Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp394780rdh; Thu, 23 Nov 2023 06:53:31 -0800 (PST) X-Google-Smtp-Source: AGHT+IFtvPYPAQq6G+b9BZvAkHrest9eTx53SqYgkuXzOFAUVCovl9oN942IUo7cBBN95aYAbnW9 X-Received: by 2002:a17:902:da84:b0:1cc:c273:603 with SMTP id j4-20020a170902da8400b001ccc2730603mr6103331plx.42.1700751211084; Thu, 23 Nov 2023 06:53:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700751211; cv=none; d=google.com; s=arc-20160816; b=nolZ3pZ1bu3XIobiDTERQY6EkVrG2r5Rh6EI/G9bAAFhEO/r0Zir5JaIPREC9bEM1J zsV7vcBCYDY0+xk2HndxYzQDGgoAg07DqEV74tri/Zkzh9EYgRJRII3T8WsUtR1bXusi Zj1T3Y5wz4xJuDmshqR+hCu0h6iazfDhYu4ZBLA6hnwEuIVOfjRpGq6i4Vfvs4zM9uef bkvxhltAvwdFB/bp9cWz1AHl3z+jzl02HHMOxKSnnPvfcNi7SYpne6+96AzW0YuBYEDo oAFGwqIi6AJmgSHeI6YaOcnnjbdOdZiWOamRzS9aw2wSHv3Hz1FE5hDGp6Gyn1gz6XSS j+hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=c35u9scdiXm7Nm3DnU32SJoG5Src47DQFmxgYuaWs4Y=; fh=YVVSO+2xx2X56ZFNJ3LOeq6vgS2H5fvkPJTscAMKe9Q=; b=iY2LGEJWyY0Y/oPA4fcg/JDd4apsE6cl9KQURPXkv2/j74LCScT+v5VAdLQC/PynCn F37fdbSV/klZYFfr8ZA6kz728RfTg9ihnvo3aKRaxGHeaP42F/W/zoW37S0z85xancSV c++4c95tdQP6CrkxijGy3NR+s3AdntiJt++AxAGVcFDfT1g0EyJ+daolYqsRAOWJG+IQ ijnVOLHD9amluJZkdRR9TwZJKIRSmUk6HsXpanw9OLk9tQr354WuupFy4R7nK3COHGFb Vr+wPbaEs2r6KiyRjsK6OL8dqIwNytQyDDq97mR68xRkWfNhn5rP8Z0YmF55gX87ktpx INjA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id j15-20020a170903024f00b001c73732c1f2si1315383plh.223.2023.11.23.06.53.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Nov 2023 06:53:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id B2A6680898FE; Thu, 23 Nov 2023 06:53:25 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345933AbjKWOw6 (ORCPT + 99 others); Thu, 23 Nov 2023 09:52:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50058 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345926AbjKWOw4 (ORCPT ); Thu, 23 Nov 2023 09:52:56 -0500 Received: from mailgw.kylinos.cn (mailgw.kylinos.cn [124.126.103.232]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 40BAAD47; Thu, 23 Nov 2023 06:53:00 -0800 (PST) X-UUID: 1255a04c70214ee6bb249e348d20f2df-20231123 X-CID-O-RULE: Release_Ham X-CID-RULE: Release_Ham X-CID-O-INFO: VERSION:1.1.32,REQID:ef8221b1-476d-4f41-9062-25c916e30c71,IP:5,U RL:0,TC:0,Content:-5,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTI ON:release,TS:-15 X-CID-INFO: VERSION:1.1.32,REQID:ef8221b1-476d-4f41-9062-25c916e30c71,IP:5,URL :0,TC:0,Content:-5,EDM:0,RT:0,SF:-15,FILE:0,BULK:0,RULE:Release_Ham,ACTION :release,TS:-15 X-CID-META: VersionHash:5f78ec9,CLOUDID:8e75bc95-10ce-4e4b-85c2-c9b5229ff92b,B ulkID:23112322524517KDZH01,BulkQuantity:0,Recheck:0,SF:17|19|44|66|38|24|1 02,TC:nil,Content:0,EDM:-3,IP:-2,URL:0,File:nil,Bulk:nil,QS:nil,BEC:nil,CO L:0,OSI:0,OSA:0,AV:0,LES:1,SPR:NO,DKR:0,DKP:0,BRR:0,BRE:0 X-CID-BVR: 0 X-CID-BAS: 0,_,0,_ X-CID-FACTOR: TF_CID_SPAM_SNR,TF_CID_SPAM_FAS,TF_CID_SPAM_FSD,TF_CID_SPAM_FSI X-UUID: 1255a04c70214ee6bb249e348d20f2df-20231123 X-User: chentao@kylinos.cn Received: from vt.. [(116.128.244.169)] by mailgw (envelope-from ) (Generic MTA with TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384 256/256) with ESMTP id 570105261; Thu, 23 Nov 2023 22:52:41 +0800 From: Kunwu Chan To: tony@atomide.com, linux@armlinux.org.uk, ruslan.bilovol@ti.com Cc: linux-omap@vger.kernel.org, kunwu.chan@hotmail.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Kunwu Chan Subject: [PATCH] ARM: OMAP2+: Fix null pointer dereference and memory leak in omap_soc_device_init Date: Thu, 23 Nov 2023 22:52:37 +0800 Message-Id: <20231123145237.609442-1-chentao@kylinos.cn> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, UNPARSEABLE_RELAY autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Thu, 23 Nov 2023 06:53:26 -0800 (PST) kasprintf() returns a pointer to dynamically allocated memory which can be NULL upon failure. When 'soc_dev_attr->family' is NULL,it'll trigger the null pointer dereference issue, such as in 'soc_info_show'. And when 'soc_device_register' fails, it's necessary to release 'soc_dev_attr->family' to avoid memory leaks. Fixes: 6770b2114325 ("ARM: OMAP2+: Export SoC information to userspace") Signed-off-by: Kunwu Chan --- arch/arm/mach-omap2/id.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/arm/mach-omap2/id.c b/arch/arm/mach-omap2/id.c index 98999aa8cc0c..7f387706368a 100644 --- a/arch/arm/mach-omap2/id.c +++ b/arch/arm/mach-omap2/id.c @@ -793,11 +793,16 @@ void __init omap_soc_device_init(void) soc_dev_attr->machine = soc_name; soc_dev_attr->family = omap_get_family(); + if (!soc_dev_attr->family) { + kfree(soc_dev_attr); + return; + } soc_dev_attr->revision = soc_rev; soc_dev_attr->custom_attr_group = omap_soc_groups[0]; soc_dev = soc_device_register(soc_dev_attr); if (IS_ERR(soc_dev)) { + kfree(soc_dev_attr->family); kfree(soc_dev_attr); return; } -- 2.34.1