Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1952445rwb; Thu, 17 Nov 2022 04:40:05 -0800 (PST) X-Google-Smtp-Source: AA0mqf7k9MBU6VIQwTU+IRi/yiqnPkBTNNqPC6fBSr3rnc0RojuYiTNeI8SzVoCSvtQCdV5aUbZm X-Received: by 2002:a17:903:1091:b0:188:dcfb:59a5 with SMTP id u17-20020a170903109100b00188dcfb59a5mr2435169pld.151.1668688805027; Thu, 17 Nov 2022 04:40:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668688805; cv=none; d=google.com; s=arc-20160816; b=kILnFC1mHDoNkmxPAx+T/ZOKLSYVtP/6QTFo5TUv9xHQIHxo1E74fkmlhCSe2CeXVR GtZi9qi4pjQr2Kb6m0zYX6eLAfL9vPZguTdqa630ZCuw69fIV6Vt/4bzZzdzjGAyvyY1 mkpF9Q5MXJTlddU0bAIKCvjwWKQAc7cp3A/BXlkuL1/UV8P14ZtYtIy5k9cGe+QkEQ55 a2/n6lQG38L1E56ZrTS13u85EdrGyMRxHTLBz8PkQe+XMBPLuzVKpZxNBb/LhPFYbm9b s3jG3MvNVZiogwpSKRQ4oXd1/9lmRj5xRNgDQXJ876X8LnGc1lhn9jqeDbAKCH3ZPFjd JXbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=drLUAeIs6ahY+4uh/BbHhJfiwZ+HN3Fv5JWjDisFjAU=; b=i05bDZQc1JUDk737UKwZajl8uz9+hQhdm2oSBIv71ZKSipvLxfiLujMc16ZknsRWxN F8SlVLihvMlnYpG9aP5UgdMk1Whnh9axGCdHoyIgQZUXi5JEGRCv1a8okEzlzj6SbdI0 SFV4M94ke7XRMEdECh0R+3XXuTPcrQltfcWM99jyncf51Gbci5o/hQvFVnuFFyIML7kJ OdhNxLYyjUOU7uR1LICu3EOgrLSDUHj5tbwSxc6c2x7GMIqptKPghE1G5QqQeZo/HW4R UsFd/01/W606VK/KSfYJd0CeF8vIysuJJbPTavhJXm6T97koNFUzHOM3+gY034aqqHXB kf/Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y10-20020a170903010a00b0018862b8c9a2si819495plc.12.2022.11.17.04.39.52; Thu, 17 Nov 2022 04:40:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239722AbiKQMPF (ORCPT + 92 others); Thu, 17 Nov 2022 07:15:05 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44982 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240006AbiKQMO4 (ORCPT ); Thu, 17 Nov 2022 07:14:56 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 703346B21F; Thu, 17 Nov 2022 04:14:54 -0800 (PST) Received: from dggpeml500022.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NCf3q3h3JzRpGD; Thu, 17 Nov 2022 20:14:31 +0800 (CST) Received: from dggpeml500006.china.huawei.com (7.185.36.76) by dggpeml500022.china.huawei.com (7.185.36.66) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 17 Nov 2022 20:14:52 +0800 Received: from [10.174.178.240] (10.174.178.240) by dggpeml500006.china.huawei.com (7.185.36.76) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 17 Nov 2022 20:14:52 +0800 Subject: Re: [PATCH net] net/qla3xxx: fix potential memleak in ql3xxx_send() To: Leon Romanovsky CC: , "David S. Miller" , Eric Dumazet , Jakub Kicinski , "Paolo Abeni" , Jeff Garzik , Ron Mercer , , References: <1668675039-21138-1-git-send-email-zhangchangzhong@huawei.com> From: Zhang Changzhong Message-ID: Date: Thu, 17 Nov 2022 20:14:51 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.178.240] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpeml500006.china.huawei.com (7.185.36.76) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/11/17 19:38, Leon Romanovsky wrote: > On Thu, Nov 17, 2022 at 04:50:38PM +0800, Zhang Changzhong wrote: >> The ql3xxx_send() returns NETDEV_TX_OK without freeing skb in error >> handling case, add dev_kfree_skb_any() to fix it. > > Can you please remind me why should it release? > There are no paths in ql3xxx_send() that release skb. > > Thanks > If ql_send_map() returns NETDEV_TX_OK, the packet is sent, and ql_process_mac_tx_intr() releases tx_cb->skb. However, the skb cannot be released in this error path. Thanks, Changzhong >> >> Fixes: bd36b0ac5d06 ("qla3xxx: Add support for Qlogic 4032 chip.") >> Signed-off-by: Zhang Changzhong >> --- >> drivers/net/ethernet/qlogic/qla3xxx.c | 1 + >> 1 file changed, 1 insertion(+) >> >> diff --git a/drivers/net/ethernet/qlogic/qla3xxx.c b/drivers/net/ethernet/qlogic/qla3xxx.c >> index 76072f8..0d57ffc 100644 >> --- a/drivers/net/ethernet/qlogic/qla3xxx.c >> +++ b/drivers/net/ethernet/qlogic/qla3xxx.c >> @@ -2471,6 +2471,7 @@ static netdev_tx_t ql3xxx_send(struct sk_buff *skb, >> skb_shinfo(skb)->nr_frags); >> if (tx_cb->seg_count == -1) { >> netdev_err(ndev, "%s: invalid segment count!\n", __func__); >> + dev_kfree_skb_any(skb); >> return NETDEV_TX_OK; >> } >> >> -- >> 2.9.5 >> > . >