From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7244936C0CA; Mon, 11 May 2026 11:22:52 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778498572; cv=none; b=g7/bR9Smz6VS3r76eqU0PgqttDMMhMJsE8y0LVaGQfcb9sqnj8n5gahTMhKC2pDRpobiy4Ru9nm0FfQabaYwTaH0afQFEFj7MuEE6nmJFewngsn/kcAZPPFzpK2QjhKmaVgxjlYmZc25yT6jW4x+EDp0wFJddXyn6Px7b15zdhM= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1778498572; c=relaxed/simple; bh=RxfZJRw6aJzCNQbPcviwUWgB2vpWWM/Xo9J9pwSH+LU=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=KWc5EJSI2+I0W0YpfQDbqSxSLYQiqPEinMwcYMwhQBNe0yJvCL0qxFkosY+YURup+BhzRm+6lyb/fIvoLXEuqWMZiboLKTvBBMqo1pPr3tNoGDFw3NiHt9qwiHtGzixXCtqV0EaOUFR1m/fmVygAG8Q/DC1/j9f2uECR6f6Vdtw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Zivdja8q; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Zivdja8q" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 11545C2BCB0; Mon, 11 May 2026 11:22:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1778498572; bh=RxfZJRw6aJzCNQbPcviwUWgB2vpWWM/Xo9J9pwSH+LU=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Zivdja8qG3M1msLSiJnld0U1BwCJ0g0oBpLu8w+gVfpd4qsJt5E4WvPAbLOKJvTvd pKHolMEtgC1KzYKuDhuu1xi9r2xNnZ+37kylH+wGYueTkUvAjga2YMalY1pMyIIA6h UofxCju6Qn6mbfNEGy9/HedjtctG+F6fUGXH6Wf9dLU6FMvYljRKkehu0WZxcf7Tt+ 0xFMVIEUZd0FuRgopXjTgs7upAEivvalQ3hCLYRkYqsYe5G7xnjrzYRvI2rXq5xMEQ wbcoJP8HnFrXTUDRz+Z1QAZYzspO076ljJKIboWC7QdldUWX3wn8jcsIeBUPN7zdgh 81CVCnkNAhZhg== Date: Mon, 11 May 2026 14:22:43 +0300 From: Leon Romanovsky To: Guangshuo Li Cc: Yishai Hadas , Jason Gunthorpe , Roland Dreier , Jack Morgenstein , linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v4] IB/mlx4: Fix refcount leak in add_port() error path Message-ID: <20260511112243.GG15586@unreal> References: <20260428163014.379069-1-lgs201920130244@gmail.com> Precedence: bulk X-Mailing-List: linux-rdma@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20260428163014.379069-1-lgs201920130244@gmail.com> On Wed, Apr 29, 2026 at 12:30:14AM +0800, Guangshuo Li wrote: > After kobject_init_and_add(), the lifetime of the embedded struct > kobject is expected to be managed through the kobject core reference > counting. > > In add_port(), several failure paths after kobject_init_and_add() free > struct mlx4_port directly instead of releasing the embedded kobject with > kobject_put(). This leaves the kobject reference count unbalanced and can > lead to incorrect lifetime handling. AFAIK, you should call to kobject_put() if kobject_init_and_add() fails, but in other case, you should call to kobject_del(). Thanks > > Fix this by routing all failures after kobject_init_and_add() through a > single kobject_put() based error path. Since the release callback may now > be called for partially initialized mlx4_port objects, make > mlx4_port_release() tolerate NULL attribute arrays. > > The issue was identified by a static analysis tool I developed and > confirmed by manual review. > > Fixes: c1e7e466120b ("IB/mlx4: Add iov directory in sysfs under the ib device") > Signed-off-by: Guangshuo Li > --- > v4: > - route all add_port() failures after kobject_init_and_add() through > a single kobject_put() based error path > - remove