Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp898941ybj; Fri, 20 Sep 2019 01:41:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqzf4hrSTTCf9KlWO/A9G+M9Ovx0l6Wwklh83AN1LlrKH52LdwFPetedOh67FxAXp4oyL/SZ X-Received: by 2002:a50:fa0d:: with SMTP id b13mr8556812edq.66.1568968870939; Fri, 20 Sep 2019 01:41:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568968870; cv=none; d=google.com; s=arc-20160816; b=adMR/SXO860xfSd/xnFDI6thxl0e0x5/Iqtzvktqrdo/+u/hgqlzZxiV2n829TMVRu pJ1nUy9S42V2AYTce+uxTTUCG+8VfudkqKvAXajn+a2hmfyCfktSyXBCEi2BXuskYeHO U4BiCEPL1DKs5ntWdYtwm8+2R6N8k94IrEwLnyjs+ibVN5lCxVbzw0NtlcCNGqKSFQj2 e4MtGTLOuRbwywHHMxE6I/moPBH61i/1pUptOkU1MDwSrJ6FSN7N0yNoAzPJhQ7Uw94x EwdCnsGaxlW4iUkrOK+y/0mas30wFsPNUY4ti96/G5/+bRr0diDHSm/QP1CF15kkAcnD Jhkw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=zmiOut2LojfKJXD6qYc//kklkwJbT3qPJbVDIWSD96w=; b=q5DH9xUqR8cnxN2Wg1FSKPIBAvAFtuvzFtw67KwBAsoz0tEvrHmY92FaG53iPoXj6r uH4gbc7I/s3B9MdZl9bFW9WShzmRxhsZ4xat0X416wXWXFRI4dgG1td3z6QXI/pySJ4s EAEAMEls1qKswT3vXVBEBGuSFXOX8EfEqf20QoGlvTn3QZyAOQT6e+yiEvXndHU3+sSl 39HH9T0EvmYeNvuI24uGw28Z+3Hcnzf5UoOoKrMDzeJBVl7YH1E+AqA00ZgVmBPPmeOh c+hxyBGx1XI5FKW1Pb3dOgKiYRaNS1Tlz2SuwaeMZZyvRLj+pIPxEO4bxVyhY7aexKHm cAIg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FpicqyFA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id sb7si681706ejb.321.2019.09.20.01.40.47; Fri, 20 Sep 2019 01:41:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FpicqyFA; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391785AbfISWIX (ORCPT + 99 others); Thu, 19 Sep 2019 18:08:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:46252 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393402AbfISWIV (ORCPT ); Thu, 19 Sep 2019 18:08:21 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C258821928; Thu, 19 Sep 2019 22:08:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568930900; bh=BJV4xn+dCqPEYrNnYRxOCtNh4EYW7nfGMGy0JjAm954=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FpicqyFAD+P8riHC88Y8TizX8prVdJoBWcL/qoTtMgunuKSc6h9YEoGc2Ne7OsImf +YZ1Dv7/TuHP9McA05U7JTLR6iRDl0VaApRMWnbJoErf/CcI+rdAnNJFnt0XybkcI4 iV1SN/QJL8LG3ArQSb2LcUkgxjks5+RrZMl+6lBE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ivan Khoronzhuk , Jonathan Lemon , Daniel Borkmann , Sasha Levin Subject: [PATCH 5.2 055/124] xdp: unpin xdp umem pages in error path Date: Fri, 20 Sep 2019 00:02:23 +0200 Message-Id: <20190919214821.003628809@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190919214819.198419517@linuxfoundation.org> References: <20190919214819.198419517@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ivan Khoronzhuk [ Upstream commit fb89c39455e4b49881c5a42761bd71f03d3ef888 ] Fix mem leak caused by missed unpin routine for umem pages. Fixes: 8aef7340ae9695 ("xsk: introduce xdp_umem_page") Signed-off-by: Ivan Khoronzhuk Acked-by: Jonathan Lemon Signed-off-by: Daniel Borkmann Signed-off-by: Sasha Levin --- net/xdp/xdp_umem.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/net/xdp/xdp_umem.c b/net/xdp/xdp_umem.c index 9c6de4f114f84..9bd7b96027c12 100644 --- a/net/xdp/xdp_umem.c +++ b/net/xdp/xdp_umem.c @@ -368,7 +368,7 @@ static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr) umem->pages = kcalloc(umem->npgs, sizeof(*umem->pages), GFP_KERNEL); if (!umem->pages) { err = -ENOMEM; - goto out_account; + goto out_pin; } for (i = 0; i < umem->npgs; i++) @@ -376,6 +376,8 @@ static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr) return 0; +out_pin: + xdp_umem_unpin_pages(umem); out_account: xdp_umem_unaccount_pages(umem); return err; -- 2.20.1