Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2267090ybl; Thu, 19 Dec 2019 10:42:18 -0800 (PST) X-Google-Smtp-Source: APXvYqx/ef3gkYHYksbG6rGx543qxuOvF0EnhiFREVPuV7plmu5lYHA1dhNqqOaehEMdqiz7NeGu X-Received: by 2002:a9d:be2:: with SMTP id 89mr3208743oth.101.1576780938740; Thu, 19 Dec 2019 10:42:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576780938; cv=none; d=google.com; s=arc-20160816; b=tND58tkx/PE/6JOlI1MmRu6wKPaFSAXLiNBhBCcK1dNWgUbzOa+ZMJCB+/uh9sT11q cBixCyJOwyDGFmXWxlHLt7DsrKIX260R3AdImlXgInk0ItxAROamEH7rm3EZ46KLXHBH B0dlEGxhZfek7WQ38+twYbtN2SVy1C647phI06geIeJnhM0kTyumh+1K4xr7D1/EtzKh 7UNuiSKl0bYmKJ5ZEGbArvtacxPhO7A7g8PA9NkH5zNJzC7Tsz9iJ6KahNb0wT/Tyh8x 26DjSzJEoLgoHNBHdZ1HwWRTQjCSj5TTxJsijXG/vFpEZKTknrb8D8cZ9pBQ3bRcD24b UzNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=KkViqokyb+UHREsGLJbPZea2A3sig0kmwiOlw5BiyME=; b=iRHnmZJQss16NCpM+JB5AWsOinHHaC9pqSyhEqNg4MEb959IEh7y4XgsId7SBbw+du x2KYLSEbXDLbKw2uqujG6mWB4+xUHVOSI4LSw0u6ocCIeTyrD90zz0r/bx9IpfCJkj8g Wu5iEBWOkbhBGJf9Ai1ExOWmGR/7qbv9OLOmA/oiqMqxx2XPwlEW0uhQM4EoQxsJdZZQ qkdxfeCRlELDU+qz85ihSQbEHlVoPA+IjLaPrXpuY7Fo49OB6B8SZ4R1Mej7NDsScppv RkMGwSSvG2rXf8MOUb2Ho97QZ26d/UPEyjv5sEfEZ29Zx4m9iLtwJlU58mz9K6YZp6Fv Hatg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ysspoL83; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f60si3629500otf.119.2019.12.19.10.42.06; Thu, 19 Dec 2019 10:42:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ysspoL83; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727654AbfLSSjw (ORCPT + 99 others); Thu, 19 Dec 2019 13:39:52 -0500 Received: from mail.kernel.org ([198.145.29.99]:58334 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728286AbfLSSju (ORCPT ); Thu, 19 Dec 2019 13:39:50 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4946224685; Thu, 19 Dec 2019 18:39:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576780789; bh=3TyHLECnAYyzfBaEV8UiIq2Z47lEaK7x3GlGm2MucmI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ysspoL83e6xS3JibSja+8v8hbui0+jHKDGFeGYqdjL2P+0hnD8qgnCN5iRqTFm1y/ JADWvhGIgJUcI6GPsPLnUwPLkMDCQOoQUOHK5iS4+zrANkYhdnsU6c97XywlGbGSLM Us0CqsA4eaEHGMXs3G2pmsqOgxfpa+JXvWRDPZ0c= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold , Fabien Dessenne , Hans Verkuil , Mauro Carvalho Chehab Subject: [PATCH 4.4 111/162] media: bdisp: fix memleak on release Date: Thu, 19 Dec 2019 19:33:39 +0100 Message-Id: <20191219183214.500867406@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191219183150.477687052@linuxfoundation.org> References: <20191219183150.477687052@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit 11609a7e21f8cea42630350aa57662928fa4dc63 upstream. If a process is interrupted while accessing the video device and the device lock is contended, release() could return early and fail to free related resources. Note that the return value of the v4l2 release file operation is ignored. Fixes: 28ffeebbb7bd ("[media] bdisp: 2D blitter driver using v4l2 mem2mem framework") Cc: stable # 4.2 Signed-off-by: Johan Hovold Reviewed-by: Fabien Dessenne Signed-off-by: Hans Verkuil Signed-off-by: Mauro Carvalho Chehab Signed-off-by: Greg Kroah-Hartman --- drivers/media/platform/sti/bdisp/bdisp-v4l2.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) --- a/drivers/media/platform/sti/bdisp/bdisp-v4l2.c +++ b/drivers/media/platform/sti/bdisp/bdisp-v4l2.c @@ -652,8 +652,7 @@ static int bdisp_release(struct file *fi dev_dbg(bdisp->dev, "%s\n", __func__); - if (mutex_lock_interruptible(&bdisp->lock)) - return -ERESTARTSYS; + mutex_lock(&bdisp->lock); v4l2_m2m_ctx_release(ctx->fh.m2m_ctx);