Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp300077pxa; Wed, 19 Aug 2020 01:24:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw+gffqKNdhPyRadnG68pF1P562Y+jhzUb91dWj29r9mFLqAZtUQWGptyP17cx+8oiYdx2T X-Received: by 2002:a17:906:496:: with SMTP id f22mr23594018eja.180.1597825455331; Wed, 19 Aug 2020 01:24:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597825455; cv=none; d=google.com; s=arc-20160816; b=dDlRN9gv4LmPtMG5n+H+I40MA05N5Tz/3pfslvdMlnO8D2cthrPYEvpsfm8drbbZUq 21KJac3XO3VvAh1BTbJlpYhQQXCfwPCaYCIhyysHXtez55Xur8GewC+q6DxUuafgK7iI j7m59koxJ7rJvxV+ke0ID/mqDX33t0Y4SBhDq4yNFSayJRbDZfIqkDBnuIUsNcGMdUFj s56NUBXbhERh++zh9Fb14nl/S11V6BqjO6e+1Fx3ZyP0U/5YktjhG0EemD0VsqSAFMb6 NlFRfiV39SWkpIHes1W6N15f+uN0uKiSz6UWYaPLsxrTVdTO8GwrAa9eiJj2SR4sbMtS tIGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=AlouBNjukRUuZVJraJCuQTw1Mm369qFKJGDCOqjaAJw=; b=vbAUlybIFQSfI+byqmS1yKi2PCtd77VCtjhqZr8WOcgz+Afi7oQmxRKUKfRc5N2o3X PBhc+xHNjnm9K6ha5pKPAffStfUPRnZ27DVY97zLq0HL+4NgLdKJz/G0/jfvlEY/o2HP wJzFMheq3tzX7djGYc3v8S9oIOxTcOJ+Tc/zcYi5GG6O5z+LPWZbkkfdcvCrZKqND3tK VJfN5AHkw6Jrxrahe9nADrCkSFp/RqNSiJ6ynYkAWqLUdRfqi7P+wjsPaANHm0N/DJG+ Q+98VRD129Qahs5jJh5UEHXf56y/DHwrSjvV/jSnOH9RL5teHsvxQ9NHLpp9KqtpTP6I yq8w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt1si20148523ejc.574.2020.08.19.01.23.51; Wed, 19 Aug 2020 01:24:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726414AbgHSIXK (ORCPT + 99 others); Wed, 19 Aug 2020 04:23:10 -0400 Received: from spam.zju.edu.cn ([61.164.42.155]:23364 "EHLO zju.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725997AbgHSIXJ (ORCPT ); Wed, 19 Aug 2020 04:23:09 -0400 Received: from localhost.localdomain (unknown [210.32.144.184]) by mail-app2 (Coremail) with SMTP id by_KCgA3OZxE4TxfMwMBAg--.43217S4; Wed, 19 Aug 2020 16:22:32 +0800 (CST) From: Dinghao Liu To: dinghao.liu@zju.edu.cn, kjlu@umn.edu Cc: Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Daniel Vetter , Rodrigo Vivi , Laurent Pinchart , Leo Li , Mahesh Kumar , dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: [PATCH] drm/crc-debugfs: Fix memleak in crc_control_write Date: Wed, 19 Aug 2020 16:22:28 +0800 Message-Id: <20200819082228.26847-1-dinghao.liu@zju.edu.cn> X-Mailer: git-send-email 2.17.1 X-CM-TRANSID: by_KCgA3OZxE4TxfMwMBAg--.43217S4 X-Coremail-Antispam: 1UD129KBjvdXoW7Jr4xJr13Gry5Kr1fury7trb_yoWfWFb_Ka 1fXrZrXrZFk34qv347Ca13ZFWS9an8XF4rXr1SkaySka17tr17WrW2gry5Xw13XF4UGryD CasrXasxZrn7CjkaLaAFLSUrUUUUUb8apTn2vfkv8UJUUUU8Yxn0WfASr-VFAUDa7-sFnT 9fnUUIcSsGvfJTRUUUb-AFc2x0x2IEx4CE42xK8VAvwI8IcIk0rVWrJVCq3wAFIxvE14AK wVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK021l84ACjcxK6xIIjxv20x vE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4UJVWxJr1l84ACjcxK6I8E 87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_GcCE3s1le2I262IYc4CY6c 8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_ Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwI xGrwACjI8F5VA0II8E6IAqYI8I648v4I1lFIxGxcIEc7CjxVA2Y2ka0xkIwI1lc2xSY4AK 67AK6r43MxAIw28IcxkI7VAKI48JMxAIw28IcVCjz48v1sIEY20_GFWkJr1UJwCFx2IqxV CFs4IE7xkEbVWUJVW8JwC20s026c02F40E14v26r1j6r18MI8I3I0E7480Y4vE14v26r10 6r1rMI8E67AF67kF1VAFwI0_Jw0_GFylIxkGc2Ij64vIr41lIxAIcVC0I7IYx2IY67AKxV WUJVWUCwCI42IY6xIIjxv20xvEc7CjxVAFwI0_Gr0_Cr1lIxAIcVCF04k26cxKx2IYs7xG 6rWUJVWrZr1UMIIF0xvEx4A2jsIE14v26r1j6r4UMIIF0xvEx4A2jsIEc7CjxVAFwI0_Gr 0_Gr1UYxBIdaVFxhVjvjDU0xZFpf9x0JUhdbbUUUUU= X-CM-SenderInfo: qrrzjiaqtzq6lmxovvfxof0/1tbiAgcLBlZdtPihowAesT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When verify_crc_source() fails, source needs to be freed. However, current code is returning directly and ends up leaking memory. Fixes: c0811a7d5befe ("drm/crc: Cleanup crtc_crc_open function") Signed-off-by: Dinghao Liu --- drivers/gpu/drm/drm_debugfs_crc.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/gpu/drm/drm_debugfs_crc.c b/drivers/gpu/drm/drm_debugfs_crc.c index 5d67a41f7c3a..3dd70d813f69 100644 --- a/drivers/gpu/drm/drm_debugfs_crc.c +++ b/drivers/gpu/drm/drm_debugfs_crc.c @@ -144,8 +144,10 @@ static ssize_t crc_control_write(struct file *file, const char __user *ubuf, source[len - 1] = '\0'; ret = crtc->funcs->verify_crc_source(crtc, source, &values_cnt); - if (ret) + if (ret) { + kfree(source); return ret; + } spin_lock_irq(&crc->lock); -- 2.17.1