Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp445704ybl; Tue, 28 Jan 2020 06:07:41 -0800 (PST) X-Google-Smtp-Source: APXvYqx0Zm15zaCldiv/dTH69ZrpTb+xXqAwgj1c4ZpGLMy/ApHv2JZ9GykACq/NPMMGHqG7DHqu X-Received: by 2002:aca:cf83:: with SMTP id f125mr2836068oig.15.1580220461704; Tue, 28 Jan 2020 06:07:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580220461; cv=none; d=google.com; s=arc-20160816; b=N2kt2wBy8P1kcX/bNCKqGJBJSsgiaZ4VyXzx+xhJS+CXBKNjMyBsOKPLrbB1m6/vps vB7ubouJC9N2r761dw3uF+TwPDA6IjPujEhM6ODceZxcGYBQlcbVMFrCAoKl41EOks6I t9iGoo2DhNG457t3YFyoTyo6qtDoeFzoSAhhhMpjFOjmjqdC/IFJLQDmFqPWM/UUD3NB vRFje1pOSC5RpJJEeKj5jUOg/6DxfIadynBC0TQRTYEjihpo6k/FxcaF9oGoQR/U04CO XWOnS9+51396AIrCSF5t25MEbBHmbZ2Ugf0AbrF7GX9EpIUBxIjzUcX5HlTpgxHHGRGP 2I7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xEnHiHk1C4e+3lfJHrJjq5tLvSHFEGYtJx1h4d6jqNg=; b=dq3CHsSQZDwGfxa58SVg9dMIaIqnekmps4M8wLld4nlrsAfMsDVHEPJs6JfUgz5cUp 0diuq2PqqomGI98UgwlydX/ZMgnVCOQtdpFtoM5RM67SY6lGc6Vl7hYXPHsMbjd8XUew s1IYC8J03aZC35EbtPBHDs89DuP7jqGl9mlWPumLd6oUIuzR+4UQTRnh2TEwCptPJhCb LKKVljXGraBzRnGVoy2C4Yh53S5+uEnyC59RESoGH40MVjQ3wGNbEYnYFnC1GQdt3/dq B5NMXIcEJxS2u1E37odBR+3dAfFQincB6CA35V62S1XwjhrsMQmWlpLfzSzB7jr43Q8r wK+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XPRierrF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q6si10494343otg.248.2020.01.28.06.07.26; Tue, 28 Jan 2020 06:07:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=XPRierrF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728201AbgA1OFG (ORCPT + 99 others); Tue, 28 Jan 2020 09:05:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:52504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728192AbgA1OFC (ORCPT ); Tue, 28 Jan 2020 09:05:02 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C8542205F4; Tue, 28 Jan 2020 14:05:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580220302; bh=cEY9Csq2IFQ1dLpeGxnxbWt/b8IdDawC5oUSWrgUMaA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XPRierrFvbrIbW1jN0hUZAtdtIOnHargfliL7qObkiHgiQDTAKyETSx5rJrJRELEt D1hkeF/prSk/7n7U9JJ2G0BLis57dg7tAxUn7ld4tT9BeLtc8fnMGSS9bKMtx+S1Mp CK+IEL7PeyAaI/u0E/uKLW9Q7fVbNIXBkJrRYjY4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johannes Berg , Luca Coelho Subject: [PATCH 5.4 080/104] iwlwifi: mvm: fix SKB leak on invalid queue Date: Tue, 28 Jan 2020 15:00:41 +0100 Message-Id: <20200128135828.240592538@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200128135817.238524998@linuxfoundation.org> References: <20200128135817.238524998@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johannes Berg commit b9f726c94224e863d4d3458dfec2e7e1284a39ce upstream. It used to be the case that if we got here, we wouldn't warn but instead allocate the queue (DQA). With using the mac80211 TXQs model this changed, and we really have nothing to do with the frame here anymore, hence the warning now. However, clearly we missed in coding & review that this is now a pure error path and leaks the SKB if we return 0 instead of an indication that the SKB needs to be freed. Fix this. Signed-off-by: Johannes Berg Fixes: cfbc6c4c5b91 ("iwlwifi: mvm: support mac80211 TXQs model") Signed-off-by: Luca Coelho Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/intel/iwlwifi/mvm/tx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/net/wireless/intel/iwlwifi/mvm/tx.c +++ b/drivers/net/wireless/intel/iwlwifi/mvm/tx.c @@ -1151,7 +1151,7 @@ static int iwl_mvm_tx_mpdu(struct iwl_mv if (WARN_ONCE(txq_id == IWL_MVM_INVALID_QUEUE, "Invalid TXQ id")) { iwl_trans_free_tx_cmd(mvm->trans, dev_cmd); spin_unlock(&mvmsta->lock); - return 0; + return -1; } if (!iwl_mvm_has_new_tx_api(mvm)) {