Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp818333ybl; Wed, 4 Dec 2019 11:22:46 -0800 (PST) X-Google-Smtp-Source: APXvYqy8Z5oadjbikjOVzYagX5xiQ3ygkKCpsd36FycYok5xJOngQFeM42pJTBvsk8rPCAoDmkMR X-Received: by 2002:a9d:53cb:: with SMTP id i11mr3908023oth.158.1575487366022; Wed, 04 Dec 2019 11:22:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575487366; cv=none; d=google.com; s=arc-20160816; b=rdioDN7HYFfe/GT21gCYU0yPPf1/T06rluvl5M54WUiXCyANeVf3LW4OFcaAV5/Teo 2gy0mMWIrsaarhCIVzCqOmmdAPAFZ3vP0u9pSx9KrAyvFB8wD72mk8ut3TKmnDe2N7/b DmHqrBu1VcFTXY5Ss8OLs1ZY4AYJ/jY7l6L8V4ZtMqsoqNpeWnq0EE/pO3KofVAGfw4j P177xvDw1qyqgMHHikJDVeJ4LJs3Y4swAsXTl9qR7KQT10H4S6qyfRvXzHom0vKuFLT5 Gr3/QhmUCj/mgvSNf90Le00b2c6zizPYCpGvYtGc0g0Q1ek1xho3xy4Y1voNBHK00HLd sNRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FVuyzs2im4zS7qppoyrZCLrc7kw8Q95O7fbKKIGGHx4=; b=Z8xmjN1YRl6w84iPGe8QKTsH1Qa60ra5R06KdlM9ufyMDuGkj15JZFonzOoOkU58Bt 2RwqNlRBQ1VsF39slFq1yaftHBgOUICXTaBERr9h5eUBb8qBdxXgU5w7qrLC1fmg0m2Q +tzZ/HwCqN17cD3Kh7K+D0F/sxbXIlWEUcRPJ3AUZnndNzqv2WWI6VzwB17fReeqfHLi d9jv2CoeuwWiSrrtCMw+o5+B+Szm868ZTqzo+WT9hb1Pmg93bGcORVUazBoDrnLuFZ7E BCGhfgTZQZE5N7NnkjNcFVCLAAd21N3BcIdNbh1tbFrD2rmrGZZ/M/yKd/SffgKoBg/z ynZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kHmSd9Z6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si3659098otk.298.2019.12.04.11.22.32; Wed, 04 Dec 2019 11:22:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kHmSd9Z6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728707AbfLDSBf (ORCPT + 99 others); Wed, 4 Dec 2019 13:01:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:41980 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729596AbfLDSB3 (ORCPT ); Wed, 4 Dec 2019 13:01:29 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 75E69206DF; Wed, 4 Dec 2019 18:01:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482488; bh=AlL7gGaQUEEczQKboUrMn7YXDLmLCEaju/uZIpgF9w0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kHmSd9Z67ODel+977doOmWDFc2sIrGx5ewZLKYSosGoRk80hEb/6+OLjs6KS3QWsu ZjP8nlusS/05JLQH5Uv+v+Ok5DZLlDrYXKynEiMImeeUI7t+wZn6aoULt6R+VKxPHt uhNh+7O4hW/vCc9IHqkmAR7HMkpMsj7iD+Lwok7Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kurt Van Dijck , Marc Kleine-Budde , Sasha Levin Subject: [PATCH 4.14 017/209] can: rx-offload: can_rx_offload_queue_tail(): fix error handling, avoid skb mem leak Date: Wed, 4 Dec 2019 18:53:49 +0100 Message-Id: <20191204175322.733225494@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marc Kleine-Budde [ Upstream commit 6caf8a6d6586d44fd72f4aa1021d14aa82affafb ] If the rx-offload skb_queue is full can_rx_offload_queue_tail() will not queue the skb and return with an error. This patch frees the skb in case of a full queue, which brings can_rx_offload_queue_tail() in line with the can_rx_offload_queue_sorted() function, which has been adjusted in the previous patch. The return value is adjusted to -ENOBUFS to better reflect the actual problem. The device stats handling is left to the caller. Fixes: d254586c3453 ("can: rx-offload: Add support for HW fifo based irq offloading") Reported-by: Kurt Van Dijck Signed-off-by: Marc Kleine-Budde Signed-off-by: Sasha Levin --- drivers/net/can/rx-offload.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/net/can/rx-offload.c b/drivers/net/can/rx-offload.c index 1a7c183e66783..b26987a136203 100644 --- a/drivers/net/can/rx-offload.c +++ b/drivers/net/can/rx-offload.c @@ -261,8 +261,10 @@ int can_rx_offload_queue_tail(struct can_rx_offload *offload, struct sk_buff *skb) { if (skb_queue_len(&offload->skb_queue) > - offload->skb_queue_len_max) - return -ENOMEM; + offload->skb_queue_len_max) { + kfree_skb(skb); + return -ENOBUFS; + } skb_queue_tail(&offload->skb_queue, skb); can_rx_offload_schedule(offload); -- 2.20.1