Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp3390140ybp; Sun, 6 Oct 2019 10:53:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqxlNicu2SsMi17T2ZNp4sdLJK1Oo65RxVqYReWIALQB6s26Z3lebd1io3ZGRpl8x3rleUa6 X-Received: by 2002:a17:906:4b41:: with SMTP id j1mr20304566ejv.162.1570384380377; Sun, 06 Oct 2019 10:53:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570384380; cv=none; d=google.com; s=arc-20160816; b=HVRRjQkgZ/vfmhukxR2mHiAmE98UDyEhtj9yw4CmGOqXO/yvOL9wMjKPhqJqDYth4w /Lj77n/PvqLXRsXN/uqYtjy3MK1NjZ2vCOorrmak36/nBQuSFlk7rl3UxRIFRSktSZSx PgTJ4L1TsSV33GGE7QWRDbtCXDbCR+OONHJOdCsVfbynh3D65o85xHEJ/sAnmRST1n9m xdtMSQu+7eSpQ5mvZbTf0Un5fUwuMslq38cOSf8Qv0lKvK1nYYhxVqPa/TldaFtj8m6G Gu9MYory5epWjI9Ybwq6ChGp1qCZwXS9pWixhPBr+e7103wpoHpUZgj5CWStPb+oUFTG Y9Ew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PM1GGlAr2ARxorABpG2mpbZdeXAvMXgBT10qgrW0kTU=; b=DdNAAD1mT6J5hs9/Hx2B7H7wBVbb9LHNV4ZRDNm2xqmPaRWIUkLshJspvK8FupEzjF F0FTZZKQVjSyeUWo0FQdjtIsVUp/x07O41NAFZrdm+/MICSAFHcXkEcNyevcvldN4KlW 2n+/QwIMq3tbwX4iZDaeKwGG0wShxUZ9G4siV7FUukVPbmCSfe6IscA7EsEU/ctBLEos CP1uM4ROnGd0ADLuin9Om+9NPJGJOKWUPzkPhTRb8LlS7WAGYHf4Lu8MFqmI74SuKoFD jtDmXqMlG7zupOm2WPMQtouhnOyfn9YHE1GveIAjX1nMxy9ddIljAbovZvizZvHvjBu+ Ld2w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X+aJoZRV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ch26si5699907ejb.190.2019.10.06.10.52.36; Sun, 06 Oct 2019 10:53:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X+aJoZRV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729682AbfJFRvx (ORCPT + 99 others); Sun, 6 Oct 2019 13:51:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:48966 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727404AbfJFRuy (ORCPT ); Sun, 6 Oct 2019 13:50:54 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1679F217D6; Sun, 6 Oct 2019 17:45:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570383930; bh=lzf4NezQwvnIwgsemkILbMCirg6UhvXpkxXQMME+7bw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X+aJoZRVO3+RSEVR5ctnR1YEHOAR8TIjDiUAKDpm5VNJORtP1bgYrw6u93qEfpAia zot0onS2x4gO4S0HpbaR8zua7z0w/7bBaFf8JkobWFad9akw0mo1aJ03DmGoom48+c bQKSz91aGx129HqoqssSlBB5SdVK8uB8OboaGaDk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dotan Barak , Sudhakar Dindukurti , Santosh Shilimkar , "David S. Miller" Subject: [PATCH 5.3 148/166] net/rds: Fix error handling in rds_ib_add_one() Date: Sun, 6 Oct 2019 19:21:54 +0200 Message-Id: <20191006171225.380309300@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191006171212.850660298@linuxfoundation.org> References: <20191006171212.850660298@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dotan Barak [ Upstream commit d64bf89a75b65f83f06be9fb8f978e60d53752db ] rds_ibdev:ipaddr_list and rds_ibdev:conn_list are initialized after allocation some resources such as protection domain. If allocation of such resources fail, then these uninitialized variables are accessed in rds_ib_dev_free() in failure path. This can potentially crash the system. The code has been updated to initialize these variables very early in the function. Signed-off-by: Dotan Barak Signed-off-by: Sudhakar Dindukurti Acked-by: Santosh Shilimkar Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/rds/ib.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) --- a/net/rds/ib.c +++ b/net/rds/ib.c @@ -143,6 +143,9 @@ static void rds_ib_add_one(struct ib_dev refcount_set(&rds_ibdev->refcount, 1); INIT_WORK(&rds_ibdev->free_work, rds_ib_dev_free); + INIT_LIST_HEAD(&rds_ibdev->ipaddr_list); + INIT_LIST_HEAD(&rds_ibdev->conn_list); + rds_ibdev->max_wrs = device->attrs.max_qp_wr; rds_ibdev->max_sge = min(device->attrs.max_send_sge, RDS_IB_MAX_SGE); @@ -203,9 +206,6 @@ static void rds_ib_add_one(struct ib_dev device->name, rds_ibdev->use_fastreg ? "FRMR" : "FMR"); - INIT_LIST_HEAD(&rds_ibdev->ipaddr_list); - INIT_LIST_HEAD(&rds_ibdev->conn_list); - down_write(&rds_ib_devices_lock); list_add_tail_rcu(&rds_ibdev->list, &rds_ib_devices); up_write(&rds_ib_devices_lock);