Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp2239835ybd; Mon, 24 Jun 2019 03:07:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOzuHoXo4LPyHg4pVH+6jDW+newB1NaQqVQJnexFCBH3VwbQ13zfkmC8/O3bpkFY7dnReK X-Received: by 2002:a63:2a8d:: with SMTP id q135mr31939559pgq.46.1561370869531; Mon, 24 Jun 2019 03:07:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561370869; cv=none; d=google.com; s=arc-20160816; b=bL9646K7mf1/aH29N/9tOhWWXI6UMeoDBrSj2Xix03nbHEw5Up+c2So514ea3x1xcG VIcZfHOuYZ9PWUxtt+kQ4+0VenDAVROLqTqSssKlwslX+PsHBPgCAjHxMSMoyHbVL+75 gqR+EpsIdxuPd2qkfZ0synEafbYY1ldnK9X2iy8mcTzoZgz1UY1+IXnhSpCFHosMTCU+ +AF+4Sun+GNi1NAwVkEyAO9eqMv+lqdp3bll7M1Hzcuc9/7lO7Xuy0TBzD6b1dcE9L5s 8uRSHZxTrN5TJTJ1Rbk+Yw1DfzuVyAErBpKnd9xQR+Zw13WlFhHwWDWrTEPpsz0Iag37 0XrA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0yaEfBT2I69ctGzIbgy4wOwsUJ/gQ4zc7NeVWNQhBCE=; b=0GIdjsZU+AXmvNFgjBYMi5Fri2xfhnVjyQig2pgaIv5yXzu3FB+h8TPKmm53OlPBmL sAveXM2dd1/62WL9nmogsiizeNETGd+Ac9Ck/L1TO8GrjyLC4u3cpd0heApEeAxrohNC maQJtpi2DGU0pudsvwpRyqordUahnXJjs62FoFDGYBDC5gSNOlaJO+0bamm3YuluFZBc HOmJBGzM2z7fZujqM19jI2UtKGwGdF6TieZgIqzTHVx0EHmHdeOpoBt+NeS9oFZCeWj2 kXrgydRwQUhZmJFKf65Rnlt4QuS433a9gk+zcBc05WkiP9rsCl1RTvUlDlwBafnkU2gx kcmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I+pFKUVU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i8si10933227pfk.189.2019.06.24.03.07.34; Mon, 24 Jun 2019 03:07:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=I+pFKUVU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730167AbfFXKGm (ORCPT + 99 others); Mon, 24 Jun 2019 06:06:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:38944 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730147AbfFXKGj (ORCPT ); Mon, 24 Jun 2019 06:06:39 -0400 Received: from localhost (f4.8f.5177.ip4.static.sl-reverse.com [119.81.143.244]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C586D2146F; Mon, 24 Jun 2019 10:06:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1561370798; bh=0UShVwJkVQmYqGoIXL46mVMoloO+EmCe9/+uzLfXZDQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=I+pFKUVUhjalcZf9uOgEnfvuel87nqipVCmoLCabxcRss6wjG3OfiDs1IGR7Z0T3Y 61iF1r+OWwjq8GirpVw9x6pPvCWE2yMqLOtdNWnD1tgnAHCQRCtzcAabv5I/ovFEzk hja69o+o+PWloIZtgAK4dFOlWUvzK43Rhkr7aj0w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andy Strohman , Johannes Berg Subject: [PATCH 4.19 88/90] nl80211: fix station_info pertid memory leak Date: Mon, 24 Jun 2019 17:57:18 +0800 Message-Id: <20190624092319.649008473@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190624092313.788773607@linuxfoundation.org> References: <20190624092313.788773607@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Strohman commit f77bf4863dc2218362f4227d56af4a5f3f08830c upstream. When dumping stations, memory allocated for station_info's pertid member will leak if the nl80211 header cannot be added to the sk_buff due to insufficient tail room. I noticed this leak in the kmalloc-2048 cache. Cc: stable@vger.kernel.org Fixes: 8689c051a201 ("cfg80211: dynamically allocate per-tid stats for station info") Signed-off-by: Andy Strohman Signed-off-by: Johannes Berg Signed-off-by: Greg Kroah-Hartman --- net/wireless/nl80211.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/net/wireless/nl80211.c +++ b/net/wireless/nl80211.c @@ -4611,8 +4611,10 @@ static int nl80211_send_station(struct s struct nlattr *sinfoattr, *bss_param; hdr = nl80211hdr_put(msg, portid, seq, flags, cmd); - if (!hdr) + if (!hdr) { + cfg80211_sinfo_release_content(sinfo); return -1; + } if (nla_put_u32(msg, NL80211_ATTR_IFINDEX, dev->ifindex) || nla_put(msg, NL80211_ATTR_MAC, ETH_ALEN, mac_addr) ||