[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240903185410.21144-1-riyandhiman14@gmail.com>
Date: Wed, 4 Sep 2024 00:24:10 +0530
From: Riyan Dhiman <riyandhiman14@...il.com>
To: aacraid@...rosemi.com,
James.Bottomley@...senPartnership.com,
martin.petersen@...cle.com
Cc: linux-scsi@...r.kernel.org,
linux-kernel@...r.kernel.org,
Riyan Dhiman <riyandhiman14@...il.com>
Subject: [PATCH] scsi: aacraid: Fix memory leak in open_getadapter_fib function
In the open_getadapter_fib() function, memory allocated for the fibctx structure
was not freed when copy_to_user() failed. This can lead to memory leaks as the
allocated memory remains unreferenced and cannot be reclaimed.
This patch ensures that the allocated memory for fibctx is properly
freed if copy_to_user() fails, thereby preventing potential memory leaks.
Changes:
- Added kfree(fibctx); to release memory when copy_to_user() fails.
Signed-off-by: Riyan Dhiman <riyandhiman14@...il.com>
---
drivers/scsi/aacraid/commctrl.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/drivers/scsi/aacraid/commctrl.c b/drivers/scsi/aacraid/commctrl.c
index e7cc927ed952..80838c84b444 100644
--- a/drivers/scsi/aacraid/commctrl.c
+++ b/drivers/scsi/aacraid/commctrl.c
@@ -220,6 +220,7 @@ static int open_getadapter_fib(struct aac_dev * dev, void __user *arg)
if (copy_to_user(arg, &fibctx->unique,
sizeof(fibctx->unique))) {
status = -EFAULT;
+ kfree(fibctx);
} else {
status = 0;
}
--
2.46.0
Powered by blists - more mailing lists