From mboxrd@z Thu Jan 1 00:00:00 1970 From: wexu@redhat.com Subject: [PATCH 3/3] tap: free skb if flags error Date: Fri, 1 Dec 2017 00:54:29 -0500 Message-ID: <1512107669-27572-4-git-send-email-wexu@redhat.com> References: <1512107669-27572-1-git-send-email-wexu@redhat.com> Cc: jasowang@redhat.com, mst@redhat.com, mjrosato@linux.vnet.ibm.com, wexu@redhat.com To: virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Return-path: In-Reply-To: <1512107669-27572-1-git-send-email-wexu@redhat.com> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org From: Wei Xu tap_recvmsg() supports accepting skb by msg_control after commit 3b4ba04acca8 ("tap: support receiving skb from msg_control"), the skb if presented should be freed within the function, otherwise it would be leaked. Signed-off-by: Wei Xu Reported-by: Matthew Rosato --- drivers/net/tap.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/net/tap.c b/drivers/net/tap.c index e9489b8..1c66b75 100644 --- a/drivers/net/tap.c +++ b/drivers/net/tap.c @@ -1154,9 +1154,13 @@ static int tap_recvmsg(struct socket *sock, struct msghdr *m, size_t total_len, int flags) { struct tap_queue *q = container_of(sock, struct tap_queue, sock); + struct sk_buff *skb = m->msg_control; int ret; - if (flags & ~(MSG_DONTWAIT|MSG_TRUNC)) + if (flags & ~(MSG_DONTWAIT|MSG_TRUNC)) { + if (skb) + kfree_skb(skb); return -EINVAL; + } ret = tap_do_read(q, &m->msg_iter, flags & MSG_DONTWAIT, m->msg_control); if (ret > total_len) { -- 1.8.3.1