Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3759812pxv; Mon, 19 Jul 2021 08:07:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyBBJgUAhd+yvHdyPsJQmCT8T6Z7+hYFojjG29odIQGmX+JhAGWFnhgEzR2QLmjDhAfmC02 X-Received: by 2002:a92:d3d1:: with SMTP id c17mr16705789ilh.86.1626707270712; Mon, 19 Jul 2021 08:07:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626707270; cv=none; d=google.com; s=arc-20160816; b=Hz5+yRFWIR/wPutSFRF/ynejxdkhXRun3zRX6IYx6eTm9Adou9Z6WvHY31S2h1D4+1 4oCPogGJzOfZv3JabuTHvgjv8Ov4awEgjARdlrHfq0i1YtkftFeSiWVrkvl19eephnn/ dK6edMD/WBXgCjwNDrRObjRm3saHndaNkMlIVFiRXb9dtVTgEb7Ec+ffkIpbdpwOe+28 R9chgbWgAeaWxpY74nPMyyd2RjdQO9NQ+JMwqwWnE9gA836keURSiTr9x0qhZtaigzz7 sjw3t9MfoSGuDx5ctOCDkL+R+hbmbGo/KFQjeg5uTJU9n1wcKrZCAdeiPJmPew3A0eBI 9lsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Hit8MsJjeIDx5IevMNXNqRj6Hi3nC9SM3gZ7RsWRPg8=; b=Comp639QlI+wcxG0FLsks2ZJluxbcv3obJUsqW1AztLFTLa8mMyIDST4HxSvVB3DJA IlP1z00jUTcShwMscGSceIdMijJeNAr/GhliazTPLublaLZ1U59H59qlw92xuPKZCrSu /+Yq8JvdHHAtH0WJWrd8/sOncinJ3azxi7kvog5h6/bAXmPw9dVmXeNU8fZSn0um0/ep z74k3AVkJ+S+9ZCBsLnQiCEfIqjh3ZUsaQcC3wYlzkU1UmmP43EiHnkREO1dw4yLm3np 5bHV4PmnVH2PD5LjGUwNDHwWbpjiReBlwwX9M8wI62hDOQ0oX84lz5P3ezGzwEJ4hsU5 krFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=yyQtqqV4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 187si20168022iow.86.2021.07.19.08.07.36; Mon, 19 Jul 2021 08:07:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=yyQtqqV4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243416AbhGSOXy (ORCPT + 99 others); Mon, 19 Jul 2021 10:23:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:58284 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242987AbhGSOVe (ORCPT ); Mon, 19 Jul 2021 10:21:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 03314611EF; Mon, 19 Jul 2021 15:02:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626706922; bh=LN1AtvVyV5WbCWvPHZo2WiTaP2uHUMqCLCm0xSGamBs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yyQtqqV4WcVV3ito8kye0f/18bq6S/Gx5V1uRdJoqXnjqWiuDMffjQ7sNgqvptHnO wszVkI7KLuuIoNAe5CaTnp1VMClT8wzzXI8FjjUjSdekv95uEvAP43RnGHAwoHGzvT BF4g8GOHMxmnGbOyY+y/IqN5H1SumsZ6ykKJS7tA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Gerd Rausch , Jason Gunthorpe , Sasha Levin Subject: [PATCH 4.4 118/188] RDMA/cma: Fix rdma_resolve_route() memory leak Date: Mon, 19 Jul 2021 16:51:42 +0200 Message-Id: <20210719144940.248062364@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144913.076563739@linuxfoundation.org> References: <20210719144913.076563739@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gerd Rausch [ Upstream commit 74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 ] Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again. Link: https://lore.kernel.org/r/f6662b7b-bdb7-2706-1e12-47c61d3474b6@oracle.com Signed-off-by: Gerd Rausch Signed-off-by: Jason Gunthorpe Signed-off-by: Sasha Levin --- drivers/infiniband/core/cma.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/infiniband/core/cma.c b/drivers/infiniband/core/cma.c index b59a4a819aaa..b5e7bd23857e 100644 --- a/drivers/infiniband/core/cma.c +++ b/drivers/infiniband/core/cma.c @@ -2227,7 +2227,8 @@ static int cma_resolve_ib_route(struct rdma_id_private *id_priv, int timeout_ms) work->new_state = RDMA_CM_ROUTE_RESOLVED; work->event.event = RDMA_CM_EVENT_ROUTE_RESOLVED; - route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL); + if (!route->path_rec) + route->path_rec = kmalloc(sizeof *route->path_rec, GFP_KERNEL); if (!route->path_rec) { ret = -ENOMEM; goto err1; -- 2.30.2