Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp2988116ybg; Mon, 28 Oct 2019 05:45:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxMP34mVPQn2OQ83hTxr+Wo7YWfXeHY7x1eYTHH7+UwGlwsenaAdqcsLM1O0ioFBk4tEqG4 X-Received: by 2002:a05:6402:1349:: with SMTP id y9mr19137729edw.74.1572266723988; Mon, 28 Oct 2019 05:45:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572266723; cv=none; d=google.com; s=arc-20160816; b=SyLFbKcCqsFPOpNPeINIkMTyL2sdlg4KLSaVZtNlck3Lw03IgS8ZmPa5OxfJE7zeuI soOBSQkKC5403JPl4wn2D80fFte8lGmO8xdErLkqBHlevkYqoFBUOkxPDJa0q+th3VYb wI8sA9uWdCf1Dail8NWAb5UDAwV+gAqSG60kNjP+BoH4AOAevHNJzIoiGptikNrhE0Pn k7pYQA9OM3veC2x8LDGTDRbqpNT0sB9KBbhuLlgh7akvVVtqC8w4yEZvmDYmGGdMi0ac jNdN5mmz4v+SVcEyYnOqzjHWvh1likE3t09zenTqEneIRP33uUPv+vy3v5uWF/iDr3mo OXZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=7DYP3mf5trvdEkZt+GbKoZBQ1gyRxJLjgb9BF7Iarf4=; b=socnACbk7JvxM68kcg7g8yurGq7wPwbfBqP2q3QmNSx5EX+ye7hJwoHTuQSb55HAc7 hwJmgmdMfi8J9ps8UnRpEH4boiF4aMtWCS0MwP270KPw5TLxahbh6A1+x7aJXsnziwjh AoHSA9uyM4ltiei39e+DSYlIgkcfUwz53EijhOUCzwYQzckB2hpdUrQV0zTh+C+v0F6g OJ3lJ5myy1ho8U7Bj6+uVxLje8snLMlMB+K8g86T5+lfzg3MR36wih63MTnmuvKUKbqI sLlHHA0rlUCOSdGHqNgYTOAFa9I0dHk9MGdHBlKdIuZTg6/njsQRqai07Dka6FuUiuZb +YoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si5888807ejt.380.2019.10.28.05.45.00; Mon, 28 Oct 2019 05:45:23 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729252AbfJ1Brp (ORCPT + 99 others); Sun, 27 Oct 2019 21:47:45 -0400 Received: from mga01.intel.com ([192.55.52.88]:5308 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727923AbfJ1Bro (ORCPT ); Sun, 27 Oct 2019 21:47:44 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 27 Oct 2019 18:47:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,238,1569308400"; d="scan'208";a="224494254" Received: from rmullina-mobl.amr.corp.intel.com (HELO [10.255.229.12]) ([10.255.229.12]) by fmsmga004.fm.intel.com with ESMTP; 27 Oct 2019 18:47:42 -0700 Subject: Re: [PATCH] ASoC: SOF: Fix memory leak in sof_dfsentry_write To: Navid Emamdoost Cc: emamd001@umn.edu, kjlu@umn.edu, smccaman@umn.edu, Liam Girdwood , Mark Brown , Jaroslav Kysela , Takashi Iwai , Ranjani Sridharan , Greg Kroah-Hartman , Wei Yongjun , alsa-devel@alsa-project.org, linux-kernel@vger.kernel.org References: <20191027194856.4056-1-navid.emamdoost@gmail.com> From: Pierre-Louis Bossart Message-ID: <4d08ed12-48fa-ed7f-3988-8d040c64acb1@linux.intel.com> Date: Sun, 27 Oct 2019 20:47:42 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.1.2 MIME-Version: 1.0 In-Reply-To: <20191027194856.4056-1-navid.emamdoost@gmail.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/27/19 2:48 PM, Navid Emamdoost wrote: > In the implementation of sof_dfsentry_write() memory allocated for > string is leaked in case of an error. Go to error handling path if the > d_name.name is not valid. > > Fixes: 091c12e1f50c ("ASoC: SOF: debug: add new debugfs entries for IPC flood test") > Signed-off-by: Navid Emamdoost Acked-by: Pierre-Louis Bossart > --- > sound/soc/sof/debug.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/sound/soc/sof/debug.c b/sound/soc/sof/debug.c > index 54cd431faab7..5529e8eeca46 100644 > --- a/sound/soc/sof/debug.c > +++ b/sound/soc/sof/debug.c > @@ -152,8 +152,10 @@ static ssize_t sof_dfsentry_write(struct file *file, const char __user *buffer, > */ > dentry = file->f_path.dentry; > if (strcmp(dentry->d_name.name, "ipc_flood_count") && > - strcmp(dentry->d_name.name, "ipc_flood_duration_ms")) > - return -EINVAL; > + strcmp(dentry->d_name.name, "ipc_flood_duration_ms")) { > + ret = -EINVAL; > + goto out; > + } > > if (!strcmp(dentry->d_name.name, "ipc_flood_duration_ms")) > flood_duration_test = true; >