Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp8130226ybn; Tue, 1 Oct 2019 03:46:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqywP3PV+7bMFvlU8NSIh+fLYLGnrHtgCXrFTUWtVF+kiQ6N+1MFrOOk0TaP2gbliXx0bZ9C X-Received: by 2002:aa7:c34b:: with SMTP id j11mr24811541edr.245.1569926788109; Tue, 01 Oct 2019 03:46:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569926788; cv=none; d=google.com; s=arc-20160816; b=XWW4Rp70kLhTDbfUehSxnP5jT3R3iEKovElkVSOb0fopN3eqb0OcV4FgRuBg9R1o+5 zyNjNcoZOB7+BXR9q69rdH7eiG69iUwn7iYWDhdpCjg74qR/e2rLZn2bfNU2yQoQc7I2 N/nQRwqJnUYVR+h1sYdTOlBEs6DtnTblGE38m7fDLjQDC7RlaF/9UqNZRvxGDSh0XDpB 3zJ7NV2Yt3+L9QFtvL/AXIiiSQGx5mTL8sJw3W31DxYH4lsPXX/qQRniQYsLChL5YEdT 2cAy7nwIyD1UJouh+Icg1kQMdrEXL9gRhggm6h6sEuhjINdBk5wEreLOrVrcZQnad9os wn9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=8Ku4mp/FdR3Ue30f65MMW5nUmEq5lbGpYDfmNtyqS50=; b=aTfpkIybf1XvRlD2qN96WFUR8tYikC0wl+DcpCZZUkr5jlJANAg/4iKLKJhd8//7FD rAKiPpS+mAtqfad1dqYSICyd8VXeTRby7GTARGrFuGN7ZMcWVNTNy5+lQjXAwywKozeN B85HRIKewK6H6vVvR26zLLc7EsZkfXOrhEwxE5/H3Ahey/cIrUqZJAlQym9XwCW4L9t2 /TxnT0nT6ZFF/00Bu8ViFgGUm19drs19riBcEiMJunz4lk7rFc2ayD8pt+BfkdGjRegx qIg8Lx2TmPznAMgmx0dRZ3uldhMUEsgd10WyRcB0iADSh6hpR2gY6dXmiQYGiQG5BBpl eQnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9si8670374edt.32.2019.10.01.03.46.03; Tue, 01 Oct 2019 03:46:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731128AbfJAKoj convert rfc822-to-8bit (ORCPT + 99 others); Tue, 1 Oct 2019 06:44:39 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:32961 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726885AbfJAKoi (ORCPT ); Tue, 1 Oct 2019 06:44:38 -0400 Received: from pty.hi.pengutronix.de ([2001:67c:670:100:1d::c5]) by metis.ext.pengutronix.de with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1iFFdu-0000tI-3F; Tue, 01 Oct 2019 12:44:30 +0200 Received: from ore by pty.hi.pengutronix.de with local (Exim 4.89) (envelope-from ) id 1iFFds-0008HI-2B; Tue, 01 Oct 2019 12:44:28 +0200 Date: Tue, 1 Oct 2019 12:44:28 +0200 From: Oleksij Rempel To: Colin King Cc: Robin van der Gracht , Oleksij Rempel , Pengutronix Kernel Team , Oliver Hartkopp , Marc Kleine-Budde , "David S . Miller" , linux-can@vger.kernel.org, netdev@vger.kernel.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH][next] can: fix resource leak of skb on error return paths Message-ID: <20191001104428.welkedinv7322tq4@pengutronix.de> References: <20190918101156.24370-1-colin.king@canonical.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8BIT In-Reply-To: <20190918101156.24370-1-colin.king@canonical.com> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-IRC: #ptxdist @freenode X-Accept-Language: de,en X-Accept-Content-Type: text/plain X-Uptime: 12:40:48 up 136 days, 16:58, 90 users, load average: 0.09, 0.06, 0.07 User-Agent: NeoMutt/20170113 (1.7.2) X-SA-Exim-Connect-IP: 2001:67c:670:100:1d::c5 X-SA-Exim-Mail-From: ore@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 18, 2019 at 11:11:56AM +0100, Colin King wrote: > From: Colin Ian King > > Currently the error return paths do not free skb and this results > in a memory leak. Fix this by freeing them before the return. > > Addresses-Coverity: ("Resource leak") > Fixes: 9d71dd0c7009 ("can: add support of SAE J1939 protocol") > Signed-off-by: Colin Ian King Acked-by: Oleksij Rempel > --- > net/can/j1939/socket.c | 8 ++++++-- > 1 file changed, 6 insertions(+), 2 deletions(-) > > diff --git a/net/can/j1939/socket.c b/net/can/j1939/socket.c > index 37c1040bcb9c..5c6eabcb5df1 100644 > --- a/net/can/j1939/socket.c > +++ b/net/can/j1939/socket.c > @@ -909,8 +909,10 @@ void j1939_sk_errqueue(struct j1939_session *session, > memset(serr, 0, sizeof(*serr)); > switch (type) { > case J1939_ERRQUEUE_ACK: > - if (!(sk->sk_tsflags & SOF_TIMESTAMPING_TX_ACK)) > + if (!(sk->sk_tsflags & SOF_TIMESTAMPING_TX_ACK)) { > + kfree_skb(skb); > return; > + } > > serr->ee.ee_errno = ENOMSG; > serr->ee.ee_origin = SO_EE_ORIGIN_TIMESTAMPING; > @@ -918,8 +920,10 @@ void j1939_sk_errqueue(struct j1939_session *session, > state = "ACK"; > break; > case J1939_ERRQUEUE_SCHED: > - if (!(sk->sk_tsflags & SOF_TIMESTAMPING_TX_SCHED)) > + if (!(sk->sk_tsflags & SOF_TIMESTAMPING_TX_SCHED)) { > + kfree_skb(skb); > return; > + } > > serr->ee.ee_errno = ENOMSG; > serr->ee.ee_origin = SO_EE_ORIGIN_TIMESTAMPING; > -- > 2.20.1 > > -- Pengutronix e.K. | | Industrial Linux Solutions | http://www.pengutronix.de/ | Peiner Str. 6-8, 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |