Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp4366518pxj; Tue, 8 Jun 2021 12:32:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+7kkcHxxoJvDPA6eZR6nIzdU8LTRn+meO5JvBgCOktlATLu1bX1FvMDu+nzOUlB1FFm5u X-Received: by 2002:a05:6402:31eb:: with SMTP id dy11mr14845075edb.165.1623180731754; Tue, 08 Jun 2021 12:32:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623180731; cv=none; d=google.com; s=arc-20160816; b=sNGKSIC5W91miVoTIRjeByU9yXfTtTlPYKfA71YBfTwXR3c0tWg01Fv5kwcMoNPDPK 9HwjUA4Y206KgHWkThoK4pnVgPBjknZGHR9jLWuwdCjrF11DLMXJRpIQzMerdS7TZz5Y Vep/QLyN19OJcoTeBVNQiCTRRlYrd4FjFSSU9olYVgRwvQUq1r9pSsCTaMm20Td3gbK/ 472hpEUqirl/IO+hT1FLwlUUil0/s6LgUWRL+GcfS7j9OMQsQGlw3PFtDPVkx0MdO3Lx xQomns4Uqpt5KqERNEXVR2N8AUp+cGIRm6MgvQrmwkjcsTfPDzCBaW24fqsL4Nt7kHdp soTw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jt66i0yHZymi3DFfW8enRSrQ/qfuBPRMwbx9Y4kxO8o=; b=A35G4vIK/KlRS9MUQDNXhhliZ0YzC1mZz7GOyBt3SnZLEfP0OqdDUB/0dnr8QXHy/U ikm/mu2/MzZbC8dEfXyvDjkwkzUUt9VcM0JoTgg8Sa3YfRD/1afbljQh/ZYKMnDZDEQG In4AzMp9t0Ms9Ek50pkHHgoQvLaX4pOwIrX5pSZlO4lR3MIfYSkxZj0Fw/p/F3M5zHX3 HugJI9Kj30JF0tH6GuPU+1KmukT7aHp+AfdHjNlP9xmTx/3LhR7CvJQ8xHcbAqg+JGxe vrziLslLeV3UusBFLC5WXYMpY+oFEAwoLgAYqcEQj/OXPDaCQiUOHym3TEmf6/uHWjUi eOmg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0wEJzUSe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id nb10si487514ejc.344.2021.06.08.12.31.47; Tue, 08 Jun 2021 12:32:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=0wEJzUSe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239674AbhFHTY7 (ORCPT + 99 others); Tue, 8 Jun 2021 15:24:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:36962 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237716AbhFHTMp (ORCPT ); Tue, 8 Jun 2021 15:12:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id CB7FF61465; Tue, 8 Jun 2021 18:49:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1623178179; bh=Yl7IPL85YzCd2CUddMcgindgnXZi0j50a/KS615JKeo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0wEJzUSerth5+AyVWXZOwLdrkipxLG4fz88EwigV3wW0FVXFChy6w68NRmE16wV3d AH5V18lGIe4yy9/0g02Zecum12+3VzBh015nc5WcJnZclTKggXLtDpC9I/JuYpUBtR s6/5cXfqZMvmwjSOXce2RpzBSPAXsCb6HHMS8/+s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Pavel Skripkin , "David S. Miller" Subject: [PATCH 5.12 106/161] net: caif: fix memory leak in cfusbl_device_notify Date: Tue, 8 Jun 2021 20:27:16 +0200 Message-Id: <20210608175949.056066645@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210608175945.476074951@linuxfoundation.org> References: <20210608175945.476074951@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Pavel Skripkin commit 7f5d86669fa4d485523ddb1d212e0a2d90bd62bb upstream. In case of caif_enroll_dev() fail, allocated link_support won't be assigned to the corresponding structure. So simply free allocated pointer in case of error. Fixes: 7ad65bf68d70 ("caif: Add support for CAIF over CDC NCM USB interface") Cc: stable@vger.kernel.org Signed-off-by: Pavel Skripkin Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/caif/caif_usb.c | 14 +++++++++++++- 1 file changed, 13 insertions(+), 1 deletion(-) --- a/net/caif/caif_usb.c +++ b/net/caif/caif_usb.c @@ -115,6 +115,11 @@ static struct cflayer *cfusbl_create(int return (struct cflayer *) this; } +static void cfusbl_release(struct cflayer *layer) +{ + kfree(layer); +} + static struct packet_type caif_usb_type __read_mostly = { .type = cpu_to_be16(ETH_P_802_EX1), }; @@ -127,6 +132,7 @@ static int cfusbl_device_notify(struct n struct cflayer *layer, *link_support; struct usbnet *usbnet; struct usb_device *usbdev; + int res; /* Check whether we have a NCM device, and find its VID/PID. */ if (!(dev->dev.parent && dev->dev.parent->driver && @@ -169,8 +175,11 @@ static int cfusbl_device_notify(struct n if (dev->num_tx_queues > 1) pr_warn("USB device uses more than one tx queue\n"); - caif_enroll_dev(dev, &common, link_support, CFUSB_MAX_HEADLEN, + res = caif_enroll_dev(dev, &common, link_support, CFUSB_MAX_HEADLEN, &layer, &caif_usb_type.func); + if (res) + goto err; + if (!pack_added) dev_add_pack(&caif_usb_type); pack_added = true; @@ -178,6 +187,9 @@ static int cfusbl_device_notify(struct n strlcpy(layer->name, dev->name, sizeof(layer->name)); return 0; +err: + cfusbl_release(link_support); + return res; } static struct notifier_block caif_device_notifier = {