Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp10987ybt; Tue, 23 Jun 2020 13:57:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzBD6S1F446Px1tEJoGOniSQuA6jwjYiXq0ZQIgRCnIAloQaOvVH9f1vRkHc/Y3T2S5nD6Y X-Received: by 2002:a50:e387:: with SMTP id b7mr22968305edm.190.1592945847557; Tue, 23 Jun 2020 13:57:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592945847; cv=none; d=google.com; s=arc-20160816; b=ZeKRarRsEdNFL40ZGsr30F0Eyt3V7EdZe+wjf47hdG+gOK4tW5kEthf5h3cAvcCGa9 bWI5YRteQFciF0vcY+AglrxDL40ApwzM1PpGfb8R19VDqzW2yWRn7P4MXhSYu3V94Au9 3NRGhYsFy6p/wXUU8EZWjq0UdaCm4dkXj9/CMYjeF/zuO7M9E2Sy6moaTRroYUmmOo0A NiuoTwBCX2J9gpFF3xc84DODapPp2iwJFiFx0Gu7W5pz1M9x2vqIhEOFAaH6bZQkal8T dtOVKq/I8/y2jJflAkUFS2GsMaBTJ9yuus5FvidH6EPfJRw5xiHz81hOd2kZlgthRzaV 2LRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Lkddsj4adqVeBEdBuUCqOe+ZjEMA4OxxLXj7dQ7BmJE=; b=N4ftwX3DSgDHCkxyiI3iUqs5Pg43iHv7Wh3T2xcrd+FHtVWJ10d9A9BLZSU2yADcKX s1v8UFIBVlEDjca5f7YJjsI6sOKf49+4G9R4ufKkx3/Va6JVbKoKbg5C4p4SvTiQYGJL 63hvp9+Rxgzm1divCnmnZA2RtJcrqvBXQFRUr0OClQyjE4NaIoZ+MaMefKc/XYET/E/Z 4yLJ8LItB5iKIEgFfPWemkCADvlsIMmALFoJ2Vqadf+BfjIMeh6mPHCFwY7nx3gcjisB GwwlSlVpWTG0PNgZxUht+sOslWyPBFuS/ntFwSfxgkrmmBIHnVyD+J9KL6QMnnaPXX2G TKOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ABByXPlX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z13si3240361edr.106.2020.06.23.13.57.04; Tue, 23 Jun 2020 13:57:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ABByXPlX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392106AbgFWUoT (ORCPT + 99 others); Tue, 23 Jun 2020 16:44:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:41388 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403984AbgFWUoR (ORCPT ); Tue, 23 Jun 2020 16:44:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 03E48218AC; Tue, 23 Jun 2020 20:44:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592945057; bh=/FvxPPIPe+dQTXQL6FxQuEEeAiwkRfiSX57QfrrFAq4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ABByXPlXZMHARrcyp1tq7Nj0bjRti3nwy7cbiy8Y1otR20y7hh2AjuNoysnq82kT2 3OfxfmwuYljXC3o5NxsGvj0kdZPgu5YMnQ0fKXoU5A/zTzTi5cvTiXfFjfbmkWdiEs YTxhdhmWOw7d0xMJ2N4GUuNTeV4rJKcap5IlCqUI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Qian Cai , Alex Williamson , Sasha Levin Subject: [PATCH 4.14 022/136] vfio/pci: fix memory leaks in alloc_perm_bits() Date: Tue, 23 Jun 2020 21:57:58 +0200 Message-Id: <20200623195304.747247165@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200623195303.601828702@linuxfoundation.org> References: <20200623195303.601828702@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Qian Cai [ Upstream commit 3e63b94b6274324ff2e7d8615df31586de827c4e ] vfio_pci_disable() calls vfio_config_free() but forgets to call free_perm_bits() resulting in memory leaks, unreferenced object 0xc000000c4db2dee0 (size 16): comm "qemu-kvm", pid 4305, jiffies 4295020272 (age 3463.780s) hex dump (first 16 bytes): 00 00 ff 00 ff ff ff ff ff ff ff ff ff ff 00 00 ................ backtrace: [<00000000a6a4552d>] alloc_perm_bits+0x58/0xe0 [vfio_pci] [<00000000ac990549>] vfio_config_init+0xdf0/0x11b0 [vfio_pci] init_pci_cap_msi_perm at drivers/vfio/pci/vfio_pci_config.c:1125 (inlined by) vfio_msi_cap_len at drivers/vfio/pci/vfio_pci_config.c:1180 (inlined by) vfio_cap_len at drivers/vfio/pci/vfio_pci_config.c:1241 (inlined by) vfio_cap_init at drivers/vfio/pci/vfio_pci_config.c:1468 (inlined by) vfio_config_init at drivers/vfio/pci/vfio_pci_config.c:1707 [<000000006db873a1>] vfio_pci_open+0x234/0x700 [vfio_pci] [<00000000630e1906>] vfio_group_fops_unl_ioctl+0x8e0/0xb84 [vfio] [<000000009e34c54f>] ksys_ioctl+0xd8/0x130 [<000000006577923d>] sys_ioctl+0x28/0x40 [<000000006d7b1cf2>] system_call_exception+0x114/0x1e0 [<0000000008ea7dd5>] system_call_common+0xf0/0x278 unreferenced object 0xc000000c4db2e330 (size 16): comm "qemu-kvm", pid 4305, jiffies 4295020272 (age 3463.780s) hex dump (first 16 bytes): 00 ff ff 00 ff ff ff ff ff ff ff ff ff ff 00 00 ................ backtrace: [<000000004c71914f>] alloc_perm_bits+0x44/0xe0 [vfio_pci] [<00000000ac990549>] vfio_config_init+0xdf0/0x11b0 [vfio_pci] [<000000006db873a1>] vfio_pci_open+0x234/0x700 [vfio_pci] [<00000000630e1906>] vfio_group_fops_unl_ioctl+0x8e0/0xb84 [vfio] [<000000009e34c54f>] ksys_ioctl+0xd8/0x130 [<000000006577923d>] sys_ioctl+0x28/0x40 [<000000006d7b1cf2>] system_call_exception+0x114/0x1e0 [<0000000008ea7dd5>] system_call_common+0xf0/0x278 Fixes: 89e1f7d4c66d ("vfio: Add PCI device driver") Signed-off-by: Qian Cai [aw: rolled in follow-up patch] Signed-off-by: Alex Williamson Signed-off-by: Sasha Levin --- drivers/vfio/pci/vfio_pci_config.c | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/drivers/vfio/pci/vfio_pci_config.c b/drivers/vfio/pci/vfio_pci_config.c index 423ea1f98441a..c2d300bc37f64 100644 --- a/drivers/vfio/pci/vfio_pci_config.c +++ b/drivers/vfio/pci/vfio_pci_config.c @@ -1732,8 +1732,11 @@ void vfio_config_free(struct vfio_pci_device *vdev) vdev->vconfig = NULL; kfree(vdev->pci_config_map); vdev->pci_config_map = NULL; - kfree(vdev->msi_perm); - vdev->msi_perm = NULL; + if (vdev->msi_perm) { + free_perm_bits(vdev->msi_perm); + kfree(vdev->msi_perm); + vdev->msi_perm = NULL; + } } /* -- 2.25.1