diff options
author | Leon Romanovsky <[email protected]> | 2024-05-28 15:52:51 +0300 |
---|---|---|
committer | Jason Gunthorpe <[email protected]> | 2024-06-21 10:17:44 -0300 |
commit | a92fbeac7e94a420b55570c10fe1b90e64da4025 (patch) | |
tree | 1207f156a4cc9847449bb0a52a132c5aa472e88b /lib/test_fortify/write_overflow-strscpy.c | |
parent | b7161db2d96fb23baffb1b3552a1f468fff74e69 (diff) |
RDMA/cache: Release GID table even if leak is detected
When the table is released, we nullify pointer to GID table, it means
that in case GID entry leak is detected, we will leak table too.
Delete code that prevents table destruction.
Fixes: b150c3862d21 ("IB/core: Introduce GID entry reference counts")
Link: https://lore.kernel.org/r/a62560af06ba82c88ef9194982bfa63d14768ff9.1716900410.git.leon@kernel.org
Signed-off-by: Leon Romanovsky <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strscpy.c')
0 files changed, 0 insertions, 0 deletions