Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp67591ybp; Thu, 3 Oct 2019 10:15:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqz7cyrui14GcQr0bWe0NXK0nte5AHMcSLQyqHQMTROy+s+wkKWUGnW7AkFfnHJtbRROF3cY X-Received: by 2002:a17:907:215a:: with SMTP id rk26mr8566068ejb.49.1570122949863; Thu, 03 Oct 2019 10:15:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570122949; cv=none; d=google.com; s=arc-20160816; b=mWM0foJV23KkXCEJKHpmDl0vPxe7qHbBmZx6BpM79ZG3UR920JBMuwou8/MGfMc9zW 9cmpxUlTbptwZk7oPefq1uI33QIr3jXOT7J+a8Q7GKSvqUpTTD+/5V1wuy8zETB3SnE5 bSF/I3fA2qO03BuYrm/Wc32/fgsEYJUHCMGz3KrZjW2miqXxRuhZCNIRRttoYYAhxBgU amc32uyrT42zs/auBsf4vss8K0Iau9YrryPhTpjNe61YVteFg4SncCX9yTLJYsgjzxDA wZF7vKj1iyVwL6WdE40z0PMitKOhTAWYi3AIij4old58CXH/wU1Au8C4dK2ID062DAou VtlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KmgZHpakfAZrO7DLipt5Pm+J5gp/iu9vvLYntiZuCeE=; b=OP9szIy5uAXn+EPf+GaHY1RdOHCeqqnyh/5hMn9xm7V5gZk687R/EN8S2Iw+XXJklR Kr0K8S/KZANQmVB+h2uKG697Nu8iL46u+OR1kZziVdeh1EJ3S+ezImv+bGm3uCXxoYJ2 of0+9dPTAXiJHWqvOn3XNNXyxjPfwHzVWJOiFu978kW6QmO5giB3ygqxESR0B1KSYGbp OjfT07PRx1vJVPtVWDTueMxYCAE5QqzTjSWPCjrL6Ee0Xa88EBpbMBD3RYOKbi0YajBc +1Hze94VNOvmMXeWsyljkM3H5sGTupPx12b71xUrUhMQfrlhOqHfu1GGnitmjpohAl0y eOQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=heM1vrjF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t14si1621518ejx.372.2019.10.03.10.15.24; Thu, 03 Oct 2019 10:15:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=heM1vrjF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390273AbfJCRN6 (ORCPT + 99 others); Thu, 3 Oct 2019 13:13:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:60250 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391321AbfJCQ16 (ORCPT ); Thu, 3 Oct 2019 12:27:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 603D921783; Thu, 3 Oct 2019 16:27:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570120076; bh=e6HrPHm9mHRsCTtvzt4/Np6paexRy6vP8uDN+UsN+Qk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=heM1vrjFLl5r+0XolW/cQV6RNqFAip9nYs+TQfEpeyN2FtM1jwgOR0SHyltd4UpEq NrCOkKXvYCsPJmNvmsUvrjMFM3et0LOpGCHXiwBtU82/S1GmI1V1SvTvGB+QT4M1Wn fb+NpdNKUpVlbUkCtr+evbk7JPVQIleEJD1R1I0w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, zhengbin , Jens Axboe , Sasha Levin Subject: [PATCH 5.2 089/313] blk-mq: Fix memory leak in blk_mq_init_allocated_queue error handling Date: Thu, 3 Oct 2019 17:51:07 +0200 Message-Id: <20191003154541.637813090@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154533.590915454@linuxfoundation.org> References: <20191003154533.590915454@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: zhengbin [ Upstream commit 73d9c8d4c0017e21e1ff519474ceb1450484dc9a ] If blk_mq_init_allocated_queue->elevator_init_mq fails, need to release the previously requested resources. Fixes: d34849913819 ("blk-mq-sched: allow setting of default IO scheduler") Signed-off-by: zhengbin Signed-off-by: Jens Axboe Signed-off-by: Sasha Levin --- block/blk-mq.c | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/block/blk-mq.c b/block/blk-mq.c index 68106a41f90d2..f934e8afe5b43 100644 --- a/block/blk-mq.c +++ b/block/blk-mq.c @@ -2853,6 +2853,8 @@ static unsigned int nr_hw_queues(struct blk_mq_tag_set *set) struct request_queue *blk_mq_init_allocated_queue(struct blk_mq_tag_set *set, struct request_queue *q) { + int ret = -ENOMEM; + /* mark the queue as mq asap */ q->mq_ops = set->ops; @@ -2914,17 +2916,18 @@ struct request_queue *blk_mq_init_allocated_queue(struct blk_mq_tag_set *set, blk_mq_map_swqueue(q); if (!(set->flags & BLK_MQ_F_NO_SCHED)) { - int ret; - ret = elevator_init_mq(q); if (ret) - return ERR_PTR(ret); + goto err_tag_set; } return q; +err_tag_set: + blk_mq_del_queue_tag_set(q); err_hctxs: kfree(q->queue_hw_ctx); + q->nr_hw_queues = 0; err_sys_init: blk_mq_sysfs_deinit(q); err_poll: -- 2.20.1