Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1442547imm; Fri, 14 Sep 2018 18:44:11 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbCZJD6wZd9j+cPeLIODsRFiGjCwLd+OOMsvhPqBPjTloGwX/dGtJbq47A8haqT9lydSLKw X-Received: by 2002:a62:e412:: with SMTP id r18-v6mr15035305pfh.25.1536975851462; Fri, 14 Sep 2018 18:44:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536975851; cv=none; d=google.com; s=arc-20160816; b=f1GJsTJhXReHl7X+0zO+3mkYigdUfoHWTI6CvFLaJC0a8a+9RQojYGmapolAAIE5/d 3EfhHgZIk2aNyc5czlFoF7RbUTzx8A0xEfjbkBajTMaEykX5RPqn0kGREmcIOvcBb3Hc +wDASia9+e2Sw5c6h0XVoNvbUz5UfFmf273sCfOkh2c8HuMMlv6D9UZoibKw71dUgCgt qUEBi4oOSV6QLoZNX+9k+iYh5l+tHZWmu/HNS1sI0Ba3yCIy4H1M5UZxKaPMk3bLC/Sx J5fThIJYl2ZcI2r11OCz/S+pKSNrhJ+4/qwK158dbv6DLbYOOQTLUwuwmlUT33hEr0DS etiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :message-id:date:subject:cc:to:from; bh=z+AgirIWoB88XQNlpo4jMp1h1KAiMBWGDXuKwqij22o=; b=F6gc5ngfupVberWcp79GI2V0/96Ze5stqWn/VCO+ZbDNlBqufXK3kG88psDHxqAIn3 eizNOoW6Mxqjuw2l/HD3wDpDkaoHCocfJ1SZxmaTyDkVQSE/f17/Iw5ctuvASdWxGoqa wGMcCT6wzyy6Zr4cD2sQjidFo2nUY/z4xWCyUDFH5wJll6f0/hyrolEec6sSgx2dxqdE /pZgp+gO27V+kXWWb8BQNP1zKsP7BVbKwTiP+wNLuRx4codyBpZfZ4/IVwoRChwHQ5PF t/qw/IxBBIy/zpwqjJTYUzBj90C3IrqzccwLxWntTsYoBGSE6z/7ZxHW2dPQiQTa7hYu 8XBQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o38-v6si5452468pgl.676.2018.09.14.18.43.56; Fri, 14 Sep 2018 18:44:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728996AbeIOHAj (ORCPT + 99 others); Sat, 15 Sep 2018 03:00:39 -0400 Received: from szxga07-in.huawei.com ([45.249.212.35]:38839 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725746AbeIOHAi (ORCPT ); Sat, 15 Sep 2018 03:00:38 -0400 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 06B2C43DFC8C8; Sat, 15 Sep 2018 09:43:33 +0800 (CST) Received: from localhost.localdomain.localdomain (10.175.113.25) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.399.0; Sat, 15 Sep 2018 09:43:26 +0800 From: Wei Yongjun To: David Airlie , Haneen Mohammed , Sean Paul , Mahesh Kumar , Daniel Vetter , "Maarten Lankhorst" CC: Wei Yongjun , , , Subject: [PATCH -next] drm/vkms: Fix possible memory leak in _vkms_get_crc() Date: Sat, 15 Sep 2018 01:53:19 +0000 Message-ID: <1536976399-1295-1-git-send-email-weiyongjun1@huawei.com> X-Mailer: git-send-email 1.8.3.1 Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit MIME-Version: 1.0 X-Originating-IP: [10.175.113.25] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 'vaddr_out' is malloced in _vkms_get_crc() and should be freed before leaving from the error handling cases, otherwise it will cause memory leak. Fixes: db7f419c06d7 ("drm/vkms: Compute CRC with Cursor Plane") Signed-off-by: Wei Yongjun --- drivers/gpu/drm/vkms/vkms_crc.c | 1 + 1 file changed, 1 insertion(+) diff --git a/drivers/gpu/drm/vkms/vkms_crc.c b/drivers/gpu/drm/vkms/vkms_crc.c index 0a27456..9d9e814 100644 --- a/drivers/gpu/drm/vkms/vkms_crc.c +++ b/drivers/gpu/drm/vkms/vkms_crc.c @@ -125,6 +125,7 @@ static uint32_t _vkms_get_crc(struct vkms_crc_data *primary_crc, mutex_lock(&vkms_obj->pages_lock); if (WARN_ON(!vkms_obj->vaddr)) { mutex_unlock(&vkms_obj->pages_lock); + kfree(vaddr_out); return crc; }