Received: by 10.192.165.156 with SMTP id m28csp1736327imm; Sat, 14 Apr 2018 05:21:00 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/ZgXqZtFMg4EnKWdrO+XO5pJLFuqWe5ZJLWD06c7GhcJX4b3Oh65WM1/Q0PMvOFz7jlbIb X-Received: by 2002:a17:902:228:: with SMTP id 37-v6mr8570563plc.141.1523708460810; Sat, 14 Apr 2018 05:21:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523708460; cv=none; d=google.com; s=arc-20160816; b=BjwtrBtHtQtk/tZnr7H/24ae0JnTZ3cn5vVdzO7dZR9Dx4S+8pE9uvbZRHybCe5eS3 ZjtQK1/i/JO7+LQIblq5HmCw4IXxl7m+Dm3pESttzBSDAfAITix5mcdHfNkIs5zc3H0P Mdg1WEJGv+Zh+1aOslC4Ayc4kVmJtwUgG/la6YtHtP1aO3FDuOPzqPdJGu4OMmN4D3EV LE1l/jOCdDbKelrg63Alheu7HhUVH66+0z/s4MAKW0V9gmimkaBV9kk4jeHEbmvE+fB9 qafMG7E7RGRqvZaAuT7bp6MV6XcwB+1vJlek4hFinNqPET0pMEIammTycJ3pl0AGaFN+ IBtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=zxtBnQ0BLRSicPnCjaVvZyxAXMNMt3ishLQ+w90Zj/Q=; b=yHrFGfxYiSlK1m6n5v0sXH/EpMMnMrMSa5pG85QIZNzMGSL0VZlpSt6gmsb5qPS/YY Bt36shu3msSvJgK/CaDGNS5KMBMchpfRnOGV/NutQUrC1BgnInkPHo2MZUuSJo0CtE0W afrQEFBSIkDX6pk7/c4PGVQ8Xyj8CE0ZQeHTBtuB8kYvhnkBosyfH1yc8FmhC6UkGBCw ur3q5nEvIZ48fwNTZg5r2EFie17XRlTbaX8lacn2ybayFdoklILWBqFFRMioX1rV0wJQ r5AJ0SK7GMatgI9MaWAgQsfT7GWhzFF4MKL7x+H8iNlCOc4Gau5MAgC3PKPU0Ecba88m M/4w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q1si6022364pgr.455.2018.04.14.05.20.46; Sat, 14 Apr 2018 05:21:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751144AbeDNMT1 (ORCPT + 99 others); Sat, 14 Apr 2018 08:19:27 -0400 Received: from mout.gmx.net ([212.227.17.22]:42481 "EHLO mout.gmx.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750883AbeDNMTZ (ORCPT ); Sat, 14 Apr 2018 08:19:25 -0400 Received: from localhost.localdomain ([122.225.81.134]) by mail.gmx.com (mrgmx102 [212.227.17.174]) with ESMTPSA (Nemesis) id 0MTeVY-1eyQBN33cu-00QQ51; Sat, 14 Apr 2018 14:19:22 +0200 From: Chengguang Xu To: ooo@electrozaur.com Cc: linux-kernel@vger.kernel.org, Chengguang Xu Subject: [PATCH] exofs: fix potential memory leak in mount option parsing Date: Sat, 14 Apr 2018 20:19:08 +0800 Message-Id: <1523708348-683-1-git-send-email-cgxu519@gmx.com> X-Mailer: git-send-email 1.8.3.1 X-Provags-ID: V03:K1:/jlOD7RWLsFf0yuRpYqlxx9UCvVwx2n4dkU3O2/4EzrroSFyFTP 7q7Gnw2X03XKRTsUfK09yO4ys3390D9Xl97Y4G0GFqx2hRGJkWXATF6dCEXxN/lTQNZWKUn MJuSiOEMKAm1YDZZ5LdsqHTro7X5/UKsfIwc2fo1gO7lFsb/CjTanah2dCVCIoolf/fQ9OA 5MVXsG34DVtXN8uJuKtVw== X-UI-Out-Filterresults: notjunk:1;V01:K0:okHqiABKilc=:a3LQdyDfOBgCi/pBxZBTBU Tgci1JzASmPqYxYnzCUmYTdg9L6E6h0hiv6jXbYLCFGkyM0bK0nvLYOmB0rpHIdA6IEk++tPI ED+D9kWTnwcLFdQtByjDBDCDP3X8SrXSXNgw45ytOCSXUhePUp2X+ZSWUlkpKivehOe2mEYw9 k476D0JBpRfnY0xtZ6iuDRJPWLmQ5fV8ELWRwNEJ9NdMAX2mH/UVhVZhQUaj84tkwBzbc9YE5 evDNdhl2Cqu0aI0/arjYmu2tJjh+5t67dmNraiGidiA2TVuV8CNfVqy3WSs+H6PIYrcugSaPM 2fRbXEk5LwtSefh4V1d427haMjer4aiQELyYObxhIWl3Wt7wyugI2WXaH8FEpiJ8qVymLDy4y kMesFcgp+Bd/9D5LkvaXzvpzAZcxivVKFolPEttDZKfEB1N+bQa3K5cvZzfG+RdjNo4gfDUcC FrWiCQXVRLaD6amR85rwragWLBffDMLTwAlMfIZJutfwhwU9sucse9tNeRtyP/u3CUMoaGGQ3 kH4SV4yuX0icMuRNQIiSuEdivtwQwfa7xpnRCBx2fss/PHG7IqaJSoLahF/x/VOUdPGK1VyOH uPEfAYvQZRdp48MMrq7jAwmQrpbD8ewmdwSX37OAORm78N2kv+Hiqm7qdu47EfTCdVvIYZP6s UnIO3LyUENkNDxW2jy2+SMtjAHskVklEOoCfCaicaLv7WlHics+BqYsynCSgd0pcp9+mhOKlP tipkNvIiCF91p/JlkOXYNl3In51un82Fb4RtU5iAwXhm1epMPdtigrAAzMOJyOahNQuGuF/bh C6EltcY91Y1+PTvMF+pbuciakrQ9w== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When specifying string type mount option several times in a mount, current option parsing may cause memory leak. Hence, call kfree for previous one in this case. Signed-off-by: Chengguang Xu --- fs/exofs/super.c | 1 + 1 file changed, 1 insertion(+) diff --git a/fs/exofs/super.c b/fs/exofs/super.c index 179cd5c..106b818 100644 --- a/fs/exofs/super.c +++ b/fs/exofs/super.c @@ -101,6 +101,7 @@ static int parse_options(char *options, struct exofs_mountopt *opts) token = match_token(p, tokens, args); switch (token) { case Opt_name: + kfree(opts->dev_name); opts->dev_name = match_strdup(&args[0]); if (unlikely(!opts->dev_name)) { EXOFS_ERR("Error allocating dev_name"); -- 1.8.3.1