Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp3102979ybi; Thu, 18 Jul 2019 21:05:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqw9drV8PYfcX83K74ZUUi5W2+MY1K3MSEVijo/mal42pA6UHhmqow878Qu38r1LWdHaN3pY X-Received: by 2002:a63:ee08:: with SMTP id e8mr27490026pgi.70.1563509119152; Thu, 18 Jul 2019 21:05:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563509119; cv=none; d=google.com; s=arc-20160816; b=szvUJy6k0oM9rX/um1NICdsVrUAmnlPJSzzueyD+JBhT5m+C+pck0uxx5sR1mkn6pe OiuRzjauRAreZGo9TnMbG2/bN2Sc9O7UkK68cRaahpy8IUbs9rFuQ8hUSTyolHM4ic+C 1kK5vry1SFZ+R0YKBohbBnmkn3bsdlk4a/ZkLjjLRMjMzVCYIc2EDHecrgJhDMJbj0mw +l5+SoCxMY8uGyWGJSMEBWjQbBrHzDdlOghDOEVrKGojQPkqAllDygG0ZsiKdDN3nVxK oAwLRI43PAX3eAwZq/0Y9UjxCjWJX6QhrQyBso1G4xnx2ZQm3/RcggApMtIr+8ARSMRx xZEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=sZOEoQx0/3azF2zvGMNO6wXii+vOFtYoEG8IG7TY90c=; b=IiKM91Kbx0uwmmkF7QDbkG8g+IGIkfk99mAMzrdSsLMm2CBz3nlHd1wAjZF4GxLjBl mo2QpDLqOAjpM6ESeVMZI0ffiIlIF9ReeG8Laa/sbdDNHXNqlDen2OQyD/A/im9Td2jO yc7gn1oyJafqG/WkIkHq3YtR8FtTi7vpY5C2ispziEn7H8vw5ZvMuMjd07gCvWYxV9to valepR+J+aSw/vdqApcrCdLIdkX0pISd1ocj4dwLswWv6SNeiXwoW7rpYOXzQZXmWdUN OWBvzFdGIib4WCPWM4DfqPygrSMm3WdNtML1REKBNaqkQREq/tMJVniVB2HGEQfgw2Sa n88Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RiACEpoQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a25si852428pfo.234.2019.07.18.21.05.04; Thu, 18 Jul 2019 21:05:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=RiACEpoQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729347AbfGSEDN (ORCPT + 99 others); Fri, 19 Jul 2019 00:03:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:35216 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729333AbfGSEDL (ORCPT ); Fri, 19 Jul 2019 00:03:11 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B95A121882; Fri, 19 Jul 2019 04:03:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1563508990; bh=iBYGP2XBc6Wct1cGsCLA+hgQgp6l9VQMtNASFOIsf4o=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RiACEpoQ57IyVleN8cDAWE4u/uNhI2Z6gMypgF8749y1jaAnWPDRq/mVFGkHHGZrp sp0ufbUMTGkNtNZzh/jP1D1qW/h8rI7HEG5WSfC93kyzFWG3+pxCGbjyH4FNoGmtBA 4aK9WZPMrhzVfpozPgbq9RAbnLJqcR8NgZd3Ss+c= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Gen Zhang , Kees Cook , Greg Kroah-Hartman , Sasha Levin Subject: [PATCH AUTOSEL 5.1 012/141] consolemap: Fix a memory leaking bug in drivers/tty/vt/consolemap.c Date: Fri, 19 Jul 2019 00:00:37 -0400 Message-Id: <20190719040246.15945-12-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190719040246.15945-1-sashal@kernel.org> References: <20190719040246.15945-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gen Zhang [ Upstream commit 84ecc2f6eb1cb12e6d44818f94fa49b50f06e6ac ] In function con_insert_unipair(), when allocation for p2 and p1[n] fails, ENOMEM is returned, but previously allocated p1 is not freed, remains as leaking memory. Thus we should free p1 as well when this allocation fails. Signed-off-by: Gen Zhang Reviewed-by: Kees Cook Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- drivers/tty/vt/consolemap.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/drivers/tty/vt/consolemap.c b/drivers/tty/vt/consolemap.c index 7c7ada0b3ea0..814d1b7967ae 100644 --- a/drivers/tty/vt/consolemap.c +++ b/drivers/tty/vt/consolemap.c @@ -489,7 +489,11 @@ con_insert_unipair(struct uni_pagedir *p, u_short unicode, u_short fontpos) p2 = p1[n = (unicode >> 6) & 0x1f]; if (!p2) { p2 = p1[n] = kmalloc_array(64, sizeof(u16), GFP_KERNEL); - if (!p2) return -ENOMEM; + if (!p2) { + kfree(p1); + p->uni_pgdir[n] = NULL; + return -ENOMEM; + } memset(p2, 0xff, 64*sizeof(u16)); /* No glyphs for the characters (yet) */ } -- 2.20.1