Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp12418174pxu; Fri, 1 Jan 2021 21:51:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJwJHgUWc0w/7gJ+WAAgWM2ceqsNQd4HnLnXZfxprKWRzXzeFJqx789qHsjlXTgqDu47kvrc X-Received: by 2002:a50:c209:: with SMTP id n9mr61697736edf.123.1609566716673; Fri, 01 Jan 2021 21:51:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609566716; cv=none; d=google.com; s=arc-20160816; b=javzlnA4TSTX3rtszqtMQnEUwpFFtWvBtnhDFPfkWZd6Znx9TAIy+hK3a/bs1NH0// j/Aye1EHK4UsnIAdopGjdTWBJ8nmv3LKTYfuLim+WXNxE/iHNYUJUooFR6diP/jZcSjo X7Vp4LSa1Y+1B0ZqJncJQmcVmX6yqEUJgVtzaoYvneEAZAkm7hpfYJuRg1vGXdq5B9Wq 2ufeoj1DNv5y73YdEbt6jDHUy/UQYuSC/C61fCBK9+oPkOuRCOxvytplP0FXoXyJnYt2 tnm21boI6IotLFb8bu2Qh5zmI899ov3GUmU/7gBdB11ImjZMTvOdJruMTGlDtCgvYS3Y 7ScQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=QM3QR0fYo8Y2z9GE1J+QgtRP0bXwv2l+qYYRJQimbws=; b=mV1F+JiTU06qNn4ujWxZILSvAPeZAwcLNlZsOfg97B9mRcEW6fL3oQaPVNKXu1fvYC 5ZJ5XvIbJcUZBE7i3A+dizB5XlzLILBPzEfcoKgWeIaVyC1bhpKm5dpSFKcDxvYPj/Uo zV4CqVLQa6cDVuUbp1MCnURoAh6Uy6ks9KpCfA02uV3+CL8KKYS3C9/dMUPYo+5tHdfB jn/8jdsMLaNvUktgu3s2ZqRJldGu5vhD7gq6RGYWQv5OkeTJMz2i0DaXyNIWOcGBQa+Z 7v2zPiuxba1RzAu2RD2P+BB0AapekXRi3rK9pwfJrqtaueI/nzpTFz0GRLcGkAjxdqpI Nnmg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w8si24685372ejv.203.2021.01.01.21.51.12; Fri, 01 Jan 2021 21:51:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727323AbhABFtB (ORCPT + 99 others); Sat, 2 Jan 2021 00:49:01 -0500 Received: from mail.zju.edu.cn ([61.164.42.155]:8832 "EHLO zju.edu.cn" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725827AbhABFtA (ORCPT ); Sat, 2 Jan 2021 00:49:00 -0500 Received: from localhost.localdomain (unknown [10.192.85.18]) by mail-app2 (Coremail) with SMTP id by_KCgCXz3wMCfBfFuJJAA--.62532S4; Sat, 02 Jan 2021 13:47:59 +0800 (CST) From: Dinghao Liu To: dinghao.liu@zju.edu.cn, kjlu@umn.edu Cc: Marcel Holtmann , Johan Hedberg , Luiz Augusto von Dentz , Venkata Lakshmi Narayana Gubba , Balakrishna Godavarthi , linux-bluetooth@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] Bluetooth: hci_qca: Fix memleak in qca_controller_memdump Date: Sat, 2 Jan 2021 13:47:55 +0800 Message-Id: <20210102054755.21069-1-dinghao.liu@zju.edu.cn> X-Mailer: git-send-email 2.17.1 X-CM-TRANSID: by_KCgCXz3wMCfBfFuJJAA--.62532S4 X-Coremail-Antispam: 1UD129KBjvdXoW7XrWxZr4rCr1DWryDJrWrXwb_yoWfGFX_C3 Z3uFy7Ar1UGr1Yy3WjgF45urySyan8ur1vg3Waq34fW39xZa47WryjqF98Gr1fWr1UGrsx A3yDCFyrAr1UAjkaLaAFLSUrUUUUUb8apTn2vfkv8UJUUUU8Yxn0WfASr-VFAUDa7-sFnT 9fnUUIcSsGvfJTRUUUb2AFc2x0x2IEx4CE42xK8VAvwI8IcIk0rVWrJVCq3wAFIxvE14AK wVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK021l84ACjcxK6xIIjxv20x vE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26r4UJVWxJr1l84ACjcxK6I8E 87Iv67AKxVW0oVCq3wA2z4x0Y4vEx4A2jsIEc7CjxVAFwI0_GcCE3s1le2I262IYc4CY6c 8Ij28IcVAaY2xG8wAqx4xG64xvF2IEw4CE5I8CrVC2j2WlYx0E2Ix0cI8IcVAFwI0_Jr0_ Jr4lYx0Ex4A2jsIE14v26r1j6r4UMcvjeVCFs4IE7xkEbVWUJVW8JwACjcxG0xvY0x0EwI xGrwACjI8F5VA0II8E6IAqYI8I648v4I1l42xK82IYc2Ij64vIr41l42xK82IY6x8ErcxF aVAv8VW8uw4UJr1UMxC20s026xCaFVCjc4AY6r1j6r4UMI8I3I0E5I8CrVAFwI0_Jr0_Jr 4lx2IqxVCjr7xvwVAFwI0_JrI_JrWlx4CE17CEb7AF67AKxVWUtVW8ZwCIc40Y0x0EwIxG rwCI42IY6xIIjxv20xvE14v26r1j6r1xMIIF0xvE2Ix0cI8IcVCY1x0267AKxVWUJVW8Jw CI42IY6xAIw20EY4v20xvaj40_WFyUJVCq3wCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY 6I8E87Iv6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x0JUdHUDUUUUU= X-CM-SenderInfo: qrrzjiaqtzq6lmxovvfxof0/1tbiAg0IBlZdtRuRfAASsb Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When __le32_to_cpu() fails, qca_memdump should be freed just like when vmalloc() fails. Fixes: d841502c79e3f ("Bluetooth: hci_qca: Collect controller memory dump during SSR") Signed-off-by: Dinghao Liu --- drivers/bluetooth/hci_qca.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/drivers/bluetooth/hci_qca.c b/drivers/bluetooth/hci_qca.c index 4a963682c702..5dbcb7c42b80 100644 --- a/drivers/bluetooth/hci_qca.c +++ b/drivers/bluetooth/hci_qca.c @@ -1024,7 +1024,9 @@ static void qca_controller_memdump(struct work_struct *work) dump_size = __le32_to_cpu(dump->dump_size); if (!(dump_size)) { bt_dev_err(hu->hdev, "Rx invalid memdump size"); + kfree(qca_memdump); kfree_skb(skb); + qca->qca_memdump = NULL; mutex_unlock(&qca->hci_memdump_lock); return; } -- 2.17.1