SQS)) { > nvmeq->sq_cmds = pci_alloc_p2pmem(pdev, SQ_SIZE(depth)); > - nvmeq->sq_dma_addr = pci_p2pmem_virt_to_bus(pdev, > - nvmeq->sq_cmds); > - if (nvmeq->sq_dma_addr) { > - set_bit(NVMEQ_SQ_CMB, &nvmeq->flags); > - return 0; > + if (nvmeq->sq_cmds) { > + nvmeq->sq_dma_addr = pci_p2pmem_virt_to_bus(pdev, > + nvmeq->sq_cmds); > + if (nvmeq->sq_dma_addr) { > + set_bit(NVMEQ_SQ_CMB, &nvmeq->flags); > + return 0; > + } > + > + pci_free_p2pmem(pdev, nvmeq->sq_cmds, SQ_SIZE(depth)); pci_p2pmem_virt_to_bus should only fail when pci_p2pmem_virt_to_bus failed. That being said I think doing the error check on pci_alloc_p2pmem instead of relying on pci_p2pmem_virt_to_bus "passing through" the error seems odd, I'd rather check the pci_alloc_p2pmem return value directly.