Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp3712658ybv; Mon, 10 Feb 2020 05:09:50 -0800 (PST) X-Google-Smtp-Source: APXvYqySouKN9fQuru4dlv+YJRsK7cAaBAEaKmTILcBKbDNjFjnBAtItYqp6af6eMELYKTREfCsJ X-Received: by 2002:aca:37c3:: with SMTP id e186mr765886oia.155.1581340190401; Mon, 10 Feb 2020 05:09:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581340190; cv=none; d=google.com; s=arc-20160816; b=fnRv2nEmxZaXqqV9SjNsf+LokegqXFjgVrjL41C0cV/02i3n7cqaUvi01ItAGeo2du Ou1R8+b3JrqF/1qzvh8MGOWrtOKCh2PZj/PAOYs2uuJZ7Vg9bqd3oiDn4ikVGDko6Wnz IYvzewN2bfjIR+LplIK7pCqA0B4R04DLpiHjbdSc/mY/HJZP5Ym4ELv8xChEW9pS4gUN wljC4onRmlHYDAsYaX+QvaOijsTFRQHiN0H7tTiN83UmfobJBQwx1W7zVoau2KxAALLl LfVT0R3LSdDE+TM7wT7NRMw3q/dar8yEjeJFH2x6wSRfc6hJNc5VZYd8T3vtvITALwD3 YsLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ii4zI6bBSKORnIB1ge1LcWIlJ3zcWvuVNqUURM8dlDQ=; b=a7H83UhYw/Qa4pAab2DxN+YJdzmkzlQYWmVyvNeVbl7f9WvnALADSjiZtFjLKqCMJ3 AhUJzwwRKAoz/iWZLhGrwTsmTBA9Dw/rcrI4VkRHqVvOmrpO7tjUu1wTeKU9F389Q5Hr t5WEcuG5+RCV99DqyBqJQGv/+ydbrx2gEGWeRm2IRXtIcIXTxaEzskKLZzA9WKCsnNKZ e8sYZ8vG/oLiqnIWBzouTh84Gf98A43DDjogsK338MN5rRPG0QEoZxUcDLPAdontKO9P MHQKP+DCqrhLzH0S1HOmZlrEcCus2eNo0NUTYA+ZQrhHXzq3Xue3zgEtVO5PH9ISzxtr VVbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VGmlA9ve; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w17si146309oiw.127.2020.02.10.05.09.38; Mon, 10 Feb 2020 05:09:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VGmlA9ve; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730489AbgBJNIf (ORCPT + 99 others); Mon, 10 Feb 2020 08:08:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:37504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728599AbgBJMjb (ORCPT ); Mon, 10 Feb 2020 07:39:31 -0500 Received: from localhost (unknown [209.37.97.194]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 06FE32051A; Mon, 10 Feb 2020 12:39:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581338371; bh=LvXdFRpwAxoMEMynk7tGA+7ZJOj3yuRAZnrI8ID4qVM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VGmlA9veT8Q+wJT+8XDYN562SqLbpoposmEYFCY3W732E+iKos1SP1wWCi93OXI5i uYR1OC52VJI3Qpk3EWuUEfTWDjl1CT5cliPsba8SM1OHHTnl5kkdhkoBqdJULTUHGc O3FXi0Q9m4flK4GctHBHEvQt7ip/e8+z1Piv0ttE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Navid Emamdoost , Kalle Valo Subject: [PATCH 5.5 042/367] brcmfmac: Fix memory leak in brcmf_usbdev_qinit Date: Mon, 10 Feb 2020 04:29:15 -0800 Message-Id: <20200210122427.887070258@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200210122423.695146547@linuxfoundation.org> References: <20200210122423.695146547@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Navid Emamdoost commit 4282dc057d750c6a7dd92953564b15c26b54c22c upstream. In the implementation of brcmf_usbdev_qinit() the allocated memory for reqs is leaking if usb_alloc_urb() fails. Release reqs in the error handling path. Fixes: 71bb244ba2fd ("brcm80211: fmac: add USB support for bcm43235/6/8 chipsets") Signed-off-by: Navid Emamdoost Signed-off-by: Kalle Valo Signed-off-by: Greg Kroah-Hartman --- drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c | 1 + 1 file changed, 1 insertion(+) --- a/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c +++ b/drivers/net/wireless/broadcom/brcm80211/brcmfmac/usb.c @@ -430,6 +430,7 @@ fail: usb_free_urb(req->urb); list_del(q->next); } + kfree(reqs); return NULL; }