Skip to content

Commit f214744

Browse files
Tetsuo Handamarckleinebudde
authored andcommitted
can: j1939: j1939_sk_bind(): call j1939_priv_put() immediately when j1939_local_ecu_get() failed
Commit 25fe97c ("can: j1939: move j1939_priv_put() into sk_destruct callback") expects that a call to j1939_priv_put() can be unconditionally delayed until j1939_sk_sock_destruct() is called. But a refcount leak will happen when j1939_sk_bind() is called again after j1939_local_ecu_get() from previous j1939_sk_bind() call returned an error. We need to call j1939_priv_put() before j1939_sk_bind() returns an error. Fixes: 25fe97c ("can: j1939: move j1939_priv_put() into sk_destruct callback") Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Tested-by: Oleksij Rempel <o.rempel@pengutronix.de> Acked-by: Oleksij Rempel <o.rempel@pengutronix.de> Link: https://patch.msgid.link/4f49a1bc-a528-42ad-86c0-187268ab6535@I-love.SAKURA.ne.jp Signed-off-by: Marc Kleine-Budde <mkl@pengutronix.de>
1 parent 7fcbe5b commit f214744

1 file changed

Lines changed: 3 additions & 0 deletions

File tree

net/can/j1939/socket.c

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -521,6 +521,9 @@ static int j1939_sk_bind(struct socket *sock, struct sockaddr *uaddr, int len)
521521
ret = j1939_local_ecu_get(priv, jsk->addr.src_name, jsk->addr.sa);
522522
if (ret) {
523523
j1939_netdev_stop(priv);
524+
jsk->priv = NULL;
525+
synchronize_rcu();
526+
j1939_priv_put(priv);
524527
goto out_release_sock;
525528
}
526529

0 commit comments

Comments
 (0)