Received: by 10.223.176.46 with SMTP id f43csp1815691wra; Thu, 25 Jan 2018 00:11:26 -0800 (PST) X-Google-Smtp-Source: AH8x225VEnnwiW0vgVA7tksQPWPKffQsTT5Oyb+AKNFgNpu6m31mjf5Cdx85KbjL2zrv/k+s0mtq X-Received: by 10.101.64.193 with SMTP id u1mr12612470pgp.44.1516867886545; Thu, 25 Jan 2018 00:11:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516867886; cv=none; d=google.com; s=arc-20160816; b=0rqeR5ByCYMAKFksL3s6LFwu8FVmRlhLTuO4chDMQkQjKxik0Xg8mcpk3eGv6fZDjq MxQKQE+Oe+/PvytTn7y9KaVBtSP7kA/0KglXa02DZW4hxzYdAzX2qUazpbUmdQLkKbOq qf6eo6p7hHpHCOi/49BDq1LtsOzIYjWGjYtMQQ0ZVuMcjTR6txciSnvgaPF/bhD0kPUf SBAVSd1a84ucypk6VywYtsNwLWeBJyxGV6scKJaKV5YVIqVM57SWEjlM87Tbbv0ria0d KXStMwPOBV4K/rNxUuvzZsUYytrDWZ8vvCj9kQmbhfoMA4NtnHVb3cGfzGnnvunsX0J+ Cv0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=OT4gTp8xm4BJaTUnmBQgQOWH36dU0BMXElDkiRp7Lxk=; b=TRjSduRbIH/ufNdfc0+tHCz6gTGwXgSriE99vuQrfiHwILTpqJ5eHRjyU2CP82r6Ql sI72wXjfUZzJZKG7KD1jvXmbcsbPhsZA/amXPyPYt7aGrsWfGTpvaWonO10YZkCkqFOT rzLqBDzEFYla0uAd+fLMnaFMZYlrI9XnBls+yukeq7FvMRRM1hdC/NDLJ4zYj6mLJ/aE 55/ENH0C9X0l1rf81BJkHdv0yx6LpCBBfp4BHli5rmfsBmsooOdmpJcFioXbAhsePins sR6LMgWhrxaozz8bMHnFm3aQtJ+4uvM6SVgyHJdcYGhv48l11v0mcFj99OxFgySbq2z3 7Bwg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s13-v6si1530951plp.787.2018.01.25.00.11.12; Thu, 25 Jan 2018 00:11:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751331AbeAYIJh (ORCPT + 99 others); Thu, 25 Jan 2018 03:09:37 -0500 Received: from mx2.suse.de ([195.135.220.15]:47762 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751081AbeAYIJg (ORCPT ); Thu, 25 Jan 2018 03:09:36 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id B7C32AD2D; Thu, 25 Jan 2018 08:09:34 +0000 (UTC) From: Johannes Thumshirn To: Christoph Hellwig Cc: Sagi Grimberg , Keith Busch , Linux Kernel Mailinglist , Linux NVMe Mailinglist , Dan Carpenter , Johannes Thumshirn , Roland Dreier Subject: [PATCH] nvme: don't free uuid pointer before printing it Date: Thu, 25 Jan 2018 09:09:25 +0100 Message-Id: <20180125080925.6019-1-jthumshirn@suse.de> X-Mailer: git-send-email 2.13.6 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit df351ef73789 ("nvme-fabrics: fix memory leak when parsing host ID option") fixed the leak of 'p' but in case uuid_parse() fails the memory is freed before the error print that is using it. Free it after printing eventual errors. Signed-off-by: Johannes Thumshirn Fixes: df351ef73789 ("nvme-fabrics: fix memory leak when parsing host ID option") Reported-by: Dan Carpenter Cc: Roland Dreier --- drivers/nvme/host/fabrics.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/drivers/nvme/host/fabrics.c b/drivers/nvme/host/fabrics.c index eb46967bb0d5..9cee72a80472 100644 --- a/drivers/nvme/host/fabrics.c +++ b/drivers/nvme/host/fabrics.c @@ -739,12 +739,13 @@ static int nvmf_parse_options(struct nvmf_ctrl_options *opts, goto out; } ret = uuid_parse(p, &hostid); - kfree(p); if (ret) { pr_err("Invalid hostid %s\n", p); ret = -EINVAL; + kfree(p); goto out; } + kfree(p); break; case NVMF_OPT_DUP_CONNECT: opts->duplicate_connect = true; -- 2.13.6