duplicated attribute array frees from add_port() > - keep mlx4_port_release() tolerant of partially initialized objects > > v3: > - make mlx4_port_release() tolerate NULL attribute arrays > - drop the parent kobject reference on the kobject_init_and_add() > failure path before putting the embedded kobject > > v2: > - note that the issue was identified by my static analysis tool > - and confirmed by manual review > > drivers/infiniband/hw/mlx4/sysfs.c | 44 ++++++++++++++---------------- > 1 file changed, 20 insertions(+), 24 deletions(-) > > diff --git a/drivers/infiniband/hw/mlx4/sysfs.c b/drivers/infiniband/hw/mlx4/sysfs.c > index b8fa4ecfc961..fe505e07849d 100644 > --- a/drivers/infiniband/hw/mlx4/sysfs.c > +++ b/drivers/infiniband/hw/mlx4/sysfs.c > @@ -380,12 +380,17 @@ static void mlx4_port_release(struct kobject *kobj) > struct attribute *a; > int i; > > - for (i = 0; (a = p->pkey_group.attrs[i]); ++i) > - kfree(a); > - kfree(p->pkey_group.attrs); > - for (i = 0; (a = p->gid_group.attrs[i]); ++i) > - kfree(a); > - kfree(p->gid_group.attrs); > + if (p->pkey_group.attrs) { > + for (i = 0; (a = p->pkey_group.attrs[i]); ++i) > + kfree(a); > + kfree(p->pkey_group.attrs); > + } > + > + if (p->gid_group.attrs) { > + for (i = 0; (a = p->gid_group.attrs[i]); ++i) > + kfree(a); > + kfree(p->gid_group.attrs); > + } > kfree(p); > } > > @@ -623,7 +628,6 @@ static void remove_vf_smi_entries(struct mlx4_port *p) > static int add_port(struct mlx4_ib_dev *dev, int port_num, int slave) > { > struct mlx4_port *p; > - int i; > int ret; > int is_eth = rdma_port_get_link_layer(&dev->ib_dev, port_num) == > IB_LINK_LAYER_ETHERNET; > @@ -640,7 +644,7 @@ static int add_port(struct mlx4_ib_dev *dev, int port_num, int slave) > kobject_get(dev->dev_ports_parent[slave]), > "%d", port_num); > if (ret) > - goto err_alloc; > + goto err_put; > > p->pkey_group.name = "pkey_idx"; > p->pkey_group.attrs = > @@ -649,44 +653,36 @@ static int add_port(struct mlx4_ib_dev *dev, int port_num, int slave) > dev->dev->caps.pkey_table_len[port_num]); > if (!p->pkey_group.attrs) { > ret = -ENOMEM; > - goto err_alloc; > + goto err_put; > } > > ret = sysfs_create_group(&p->kobj, &p->pkey_group); > if (ret) > - goto err_free_pkey; > + goto err_put; > > p->gid_group.name = "gid_idx"; > p->gid_group.attrs = alloc_group_attrs(show_port_gid_idx, NULL, 1); > if (!p->gid_group.attrs) { > ret = -ENOMEM; > - goto err_free_pkey; > + goto err_put; > } > > ret = sysfs_create_group(&p->kobj, &p->gid_group); > if (ret) > - goto err_free_gid; > + goto err_put; > > ret = add_vf_smi_entries(p); > if (ret) > - goto err_free_gid; > + goto err_put; > > list_add_tail(&p->kobj.entry, &dev->pkeys.pkey_port_list[slave]); > return 0; > > -err_free_gid: > - kfree(p->gid_group.attrs[0]); > - kfree(p->gid_group.attrs); > - > -err_free_pkey: > - for (i = 0; i < dev->dev->caps.pkey_table_len[port_num]; ++i) > - kfree(p->pkey_group.attrs[i]); > - kfree(p->pkey_group.attrs); > - > -err_alloc: > +err_put: > kobject_put(dev->dev_ports_parent[slave]); > - kfree(p); > + kobject_put(&p->kobj); > return ret; > + > } > > static int register_one_pkey_tree(struct mlx4_ib_dev *dev, int slave) > -- > 2.43.0 > >