Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp12366358rwl; Tue, 3 Jan 2023 13:16:04 -0800 (PST) X-Google-Smtp-Source: AMrXdXvPA/iA7f7Kz1bbU35zaQy6OtxjRUvdRpIOU4Gm10KJXLoMf+zyldKtfvm05UaCBuIAw3XP X-Received: by 2002:a17:906:c34d:b0:78d:f455:b5de with SMTP id ci13-20020a170906c34d00b0078df455b5demr37142716ejb.30.1672780564256; Tue, 03 Jan 2023 13:16:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672780564; cv=none; d=google.com; s=arc-20160816; b=auC1spYTe+NLUH8IdoqPvwlBOD04HRrp6g8Gc9dFQ/jBUYUGwjDwCzPOS8PNkzBGZF Jvt9cUv1jCsxrErrmTPyDhHhxol9DCRrogS5PtawCCw3pK0QJUuaqKKivwBdpMmEWfCY i17WLPUHDXtSOO9SXOdxYdnzpVV5LvNlth1smdshW0U8ZbeVexfju8zL3CHF/PZyD960 MA+JY+eh48MGsjS2I/TvLppujfTaYEQ2dikLxNvjjBvB7tuZcugEJjkZXMDxdDv7E3uM 4l6NBzX4+CE2R1CSJjKWsEfYs6UFBGryLjwesSdk6k36oPJOJ9PVj69D0FUsHYAq0fY3 rj5Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:dkim-signature:from; bh=/DGqQs01qRA3my4n60uvgiw36uCBn7e06GdYn6QyR6E=; b=ox1koybduEKmwg400P2k7Jb7krpW8ZZWt3kMVsyTaFYokJY+MkoErDoEu2S0FSwqEg F6Yd/2zAsEcpnIoNJS6DA76OI8nwmWlIdvgGDU+HAucnNqZIRurgFBZ7IGUw1cvt2Sye 9bPPtc+BFLofYDq54GOefcQ9asAPCDOUxg9NY9jGkcB1GV/uTGtG0529Yt9+IcfKpBdH XLlwg3NNfqXeNEr5hOwbG+0aWNUwauif2Iw9GG2h6iEOjOpXrTnqoLx4Tx+lr4ktqQFY nyWUEALk554klBjshjTFgBer7gLbS9bk9pRiO3q8hU9Rt34mA7Kak0Ed003CUWlw52Nu +ISA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@toke.dk header.s=20161023 header.b=OqJ6s5aS; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=toke.dk Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id wv1-20020a170907080100b007a7f207a1b9si29178388ejb.664.2023.01.03.13.15.44; Tue, 03 Jan 2023 13:16:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@toke.dk header.s=20161023 header.b=OqJ6s5aS; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=toke.dk Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233696AbjACVFE (ORCPT + 67 others); Tue, 3 Jan 2023 16:05:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233719AbjACVEg (ORCPT ); Tue, 3 Jan 2023 16:04:36 -0500 Received: from mail.toke.dk (mail.toke.dk [IPv6:2a0c:4d80:42:2001::664]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3265E140D6; Tue, 3 Jan 2023 13:04:35 -0800 (PST) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=toke.dk; s=20161023; t=1672779873; bh=qyIjFinFityRMegIbRBQ0PW0rEHzPyNxjyFmnFCju74=; h=From:To:Cc:Subject:In-Reply-To:References:Date:From; b=OqJ6s5aS9ol7+Z3Q1KJY0H6pLRFHCicC55Ndp9L7dz0ccrvVv+yvwtl0slItF5wl7 90JQXzIirW2+kOpDZZJk5oHkm/50naHmn+RyGoZICaVUCxZuz8uTxtQVR9feh9Np8Q hSwSqn908yv5toaWdIEul5I+0kL4052W6F1z57iDi1zN38/JIRz70iMw2N8H2CAGCr athRsV2I1k1wLQ3OwrvI46+f+eddhiBo8kPNR5v3MS1qofBhEpQqatQeX/IfCZ5tYC doMxqzcd7gj3HF3+i+nwbDkQMfIRA2MBcFWm6RcFuB+tIYg0I+HZ7tU0V8vNG6Ka7Z 7fIB4iw3xdOyA== To: Fedor Pchelkin , Kalle Valo Cc: Fedor Pchelkin , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Sujith , "John W. Linville" , Vasanthakumar Thiagarajan , Senthil Balasubramanian , linux-wireless@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Alexey Khoroshilov , lvc-project@linuxtesting.org, syzbot+e008dccab31bd3647609@syzkaller.appspotmail.com, syzbot+6692c72009680f7c4eb2@syzkaller.appspotmail.com Subject: Re: [PATCH v2] wifi: ath9k: htc_hst: free skb in ath9k_htc_rx_msg() if there is no callback function In-Reply-To: <20230103143202.274163-1-pchelkin@ispras.ru> References: <20230103143202.274163-1-pchelkin@ispras.ru> Date: Tue, 03 Jan 2023 22:04:31 +0100 X-Clacks-Overhead: GNU Terry Pratchett Message-ID: <87358r49eo.fsf@toke.dk> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org Fedor Pchelkin writes: > It is stated that ath9k_htc_rx_msg() either frees the provided skb or > passes its management to another callback function. However, the skb is > not freed in case there is no another callback function, and Syzkaller was > able to cause a memory leak. Also minor comment fix. > > Found by Linux Verification Center (linuxtesting.org) with Syzkaller. > > Fixes: fb9987d0f748 ("ath9k_htc: Support for AR9271 chipset.") > Reported-by: syzbot+e008dccab31bd3647609@syzkaller.appspotmail.com > Reported-by: syzbot+6692c72009680f7c4eb2@syzkaller.appspotmail.com > Signed-off-by: Fedor Pchelkin > Signed-off-by: Alexey Khoroshilov > --- > v1->v2: added Reported-by tag > > drivers/net/wireless/ath/ath9k/htc_hst.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/net/wireless/ath/ath9k/htc_hst.c b/drivers/net/wireless/ath/ath9k/htc_hst.c > index ca05b07a45e6..7d5041eb5f29 100644 > --- a/drivers/net/wireless/ath/ath9k/htc_hst.c > +++ b/drivers/net/wireless/ath/ath9k/htc_hst.c > @@ -391,7 +391,7 @@ static void ath9k_htc_fw_panic_report(struct htc_target *htc_handle, > * HTC Messages are handled directly here and the obtained SKB > * is freed. > * > - * Service messages (Data, WMI) passed to the corresponding > + * Service messages (Data, WMI) are passed to the corresponding > * endpoint RX handlers, which have to free the SKB. > */ > void ath9k_htc_rx_msg(struct htc_target *htc_handle, > @@ -478,6 +478,8 @@ void ath9k_htc_rx_msg(struct htc_target *htc_handle, > if (endpoint->ep_callbacks.rx) > endpoint->ep_callbacks.rx(endpoint->ep_callbacks.priv, > skb, epid); > + else > + kfree_skb(skb); Shouldn't this be 'goto invalid' like all the other error paths in that function? -Toke