]> git.ipfire.org Git - thirdparty/kernel/linux.git/commitdiff
RDMA/cache: Release GID table even if leak is detected
authorLeon Romanovsky <leonro@nvidia.com>
Tue, 28 May 2024 12:52:51 +0000 (15:52 +0300)
committerJason Gunthorpe <jgg@nvidia.com>
Fri, 21 Jun 2024 13:17:44 +0000 (10:17 -0300)
When the table is released, we nullify pointer to GID table, it means
that in case GID entry leak is detected, we will leak table too.

Delete code that prevents table destruction.

Fixes: b150c3862d21 ("IB/core: Introduce GID entry reference counts")
Link: https://lore.kernel.org/r/a62560af06ba82c88ef9194982bfa63d14768ff9.1716900410.git.leon@kernel.org
Signed-off-by: Leon Romanovsky <leon@kernel.org>
drivers/infiniband/core/cache.c

index c02a96d3572a85d816419f628810a5af28b0ba30..6791df64a5fe054a120a3184d4f79c754a789c91 100644 (file)
@@ -794,7 +794,6 @@ err_free_table:
 static void release_gid_table(struct ib_device *device,
                              struct ib_gid_table *table)
 {
-       bool leak = false;
        int i;
 
        if (!table)
@@ -803,15 +802,12 @@ static void release_gid_table(struct ib_device *device,
        for (i = 0; i < table->sz; i++) {
                if (is_gid_entry_free(table->data_vec[i]))
                        continue;
-               if (kref_read(&table->data_vec[i]->kref) > 1) {
-                       dev_err(&device->dev,
-                               "GID entry ref leak for index %d ref=%u\n", i,
-                               kref_read(&table->data_vec[i]->kref));
-                       leak = true;
-               }
+
+               WARN_ONCE(true,
+                         "GID entry ref leak for dev %s index %d ref=%u\n",
+                         dev_name(&device->dev), i,
+                         kref_read(&table->data_vec[i]->kref));
        }
-       if (leak)
-               return;
 
        mutex_destroy(&table->lock);
        kfree(table->data_vec);