Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp28022ybl; Tue, 7 Jan 2020 13:25:45 -0800 (PST) X-Google-Smtp-Source: APXvYqyXpON4ygi8ghbNXAZj0ueI3LC485oWqWnAo2v4MCp4kggol0Y/s2xD8/4CNvQ3y4Ya1Xuy X-Received: by 2002:aca:4309:: with SMTP id q9mr403266oia.158.1578432344913; Tue, 07 Jan 2020 13:25:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578432344; cv=none; d=google.com; s=arc-20160816; b=cs+YcCvQPN1EQVIyus31RvedQmlfeN801Bplt4ojPo58BTPboen8dgvOG7kOSNOdaW nbBl3JrfsyRnum65ctP9f+mRG6A2Dhtkt6GSDbK6VTCCklMLCEDIjhh8vv2bi3M5Vcd3 yJqNQo0ZDdLxT7ZmeZ7MR4c7aGq9fWd+PbtCYlsuPGQlQ1CbNSGP49hcsQbflyC/oaz/ FD1MjyNaZnFGskbbh8ZHNF2AskRaWmUvDio8TJpnH87KuQU4/NX0NqbGYI6+Z2J45MhX Y9Vu413iQpUb1oixjpe+rQ3cFejvO8Hzs5jnNmeb3EMdUaUCN1SPLyN+SEO8d5kBYSs8 31RQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=oLO0ruOKh5UWk9y05zqiWy01pUIdXN+8o8E24LD8/Hk=; b=DdMcYv/mtPiEB9PS7+oz7DKJciexsEd+DZfJPaO3sRL6y6aVP8SzSOU4HYcKKxtjq5 GX3eBVeu8AJHFiXlvcB/AACoX+UAY3iGH3QvRt4hZ59SGFAobd9xmDciQTSZEOJjv0xt GEY3U4BBCjBM4rUGkbVVUOpeCRpC31b2oSoMVQf4dFlVUmFqI8E2qOJxigIk3PHgE/6Y cloAXcs390LWa5Iq/F3x2G4eTf8is931Rd9yuy73aWE47RTVjLKIdkMvVnvj+mEOvowV QbwhcpUcv6b/vtoqBeHEdkG52G8ltrk/SPquymTqDQy3ZtIBtu5Sz8W+ka6cqdg5PTDp HHUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IoLdwF6M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q9si638282oif.92.2020.01.07.13.25.31; Tue, 07 Jan 2020 13:25:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IoLdwF6M; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728642AbgAGVXx (ORCPT + 99 others); Tue, 7 Jan 2020 16:23:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:37552 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726462AbgAGVBD (ORCPT ); Tue, 7 Jan 2020 16:01:03 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2354321744; Tue, 7 Jan 2020 21:01:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578430862; bh=fc4w/mC8bD6kRjx8RwBdYsE3Ln1/hmt6IeDYS8xvlXQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IoLdwF6MoMzTUOx0JL2twoqsgvO79W+XBDbTNDO5Moga18vG7gopFkD1nD0apgdEY jT46skeRuvmTVCl8YUde52KaXQaiiIOLKYFeXWEniDk71Fk+DfFQIy58j3kZd4iqgE sW2OWp7z8ilE7loW9xIVT6caYa+YTHrVWqPxq+cc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Navid Emamdoost , Kees Cook Subject: [PATCH 5.4 090/191] pstore/ram: Fix error-path memory leak in persistent_ram_new() callers Date: Tue, 7 Jan 2020 21:53:30 +0100 Message-Id: <20200107205337.814180441@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200107205332.984228665@linuxfoundation.org> References: <20200107205332.984228665@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kees Cook commit 8df955a32a73315055e0cd187cbb1cea5820394b upstream. For callers that allocated a label for persistent_ram_new(), if the call fails, they must clean up the allocation. Suggested-by: Navid Emamdoost Fixes: 1227daa43bce ("pstore/ram: Clarify resource reservation labels") Cc: stable@vger.kernel.org Link: https://lore.kernel.org/lkml/20191211191353.14385-1-navid.emamdoost@gmail.com Signed-off-by: Kees Cook Signed-off-by: Greg Kroah-Hartman --- fs/pstore/ram.c | 2 ++ 1 file changed, 2 insertions(+) --- a/fs/pstore/ram.c +++ b/fs/pstore/ram.c @@ -588,6 +588,7 @@ static int ramoops_init_przs(const char dev_err(dev, "failed to request %s mem region (0x%zx@0x%llx): %d\n", name, record_size, (unsigned long long)*paddr, err); + kfree(label); while (i > 0) { i--; @@ -633,6 +634,7 @@ static int ramoops_init_prz(const char * dev_err(dev, "failed to request %s mem region (0x%zx@0x%llx): %d\n", name, sz, (unsigned long long)*paddr, err); + kfree(label); return err; }