net: sched: cls_cgroup fix possible memory leak of 'new'
authorJohn Fastabend <john.fastabend@gmail.com>
Tue, 16 Sep 2014 06:31:17 +0000 (23:31 -0700)
committerDavid S. Miller <davem@davemloft.net>
Tue, 16 Sep 2014 19:59:36 +0000 (15:59 -0400)
tree:   git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next.git master
head:   54996b529ab70ca1d6f40677cd2698c4f7127e87
commit: c7953ef23042b7c4fc2be5ecdd216aacff6df5eb [625/646] net: sched: cls_cgroup use RCU

net/sched/cls_cgroup.c:130 cls_cgroup_change() warn: possible memory leak of 'new'
net/sched/cls_cgroup.c:135 cls_cgroup_change() warn: possible memory leak of 'new'
net/sched/cls_cgroup.c:139 cls_cgroup_change() warn: possible memory leak of 'new'

Fixes: c7953ef23042b7c4fc2be5ecdd216aac ("net: sched: cls_cgroup use RCU")
Reported-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: John Fastabend <john.r.fastabend@intel.com>
Acked-by: Cong Wang <cwang@twopensource.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/sched/cls_cgroup.c

index 3b7548759998b10e0f6262dda7c910611ec9f89f..10c7ffde13e22d0fefe308fd2fa9adfb753a97ee 100644 (file)
@@ -127,16 +127,18 @@ static int cls_cgroup_change(struct net *net, struct sk_buff *in_skb,
        err = nla_parse_nested(tb, TCA_CGROUP_MAX, tca[TCA_OPTIONS],
                               cgroup_policy);
        if (err < 0)
-               return err;
+               goto errout;
 
        tcf_exts_init(&e, TCA_CGROUP_ACT, TCA_CGROUP_POLICE);
        err = tcf_exts_validate(net, tp, tb, tca[TCA_RATE], &e, ovr);
        if (err < 0)
-               return err;
+               goto errout;
 
        err = tcf_em_tree_validate(tp, tb[TCA_CGROUP_EMATCHES], &t);
-       if (err < 0)
-               return err;
+       if (err < 0) {
+               tcf_exts_destroy(tp, &e);
+               goto errout;
+       }
 
        tcf_exts_change(tp, &new->exts, &e);
        tcf_em_tree_change(tp, &new->ematches, &t);
@@ -145,6 +147,9 @@ static int cls_cgroup_change(struct net *net, struct sk_buff *in_skb,
        if (head)
                call_rcu(&head->rcu, cls_cgroup_destroy_rcu);
        return 0;
+errout:
+       kfree(new);
+       return err;
 }
 
 static void cls_cgroup_destroy(struct tcf_proto *tp)