Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6275733imu; Mon, 21 Jan 2019 06:14:11 -0800 (PST) X-Google-Smtp-Source: ALg8bN73b2qWxJmZ7mksm7/fj0M2pbkS9hBukia+64+Hi9fc9rL6CdYtv2DYEGUGCtvs99T3mCLZ X-Received: by 2002:a17:902:a586:: with SMTP id az6mr13509884plb.298.1548080051052; Mon, 21 Jan 2019 06:14:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548080051; cv=none; d=google.com; s=arc-20160816; b=D1prJ8ZR8FV5+vRq2mJyFacpRJtBsBZEEWXvwcChvWSz7J/r8JJ+DFnQuvg5lZYMLb sJSAbatCFNpI5JFMEEnLoyuJJu9OS+e5uosOFLAufICAV/D5i29zQf+LTT8/vdlydsB9 4hPK+aF9dHp8RimICVif1DatIau466JxSfmER/1rOwaaca3WIpmZ9CnrV6sR1coiss18 phayWusXmGEZCkh+gF6HFbjfDK2dRs2Cu7GczdnoVk64qpXxxOVC+hSWLqIbD64qewu8 1V9CiSLleeieRsELPSM+Za8osXtrNJvIxirXBSqqrUildIhlCJACZR3b3WI+cScvk/hE yJXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=hfwjZK6Gelwg6wTsyEwVTIHwWyuWGwHQmUwHX7II5Zg=; b=NU0lpKTedqgxC2xvHEB7fNPZw+tDTlVb1A23S7ismCjtpT0Kbvx/c900pK21ex7gM6 VD6m89u7dNWfgNvuzggO0wwmO2cwwtD9t4aD/aUCYkBdLBcg52P4AKuEYc0Rf6HQSQ0f IR2c+Up9ReD5xQS3g5mOBY1lSu6RwIxWRozKlzn/E+nZQ8RT09MmoB+W0czPen/Unroq AjCuElXxxIQojHyssadGFvMVNQ7U23gdnXZV4tWslqLXDOYbD4lC0orUp2iGIAIt/bZk iPWpuENuhwKLNRj1tycQan+B8DG3kkoUtgyRRO0G0j8QzJsiQEGJN5w0hhYkQElM7cVA CGLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JN7bYy6z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a24si13046504pgd.248.2019.01.21.06.13.55; Mon, 21 Jan 2019 06:14:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=JN7bYy6z; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730301AbfAUNyA (ORCPT + 99 others); Mon, 21 Jan 2019 08:54:00 -0500 Received: from mail.kernel.org ([198.145.29.99]:37914 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730965AbfAUNx4 (ORCPT ); Mon, 21 Jan 2019 08:53:56 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 763EA2084C; Mon, 21 Jan 2019 13:53:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548078836; bh=00Yu7RH7OsQHDDjWqygQy7M8dOkvd7Qq7fW2KGWuW8E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=JN7bYy6zk9t82gbkH3fHB6t0VdMAkimWrGWKygMybcMJxwmQmL9WRp3wgK++n4SWb qZkdtPkT8ZoHILKkm9sbPq9dPb14YnEcnynqzcj+6RZk7gA7z8JeOC01dJFKrRcZiG whQb+JlRnfYjJe2H/sx500pZe9rbDR6m5krkadEE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yue Hu , Kees Cook Subject: [PATCH 4.14 34/59] pstore/ram: Avoid allocation and leak of platform data Date: Mon, 21 Jan 2019 14:43:59 +0100 Message-Id: <20190121122500.378592160@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190121122456.529172919@linuxfoundation.org> References: <20190121122456.529172919@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Kees Cook commit 5631e8576a3caf606cdc375f97425a67983b420c upstream. Yue Hu noticed that when parsing device tree the allocated platform data was never freed. Since it's not used beyond the function scope, this switches to using a stack variable instead. Reported-by: Yue Hu Fixes: 35da60941e44 ("pstore/ram: add Device Tree bindings") Cc: stable@vger.kernel.org Signed-off-by: Kees Cook Signed-off-by: Greg Kroah-Hartman --- fs/pstore/ram.c | 9 +++------ 1 file changed, 3 insertions(+), 6 deletions(-) --- a/fs/pstore/ram.c +++ b/fs/pstore/ram.c @@ -711,18 +711,15 @@ static int ramoops_probe(struct platform { struct device *dev = &pdev->dev; struct ramoops_platform_data *pdata = dev->platform_data; + struct ramoops_platform_data pdata_local; struct ramoops_context *cxt = &oops_cxt; size_t dump_mem_sz; phys_addr_t paddr; int err = -EINVAL; if (dev_of_node(dev) && !pdata) { - pdata = devm_kzalloc(&pdev->dev, sizeof(*pdata), GFP_KERNEL); - if (!pdata) { - pr_err("cannot allocate platform data buffer\n"); - err = -ENOMEM; - goto fail_out; - } + pdata = &pdata_local; + memset(pdata, 0, sizeof(*pdata)); err = ramoops_parse_dt(pdev, pdata); if (err < 0)