Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3371009ybp; Sun, 6 Oct 2019 10:27:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqzGYL03atfaIGm1XdFijq+bMnBnH2Yo6Hr56bkL7wn++78mz1Yv87hP8pBTaDrjcug5NmyJ X-Received: by 2002:a05:6402:120e:: with SMTP id c14mr25379404edw.272.1570382875736; Sun, 06 Oct 2019 10:27:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570382875; cv=none; d=google.com; s=arc-20160816; b=CCcM25d14JscQTHy0RkAx3HV8FmwoVPfs/2X3NP/VW8Bd2McZrfaHtSsk/iTa4E5Ae L9tQTjq2auONkuwWJdvudTKKNlQV6pKf0noUVIvpaDauQXs6eW7J9067C8eyM+dBalhL 7z2hnfhKDegWmqiJgw8xSe0/mNX54+EJWCFUG2SXp/1XM2RnXF8P54d8AFQyWMfwJ5gM jHvWDQd5Nq3ohEO35jgj7CF/nKI/vhH4WsMW9hhcUh5YQF7c9eLqfLuJiWElNB/RdZum 3IA/17qr4u/Z74v4DO1lV8Vz2Zrm2X9/KAd7jM6X26iZv7v0aalCPjiTLzPXb74GnmOX 6pgg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WlpGSSXoMh/YVVWEbGUWmeem8ltHZrbYdf6J29D+lh4=; b=RsKe8iLfme5JrJkUQBdS/Z65PqLaNiJ5wUyCEzj2x9n0pCWe8Ui2bpqjRo9p2vodg8 Zzo9on9br4ZXLtSpLqA7c+Ro6dV0Z0crODwmhhmX36K0mS1lyJP8zMw0WhHmr88jPoSo q3Bh+hOPrMkDXgTpxPZgXEFaJu7WW6zIEdK4HQzt+pRjvo+1ABrSLKNEht/r43LvgY8k nxuzsnuLMRMUSMfPxndk4M4ageyuT7AwUIPPwDL1+EhIoEpwTUEB+JePMjS8pA9pt7OM qohf+BcQ7p4ZUF5SXaOB0WgpvNWDULZztOkzVs0t3LE+EUBg4MWEKb4ceee04AfCH9MC nUiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mMie1lrS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 90si8452613edj.72.2019.10.06.10.27.32; Sun, 06 Oct 2019 10:27:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mMie1lrS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727984AbfJFRYt (ORCPT + 99 others); Sun, 6 Oct 2019 13:24:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:49744 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727446AbfJFRYr (ORCPT ); Sun, 6 Oct 2019 13:24:47 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 087BA2133F; Sun, 6 Oct 2019 17:24:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570382686; bh=ezbkdOij8H/eXqwrs3/HxM1hHXVRSR/KKB0D+kPZAuM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mMie1lrS3+2nnqkjGFsaCq1maPEfpIbYr0gHDPZmPqhME32iu7M0ZE8cnTNinl6U4 Qkn6S3y7Obxg8tA4WDawTb4QwvHwtPyuyW9eDhxs76M/aO3KfLLnsP2PFQR4DjMnAW b1dYoXNiH5kMgC4b43MEabz42HgK2X87PbUrWshg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dotan Barak , Sudhakar Dindukurti , Santosh Shilimkar , "David S. Miller" Subject: [PATCH 4.9 41/47] net/rds: Fix error handling in rds_ib_add_one() Date: Sun, 6 Oct 2019 19:21:28 +0200 Message-Id: <20191006172019.053341501@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006172016.873463083@linuxfoundation.org> References: <20191006172016.873463083@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dotan Barak [ Upstream commit d64bf89a75b65f83f06be9fb8f978e60d53752db ] rds_ibdev:ipaddr_list and rds_ibdev:conn_list are initialized after allocation some resources such as protection domain. If allocation of such resources fail, then these uninitialized variables are accessed in rds_ib_dev_free() in failure path. This can potentially crash the system. The code has been updated to initialize these variables very early in the function. Signed-off-by: Dotan Barak Signed-off-by: Sudhakar Dindukurti Acked-by: Santosh Shilimkar Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/rds/ib.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/net/rds/ib.c +++ b/net/rds/ib.c @@ -138,6 +138,9 @@ static void rds_ib_add_one(struct ib_dev atomic_set(&rds_ibdev->refcount, 1); INIT_WORK(&rds_ibdev->free_work, rds_ib_dev_free); + INIT_LIST_HEAD(&rds_ibdev->ipaddr_list); + INIT_LIST_HEAD(&rds_ibdev->conn_list); + rds_ibdev->max_wrs = device->attrs.max_qp_wr; rds_ibdev->max_sge = min(device->attrs.max_sge, RDS_IB_MAX_SGE); @@ -189,9 +192,6 @@ static void rds_ib_add_one(struct ib_dev device->name, rds_ibdev->use_fastreg ? "FRMR" : "FMR"); - INIT_LIST_HEAD(&rds_ibdev->ipaddr_list); - INIT_LIST_HEAD(&rds_ibdev->conn_list); - down_write(&rds_ib_devices_lock); list_add_tail_rcu(&rds_ibdev->list, &rds_ib_devices); up_write(&rds_ib_devices_lock);