Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp406263pxa; Wed, 19 Aug 2020 04:59:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzbIioTEywZxrwT3F0EUhg3YXwbbkkqPQDo5l54dQXNsEATJr0figPubTDhD3oc0lT/Erdb X-Received: by 2002:a05:6402:148a:: with SMTP id e10mr24171998edv.25.1597838342167; Wed, 19 Aug 2020 04:59:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597838342; cv=none; d=google.com; s=arc-20160816; b=QV/umdEHrLTOjTRPc+pjLtIkjAGbcVNN6nYyvU2gm6fjMwdSjZHLYj+IzrVfFWgz9X Bo+OPr82tBvNZ7mObzx++/3oPXurU+Mp3WHg9lVdWAg3yyoUzjC95j63CoE1vXbMW/+e 8ImVNZ4asT5MSrLMP1olrI6QBGRa+Um3aXTZgC3gBRFxNUJXuBMn8cUyAlz9Ip1x2RMy gc6RKONQiqCcC8mL5yx2Yj8VHEozwiKWH8+nfNXBtzs/V1IRH4muSgnUS0+ckmogheRX Qgm3xtmHob1Kh68/tCOzpyQ/afcXHWG21gzeajCHQMki37PihBh4yMHcGMWzMQfpsxci s5EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=X9XEpSgaOh3Fx7FJXaD3q7EyS1f+TegSmicHrZpkjJM=; b=StGBb5ewqGTFKzMoGUEPJVlHCL6qR4kI6lIr8kNdwlQYCaP1nvM/AinPlCKK54+uOx pTwT6CZomqANA4obbWM7yzFRYE4LMxsgfXVJv5NZMaO3Pf3wgPU5mIujg6i0hMIa1Gfv eRlQMaAtmrSBANrMZrNwOhGoUBzZDp+m1YnJB8LEcvZEg0E7sokD3g002z+/c7HXCTSF DChJYcntBmOqS7xfQ2shB8WJjFqX77dyKcs3MJZpVD95mWpKFzgxDulI6qS9vrNg1sEI CW2asgi7uedKKvkx5nPOHB1ZtO7FadT2ZFBT7wYDQq3LNKoBLGGgtX9NbCTUaEnAS5Kq c6tA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=f5TRPH6X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v20si3385613edl.269.2020.08.19.04.58.38; Wed, 19 Aug 2020 04:59:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass (test mode) header.i=@ideasonboard.com header.s=mail header.b=f5TRPH6X; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728264AbgHSLz5 (ORCPT + 99 others); Wed, 19 Aug 2020 07:55:57 -0400 Received: from perceval.ideasonboard.com ([213.167.242.64]:56292 "EHLO perceval.ideasonboard.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728002AbgHSLzj (ORCPT ); Wed, 19 Aug 2020 07:55:39 -0400 Received: from pendragon.ideasonboard.com (62-78-145-57.bb.dnainternet.fi [62.78.145.57]) by perceval.ideasonboard.com (Postfix) with ESMTPSA id 4277629E; Wed, 19 Aug 2020 13:55:33 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ideasonboard.com; s=mail; t=1597838133; bh=KzVb1fFBrc4D3CpXPB/y2PaHs6HIL9FLa7DoMoLBT1U=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=f5TRPH6XyEUfU9v55IuMb7bltOPaw4Ibt5/GPJo6QJNs+bqUAhG+I7+3Hu7UYx1CK TkntTuAVp7BwXttNIS5Q0GiIn9r60HWD6uDdXzi0bdUUfdbMYlQAYMYinsg6lHgOHO 35juPps5e2lCkmHrmPjGUjLqjDZYAGVk4nLnzXyA= Date: Wed, 19 Aug 2020 14:55:15 +0300 From: Laurent Pinchart To: Dinghao Liu Cc: kjlu@umn.edu, Maarten Lankhorst , Maxime Ripard , Thomas Zimmermann , David Airlie , Daniel Vetter , Rodrigo Vivi , Leo Li , Mahesh Kumar , dri-devel@lists.freedesktop.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] drm/crc-debugfs: Fix memleak in crc_control_write Message-ID: <20200819115515.GC6049@pendragon.ideasonboard.com> References: <20200819082228.26847-1-dinghao.liu@zju.edu.cn> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200819082228.26847-1-dinghao.liu@zju.edu.cn> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Dinghao, Thank you for the patch. On Wed, Aug 19, 2020 at 04:22:28PM +0800, Dinghao Liu wrote: > When verify_crc_source() fails, source needs to be freed. > However, current code is returning directly and ends up > leaking memory. > > Fixes: c0811a7d5befe ("drm/crc: Cleanup crtc_crc_open function") I think the issue was introduced in d5cc15a0c66e ("drm: crc: Introduce verify_crc_source callback"). Apart from that, Reviewed-by: Laurent Pinchart > Signed-off-by: Dinghao Liu > --- > drivers/gpu/drm/drm_debugfs_crc.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/drivers/gpu/drm/drm_debugfs_crc.c b/drivers/gpu/drm/drm_debugfs_crc.c > index 5d67a41f7c3a..3dd70d813f69 100644 > --- a/drivers/gpu/drm/drm_debugfs_crc.c > +++ b/drivers/gpu/drm/drm_debugfs_crc.c > @@ -144,8 +144,10 @@ static ssize_t crc_control_write(struct file *file, const char __user *ubuf, > source[len - 1] = '\0'; > > ret = crtc->funcs->verify_crc_source(crtc, source, &values_cnt); > - if (ret) > + if (ret) { > + kfree(source); > return ret; > + } > > spin_lock_irq(&crc->lock); > -- Regards, Laurent Pinchart