Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp4073621ybe; Mon, 9 Sep 2019 03:52:12 -0700 (PDT) X-Google-Smtp-Source: APXvYqzQsmn2tuY5qoS3zOUNXAH3urqwN3QJ1Z4hVRMmZLzeF9zNgmh8eOshcQGmYKSrN1OrVLEO X-Received: by 2002:a17:906:414:: with SMTP id d20mr19037165eja.165.1568026332012; Mon, 09 Sep 2019 03:52:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568026332; cv=none; d=google.com; s=arc-20160816; b=uDaGzdYRX1UmG9XXVdFivOnny2gOgHSw2kDE0WUPmx1j7Am7itwGOiCTfTxsRE1gsQ FgA/WZqBgp0gZBXanTDQMln1xukDLhtt4WfDOe7579cJxUjdaeKxUufd0CWZ3nnELYnl 4l/mWNsgg+1oXFvHnLjlYVyqyEdfd/llZtSgoSbkhkaC6SbRajkuR/ftxy2wyC3a/+02 JX4tS0oV2o86Gt1XRtTa64fu2W6Q3IfL4H2bGOgMtzQ8+f2htCrbG2w5UNwt/PUy879s 5oaD2WBhB9pw7ExVI03cThzjeSUUXsQTp9H7H4Rf5ghH7nYOKkRFOHAxokWaN5cTopiK g/ZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=k0UdeMZ/rSPv50sUfk9hlJEr3ViJ44vatQKtNC9Yrho=; b=rkdZ4r+zpG1Go4glVSudWX9X8Wo0BcYPpUIQ4PPzJnPQEQRjdknUA9tlssc718v/eZ hCOPlt6dMj79icL9wOne3WY8GFm59SXbi6681INvPiqLxTU4fhQOBJEvUhK+uRZB3LSy LgWXebN3hQ4WKAKuUdKtJcM1IIsrsYRs7q1S/1C+qdi/ufPv8sIbFvomAoPFz/E21z4V E0hfZI14SXvMZ4mC/+mCmh1QlGo7CTPkcH7SKu1qVuxBzDw9xIVStsz2nyAMHpYB51Cx 8WY16hrHZZ/rAvDe37a2xxEQ3HXyaia9CDwKVRGabBntYmB+t9ri10Rj6ki+fvcXYLzO kYrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kaBpULwF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k17si8385634edd.38.2019.09.09.03.51.48; Mon, 09 Sep 2019 03:52:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kaBpULwF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729693AbfIHMoG (ORCPT + 99 others); Sun, 8 Sep 2019 08:44:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:58482 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729665AbfIHMoF (ORCPT ); Sun, 8 Sep 2019 08:44:05 -0400 Received: from localhost (unknown [62.28.240.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B22B32081B; Sun, 8 Sep 2019 12:44:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1567946644; bh=HM9I2ffD9LQJGexsoxHofaVsblIDD/6Fu2IluB17Fco=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kaBpULwFupqoa9dQmEIqsJjQfCMzx42P7IxDhUXTtOgY7cyz0KJ/OqXDZI3qyBf1G XHZJ0NQrNmkY+cDU+E1XpHGPEt7kpQ6T4K1BFruVhEBisUoXjQCQkdIoWC03hJT1lR 8n90SHqYU0DAprmr9XIXk+ZMr0Bh7xxuauj35464= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Wenwen Wang , Leon Romanovsky , Doug Ledford , Sasha Levin Subject: [PATCH 4.9 13/26] IB/mlx4: Fix memory leaks Date: Sun, 8 Sep 2019 13:41:52 +0100 Message-Id: <20190908121103.480232305@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190908121057.216802689@linuxfoundation.org> References: <20190908121057.216802689@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 5c1baaa82cea2c815a5180ded402a7cd455d1810 ] In mlx4_ib_alloc_pv_bufs(), 'tun_qp->tx_ring' is allocated through kcalloc(). However, it is not always deallocated in the following execution if an error occurs, leading to memory leaks. To fix this issue, free 'tun_qp->tx_ring' whenever an error occurs. Signed-off-by: Wenwen Wang Acked-by: Leon Romanovsky Link: https://lore.kernel.org/r/1566159781-4642-1-git-send-email-wenwen@cs.uga.edu Signed-off-by: Doug Ledford Signed-off-by: Sasha Levin --- drivers/infiniband/hw/mlx4/mad.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/infiniband/hw/mlx4/mad.c b/drivers/infiniband/hw/mlx4/mad.c index d9323d7c479c3..f32ffd74ec476 100644 --- a/drivers/infiniband/hw/mlx4/mad.c +++ b/drivers/infiniband/hw/mlx4/mad.c @@ -1643,8 +1643,6 @@ tx_err: tx_buf_size, DMA_TO_DEVICE); kfree(tun_qp->tx_ring[i].buf.addr); } - kfree(tun_qp->tx_ring); - tun_qp->tx_ring = NULL; i = MLX4_NUM_TUNNEL_BUFS; err: while (i > 0) { @@ -1653,6 +1651,8 @@ err: rx_buf_size, DMA_FROM_DEVICE); kfree(tun_qp->ring[i].addr); } + kfree(tun_qp->tx_ring); + tun_qp->tx_ring = NULL; kfree(tun_qp->ring); tun_qp->ring = NULL; return -ENOMEM; -- 2.20.1