diff options
author | Wenwen Wang | 2019-07-22 15:57:44 +0200 |
---|---|---|
committer | Mark Brown | 2019-07-22 18:33:38 +0200 |
commit | 45004d66f2a28d78f543fb2ffbc133e31dc2d162 (patch) | |
tree | ca55e1411f9c37fe844588b04d9d90e114109edc /.gitattributes | |
parent | ASoC: SOF: use __u32 instead of uint32_t in uapi headers (diff) | |
download | kernel-qcow2-linux-45004d66f2a28d78f543fb2ffbc133e31dc2d162.tar.gz kernel-qcow2-linux-45004d66f2a28d78f543fb2ffbc133e31dc2d162.tar.xz kernel-qcow2-linux-45004d66f2a28d78f543fb2ffbc133e31dc2d162.zip |
ASoC: dapm: fix a memory leak bug
In snd_soc_dapm_new_control_unlocked(), a kernel buffer is allocated in
dapm_cnew_widget() to hold the new dapm widget. Then, different actions are
taken according to the id of the widget, i.e., 'w->id'. If any failure
occurs during this process, snd_soc_dapm_new_control_unlocked() should be
terminated by going to the 'request_failed' label. However, the allocated
kernel buffer is not freed on this code path, leading to a memory leak bug.
To fix the above issue, free the buffer before returning from
snd_soc_dapm_new_control_unlocked() through the 'request_failed' label.
Signed-off-by: Wenwen Wang <wenwen@cs.uga.edu>
Link: https://lore.kernel.org/r/1563803864-2809-1-git-send-email-wang6495@umn.edu
Signed-off-by: Mark Brown <broonie@kernel.org>
Diffstat (limited to '.gitattributes')
0 files changed, 0 insertions, 0 deletions