Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3343675pxv; Sun, 4 Jul 2021 16:05:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz19kbKtN4AjI2U6QXUzxm3D5ajgMihLNtGA6aOmq/S05bl1c+KTmsKxwQgSMXXLHBw3Z1L X-Received: by 2002:a05:6e02:1a2a:: with SMTP id g10mr6411847ile.204.1625439953982; Sun, 04 Jul 2021 16:05:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625439953; cv=none; d=google.com; s=arc-20160816; b=TJ+YRXhg7AIjM/KcgMBKOtCu+XyQj7qg6RyKyGAe03L7JKno/FYq4JD/ABRJI2JDhK V8Cjxk2gtPs7bS8XUCkw1r/41TRZUCk7hQQo0PJKblPB2eLdNT+LbSm+ZYkzJttKT3gj iCESgV8i0ULS9qxeAH9AY594ypnkTGyRLZE2QTwoi42GWyVFJM6RpqCFG33R3QGvPcTF ih7BoqNGI9lx3twuNGFoEJCWDwGiqAA0EviWyRVl+35xmBvq6QsncDFMlhgbpcZ8EsMk GXcrGRL0P2rIUuuOlNzWzjkNYvp5SUTQZuAaj6SgoaueAzPFbM57G9ikh7fXfVlhFE93 HcDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=GMMeXPj0wfkI47drEgGHBceRKm7QcfOuIUhePF9psFo=; b=ktD+YxEdXlo+ywPtZvNxNKOw6JOz6BQ7A6CBPL7hO/oXgsyXHwcKwxdTq74UO2mmw5 VFn80wrOg6CEefQu/wcbf61iZUZ0q385NnLrkx21ePR0bxxPIo+7mXoW/pTN/aVdBS8j ZBqAWJpn37gDidUt6xQs3ceNsbfTiPm8P0HtWKn0s9zZ2FcYjY3bR3J3AfEpTANqHesi 16tQLHFDf4/BygWvGaL0rcynwar/K0Wi+m6UzP72T5wwUD2K49Gr/e8KkLBfJaHI+WES Lj+pdcGJUQUn7P2iMMfFXzUw5CPbE2zcjIGEDqQY3XUMaPbWoggS8gMQMvC+ruBAerPX 7egQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=REC3FKjj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z17si10957021jal.97.2021.07.04.16.05.42; Sun, 04 Jul 2021 16:05:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=REC3FKjj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230096AbhGDXH2 (ORCPT + 99 others); Sun, 4 Jul 2021 19:07:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:45430 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230086AbhGDXHU (ORCPT ); Sun, 4 Jul 2021 19:07:20 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 345E3613F7; Sun, 4 Jul 2021 23:04:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625439883; bh=lhb3/D/4Mn7jqL1ZwtUoDo2N41CiC20+NvwYCX7ZD9c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=REC3FKjj5FB20m2/2etwxZ1bYDPBDD72kfZz2oYkWibKFOUWtLsuL+YcwR+SVq5xQ hOX/ObF2PYxAKiS30b9jVqy9CHLrocuEopOEwItglaup4lnJMUHg1s/xSf6DzIqJ3r u1cxOJ+4kr07sfdBMD/dwIiym8gGUSIhCxyGwGQh3kw12Og3DkxSYL2kt3OEFE7klB WkEDmD17VevnHobfPzQXGqYbs0/Yb3USh3E+WpNO9iZMd+0cejDx+j1ECSAkZ4+ye6 R8KVskH8Zvoq4eVlLvPAj2D52k2Ccx2w43FEgibGVm2eQrRJdwIRd93qw0VGf00V92 O44r5CBOdgd8w== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Jay Fang , Mark Brown , Sasha Levin , linux-spi@vger.kernel.org Subject: [PATCH AUTOSEL 5.13 17/85] spi: spi-topcliff-pch: Fix potential double free in pch_spi_process_messages() Date: Sun, 4 Jul 2021 19:03:12 -0400 Message-Id: <20210704230420.1488358-17-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210704230420.1488358-1-sashal@kernel.org> References: <20210704230420.1488358-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jay Fang [ Upstream commit 026a1dc1af52742c5897e64a3431445371a71871 ] pch_spi_set_tx() frees data->pkt_tx_buff on failure of kzalloc() for data->pkt_rx_buff, but its caller, pch_spi_process_messages(), will free data->pkt_tx_buff again. Set data->pkt_tx_buff to NULL after kfree() to avoid double free. Signed-off-by: Jay Fang Link: https://lore.kernel.org/r/1620284888-65215-1-git-send-email-f.fangjian@huawei.com Signed-off-by: Mark Brown Signed-off-by: Sasha Levin --- drivers/spi/spi-topcliff-pch.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/spi/spi-topcliff-pch.c b/drivers/spi/spi-topcliff-pch.c index b8870784fc6e..8c4615b76339 100644 --- a/drivers/spi/spi-topcliff-pch.c +++ b/drivers/spi/spi-topcliff-pch.c @@ -580,8 +580,10 @@ static void pch_spi_set_tx(struct pch_spi_data *data, int *bpw) data->pkt_tx_buff = kzalloc(size, GFP_KERNEL); if (data->pkt_tx_buff != NULL) { data->pkt_rx_buff = kzalloc(size, GFP_KERNEL); - if (!data->pkt_rx_buff) + if (!data->pkt_rx_buff) { kfree(data->pkt_tx_buff); + data->pkt_tx_buff = NULL; + } } if (!data->pkt_rx_buff) { -- 2.30.2