Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp129234ybi; Fri, 24 May 2019 01:06:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqyyQOUna0dg8yVx1c1HGVGSa2zHgKCrbezydYEgF35Q29Ax25/MQ2lDgJP7W9W0J3g9lbzq X-Received: by 2002:a17:902:b495:: with SMTP id y21mr39056883plr.243.1558685204448; Fri, 24 May 2019 01:06:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558685204; cv=none; d=google.com; s=arc-20160816; b=pQ5fcwXBFEhpDfXj0tDy3BwTggEX9zZHGvWNt2bwxrKxPX4KqI1K+iRd2BW8gowJd7 Uve8z1Z342U5lvI/Sw95khiMi/VGAxIpUYxBiicXY07Z+KR3NvQoU2kzzrWwjTWtdsn5 2QDMaCIkIpNshp0M/83QXx46s98NH3sH/q5Y4Vh6ovTDvNijVRbAtQKMISvCaDwvzCET oS9v/UvkjhzcWqvxvQQ/gpJAKg7eCzvlnjSECvUw0lxTJnD6XRfkguqckTR2aNNXOF23 oe0NFMzWRnoW08wx+Ym0curiv2d7qw+UsLPasYNQnphz++W/yjGFAzR6FIuPbcT+8To1 Voig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=xsnuxKqiLJA67FKUkP5w0wCLASE12fbJzLd/PolVCKU=; b=Murm6Y+0TfakJqn0nu2esHoUrmnlthzJaUbVT9gKIknRebwtOGxrMz7D/5wQqwcwww kKdphs5ZR2G9Xv5nmI5iWxk36Eh3IWN6+sEoHAYzaVRTOBWMh8E2Sc9ECG4eM34iCQTd A5dKr3hZt16BSWnK2DVBZGxxT2pvSXNXkMEn2mwCYhr4AgRdksTcrQBErb/nrIsGnzwZ wqQpU0K706q9+ns9oEIoyd+CoKGnRSFCRkVCE1praxX958G6zsr5Gjhwdy6SUL/yhHwf hy23drUtgMEeKbJH+3yr5L48xMWcwKEblb+cEdwPFM9TQnYZTh9XvvPheyuOnIorOOQ3 /VEQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VHZsXyag; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j130si2859505pgc.133.2019.05.24.01.06.24; Fri, 24 May 2019 01:06:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VHZsXyag; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389386AbfEXICE (ORCPT + 99 others); Fri, 24 May 2019 04:02:04 -0400 Received: from mail.kernel.org ([198.145.29.99]:42784 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388960AbfEXICD (ORCPT ); Fri, 24 May 2019 04:02:03 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7C30A20879; Fri, 24 May 2019 08:02:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1558684923; bh=vrI2w4bCtBVKfEqYgeIaQRqwpP4Fb94jIUkDHbH/c2I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=VHZsXyagXDTctt2cCFh7NrW8NeeaYLm48PggtIM7D52b6/dSVHIOcjykEaYm1Hr6Z mT4a9ag6PEMXThiCy/A1n0e0fOnRQknQgGl+nknCeo/lgtB5s6mvj/rbvf2tNFcC8h OI1j0SwMVbM1sw3xgD+tiCLZJVyTmpG1w6RQkKrI= Date: Fri, 24 May 2019 10:02:00 +0200 From: Greg KH To: Gen Zhang Cc: jslaby@suse.com, keescook@chromium.org, khorenko@virtuozzo.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] consolemap: Fix a memory leaking bug in con_insert_unipair() Message-ID: <20190524080200.GA19609@kroah.com> References: <20190521092935.GA2297@zhanggen-UX430UQ> <201905211342.DE554F0D@keescook> <20190522015055.GC4093@zhanggen-UX430UQ> <201905221353.AD8E585E6D@keescook> <20190523003452.GB14060@zhanggen-UX430UQ> <201905230952.B47ADA17A@keescook> <20190524021932.GA4866@zhanggen-UX430UQ> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190524021932.GA4866@zhanggen-UX430UQ> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 24, 2019 at 10:19:32AM +0800, Gen Zhang wrote: > In function con_insert_unipair(), when allocation for p2 and p1[n] > fails, ENOMEM is returned, but previously allocated p1 is not freed, > remains as leaking memory. Thus we should free p1 as well when this > allocation fails. > > Signed-off-by: Gen Zhang > Reviewed-by: Kees Cook Any reason you keep dropping me from this thread? It's as if you don't want me to apply the patch :( greg k-h