Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp621056pxv; Thu, 15 Jul 2021 11:45:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+4HevnTYWidthonSmtD/GkNVrFXUb/bJ+fSyZTYO5NzXAhTkJxSFLxFPeFfQ4vL2RTqtc X-Received: by 2002:a05:6602:38d:: with SMTP id f13mr2403223iov.153.1626374701689; Thu, 15 Jul 2021 11:45:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626374701; cv=none; d=google.com; s=arc-20160816; b=mVMm90JIA9dB91Ef00IsoU4Sg4/Be6k2qsa3/9zjph8d6iHnZK42+7uCiCver+LHuh 03GQbQ9/9q1E2b33LSO+rPX7YiV+DR1IijwIoksgm+ToiJrKlU5WVaIeTFrkLeEdR0z7 h0+WsiHbyHVpNv51CSiCs9Wa61ZG/6QCbvsXAcqBxwp9pPIHj5KTVQuAP40GsD04EfYK N+DwkBiD4hqCkd8K3D0zuJwwgD2/dlJGubx7NmoWXfGhiy6f4YamtNjZVVv9jyriuL6H 6mDOZYUopqin68samlZ8oHV9plX5+HcZh6WbCgwfFSDoP9WQR/HBXc52PPSq0DJvkgjz pVMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=El7A0tX+HiSrK9YikH20KsTl3+ZAxppNrU616YXoKX4=; b=h9hKJMTtj5R6NxnxF6NaOlz+uGRaxcsf7YqikseYPGoepM5DLANa42axtKKhCjOLJH ZYRe+uT3VES94L+jZqGXWOb7mpmdUgCUyCekVB4JLWo7TS4v8+ClXGppPmQdzKrgzez7 D/Cj06GQRXnaGA2ui5/kT4R+ZzS/fBW11ej6avXQ8xMcjjXFf6SdzBYCFSfH0TYQemmm 4Ct23xBy3qQ5YN0ovYfmv0fUzboOoiQ2JXMkEIRGGkF62q7v/oFwALMjjrN0l0GzZTyI z6Gj9iPntqlf8osDUKNRVHvWwRhNdEdZzhRvccLn+zUOQTiW8wCaN+DgKemkUIWmW+hk Cyng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hfcerTPB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si7370304ilq.82.2021.07.15.11.44.48; Thu, 15 Jul 2021 11:45:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=hfcerTPB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238291AbhGOSqs (ORCPT + 99 others); Thu, 15 Jul 2021 14:46:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:47128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237813AbhGOSqF (ORCPT ); Thu, 15 Jul 2021 14:46:05 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 351F361396; Thu, 15 Jul 2021 18:43:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626374591; bh=eSSeVjX4tABcygdynp3aCwh5KTzk60SBxkDdrdVEiRs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hfcerTPBFtJEC3Q2ad4SgkmJprSGcLAe0euEjS1i36hgAWEnZHEnqkkm/ADzvZOiv DIwIBetHqtmV4JQFtIWQ43J7Z7CY94pF/7tzGZJ6nAzi4YY8v0/Uky4V2HFytoHs++ zyBA/cPLn7+kmwJX4DT9ulN+RJEe4vOzCBTmbFzA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gerd Rausch , Jason Gunthorpe , Sasha Levin Subject: [PATCH 5.4 063/122] RDMA/cma: Fix rdma_resolve_route() memory leak Date: Thu, 15 Jul 2021 20:38:30 +0200 Message-Id: <20210715182506.276275401@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210715182448.393443551@linuxfoundation.org> References: <20210715182448.393443551@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gerd Rausch [ Upstream commit 74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 ] Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again. Link: https://lore.kernel.org/r/f6662b7b-bdb7-2706-1e12-47c61d3474b6@oracle.com Signed-off-by: Gerd Rausch Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/core/cma.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c index 92428990f0cc..ec9e9598894f 100644 --- a/drivers/infiniband/core/cma.c +++ b/drivers/infiniband/core/cma.c @@ -2719,7 +2719,8 @@ static int cma_resolve_ib_route(struct rdma_id_private *id_priv, cma_init_resolve_route_work(work, id_priv); - route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL); + if (!route->path_rec) + route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL); if (!route->path_rec) { ret = -ENOMEM; goto err1; -- 2.30.2