sound/soc/codecs/sma1307.c | 2 -- 1 file changed, 2 deletions(-)
A previous change added NULL checks and cleanup for allocation
failures in sma1307_setting_loaded().
However, the cleanup for mode_set entries is wrong. Those entries are
allocated with devm_kzalloc(), so they are device-managed resources and
must not be freed with kfree(). Manually freeing them in the error path
can lead to a double free when devres later releases the same memory.
Drop the manual kfree() loop and let devres handle the cleanup.
Fixes: 0ec6bd16705fe ("ASoC: sma1307: Add NULL check in sma1307_setting_loaded()")
Cc: stable@vger.kernel.org
Signed-off-by: Guangshuo Li <lgs201920130244@gmail.com>
---
sound/soc/codecs/sma1307.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/sound/soc/codecs/sma1307.c b/sound/soc/codecs/sma1307.c
index 4bb59e5c0891..3a01aca17e75 100644
--- a/sound/soc/codecs/sma1307.c
+++ b/sound/soc/codecs/sma1307.c
@@ -1759,8 +1759,6 @@ static void sma1307_setting_loaded(struct sma1307_priv *sma1307, const char *fil
sma1307->set.mode_size * 2 * sizeof(int),
GFP_KERNEL);
if (!sma1307->set.mode_set[i]) {
- for (int j = 0; j < i; j++)
- kfree(sma1307->set.mode_set[j]);
sma1307->set.status = false;
return;
}
--
2.43.0
On Thu, 12 Mar 2026 16:47:49 +0800, Guangshuo Li wrote:
> A previous change added NULL checks and cleanup for allocation
> failures in sma1307_setting_loaded().
>
> However, the cleanup for mode_set entries is wrong. Those entries are
> allocated with devm_kzalloc(), so they are device-managed resources and
> must not be freed with kfree(). Manually freeing them in the error path
> can lead to a double free when devres later releases the same memory.
>
> [...]
Applied to
https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next
Thanks!
[1/1] ASoC: sma1307: fix double free of devm_kzalloc() memory
https://git.kernel.org/broonie/misc/c/fe757092d232
All being well this means that it will be integrated into the linux-next
tree (usually sometime in the next 24 hours) and sent to Linus during
the next merge window (or sooner if it is a bug fix), however if
problems are discovered then the patch may be dropped or reverted.
You may get further e-mails resulting from automated or manual testing
and review of the tree, please engage with people reporting problems and
send followup patches addressing any issues that are reported if needed.
If any updates are required or you are submitting further changes they
should be sent as incremental updates against current git, existing
patches will not be replaced.
Please add any relevant lists and maintainers to the CCs when replying
to this mail.
Thanks,
Mark
On Thu, Mar 12, 2026 at 04:47:49PM +0800, Guangshuo Li wrote: > A previous change added NULL checks and cleanup for allocation > failures in sma1307_setting_loaded(). > > However, the cleanup for mode_set entries is wrong. Those entries are > allocated with devm_kzalloc(), so they are device-managed resources and > must not be freed with kfree(). Manually freeing them in the error path > can lead to a double free when devres later releases the same memory. > > Drop the manual kfree() loop and let devres handle the cleanup. You're right that we shouldn't be using kfree() here, however the settings can be reloaded via the userpace visible reset control the driver has so removing the free entirely will leake the mode strings. We need a devm_kfree() here I think.
© 2016 - 2026 Red Hat, Inc.