Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp5137984pxj; Wed, 9 Jun 2021 10:00:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz07oKDSP06hwx7klwrzC31d5c1T4GUEgkWvqK18ZtzKxvZ5eHNCZswjpEhLxI8wZYV/0r/ X-Received: by 2002:a17:906:e01:: with SMTP id l1mr835046eji.280.1623258020520; Wed, 09 Jun 2021 10:00:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623258020; cv=none; d=google.com; s=arc-20160816; b=AfQcRKeetUXZB1sgiHXk+bG/6XwICrSfNDXx0xnmnLakvIZ9qQOXx3FdUi9pY4J2w2 h2KNXQgnZAYTPwPOSVf8CbKLdYTCoLCdWMX4ePDLAAWBZeqjhWkUb66hOVb07d4KAQs3 hOYqW658S+21eCjN1pj28KHQKqnAounMqjK51zLdCuJtV8SBWtMPfsrFs1XuGaHTpekm wgUZkFj2nCu7OakjbqXZQSmbExJDIYMKVjVmli2x+WZ932xWwvVWQgN1Ic8DOXjVnH6I B+7Y+pjnO4fFcyb9+ydTTkfFyX9Txy5BakvIwyUFrB3wL4lAGDvvZM9ZtGnqVDukYIg2 M/2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=uVgZoRO1aKnahUqyjDPzyphebgzUacysdZ2smy7vuKE=; b=aL42rY5MaQaYnwz5YnhvQgWzssTj6v1pFRjf9Sxk/uXiOEeay649YCPHS/qMm+Qi/0 B9cB0vILpsg5TasiSruDl17SD3GWGGIWGFOoVbYtkKtzBdxBa9wLeN+px1RWfc6cd8dr dW8QFcZSrlFG8h4UpBf2pUff2/Cn1XasYpnA0gs1DOwNf2G3X0+/x0DpunvdUNoisKAe cXw0+0LncaPzj37zfuIWZec7g9P5nzSMpGIONlNHareaFKoF2GyhhKZDeJ63YFsT4I8Q vmJWHVnpPxG5rv27xEL76dfBhCj4Nr6L4UHJrFpfPWF1T6c8GS7c+2Y5lBKOB3hlFFca 59Ww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=FYdMVv5i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jx12si299083ejc.502.2021.06.09.09.59.54; Wed, 09 Jun 2021 10:00:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=FYdMVv5i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233966AbhFIA1d (ORCPT + 99 others); Tue, 8 Jun 2021 20:27:33 -0400 Received: from linux.microsoft.com ([13.77.154.182]:55024 "EHLO linux.microsoft.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233937AbhFIA1b (ORCPT ); Tue, 8 Jun 2021 20:27:31 -0400 Received: from sequoia.work.tihix.com (162-237-133-238.lightspeed.rcsntx.sbcglobal.net [162.237.133.238]) by linux.microsoft.com (Postfix) with ESMTPSA id 76A1A20B7188; Tue, 8 Jun 2021 17:25:36 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 76A1A20B7188 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1623198337; bh=uVgZoRO1aKnahUqyjDPzyphebgzUacysdZ2smy7vuKE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FYdMVv5iB1LK3Di5mjMFdiLD6SdIrjgPU2ltkdhxz9aOl+MJtT9LpoaYetDpYpT79 zPjY+7IoESwIoT68e3kdXAeA+G1TRuT6Xdg9iOtm9l7cVr52Ke0d4cebJcZwHMzmaS eScTtb7dT0H/VYMKZr4DmOUHQmxi2CBHsk11+5KY= From: Tyler Hicks To: Jens Wiklander , Allen Pais , Sumit Garg , Peter Huewe , Jarkko Sakkinen , Jason Gunthorpe , Vikas Gupta Cc: Thirupathaiah Annapureddy , Pavel Tatashin , =?UTF-8?q?Rafa=C5=82=20Mi=C5=82ecki?= , op-tee@lists.trustedfirmware.org, linux-integrity@vger.kernel.org, bcm-kernel-feedback-list@broadcom.com, linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 1/7] optee: Fix memory leak when failing to register shm pages Date: Tue, 8 Jun 2021 19:23:20 -0500 Message-Id: <20210609002326.210024-2-tyhicks@linux.microsoft.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20210609002326.210024-1-tyhicks@linux.microsoft.com> References: <20210609002326.210024-1-tyhicks@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Free the previously allocated pages when we encounter an error condition while attempting to register the pages with the secure world. Fixes: a249dd200d03 ("tee: optee: Fix dynamic shm pool allocations") Fixes: 5a769f6ff439 ("optee: Fix multi page dynamic shm pool alloc") Signed-off-by: Tyler Hicks --- drivers/tee/optee/shm_pool.c | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/drivers/tee/optee/shm_pool.c b/drivers/tee/optee/shm_pool.c index d767eebf30bd..da06ce9b9313 100644 --- a/drivers/tee/optee/shm_pool.c +++ b/drivers/tee/optee/shm_pool.c @@ -32,8 +32,10 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm, struct page **pages; pages = kcalloc(nr_pages, sizeof(pages), GFP_KERNEL); - if (!pages) - return -ENOMEM; + if (!pages) { + rc = -ENOMEM; + goto err; + } for (i = 0; i < nr_pages; i++) { pages[i] = page; @@ -44,8 +46,14 @@ static int pool_op_alloc(struct tee_shm_pool_mgr *poolm, rc = optee_shm_register(shm->ctx, shm, pages, nr_pages, (unsigned long)shm->kaddr); kfree(pages); + if (rc) + goto err; } + return 0; + +err: + __free_pages(page, order); return rc; } -- 2.25.1