Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2397207imu; Thu, 24 Jan 2019 12:04:09 -0800 (PST) X-Google-Smtp-Source: ALg8bN4SIQ6dZJV6bB9eiMoXkabosJueNypwgz5jgtSJcXkTfO2yovLo+/PUz27+dx8uMUNqmwX2 X-Received: by 2002:a17:902:9a81:: with SMTP id w1mr7597003plp.19.1548360249130; Thu, 24 Jan 2019 12:04:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548360249; cv=none; d=google.com; s=arc-20160816; b=wjwuGCNi4/upAivsQy70s12nyi7BTPlYjZwr/Qv5q2YuiU2/sGY8TVwP3TTSYSb9GQ kG9Q4BKDoQ0WssnBwBr0dEqo+QjomqnBsMgEepI2p22vnQIVsIghejORcilrDU218PVF oE7Xm+fCAjFC7hVIGnr7gcWC8L9Xe3c1635jY++xkYnsK8BaRLJI4wd/nQcLD5XEK/CV Os0ATZ/d5Be097W2KaycUbfFtQ3wm0F7rhE3mGlXvtwOVoRSEIYwuK1ztJ0sdLuPEIRU pRlDdAi5wU8M4cZSndXPuRyHKi+Z/dWPq1SY7aQ+4z/pyWxTZ5eLM+OPD1KKiT8GLNxk oNaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rxakekq6fI9RrFB/GREXtB2/sszmafTgUzlXohTBiSk=; b=sln2D3jwwwyZ5+9QUdhENVGf+3W0Bsf0Q3vKLa6ITwAd+Y/s3jSSrcKq45hQ/EGpzO pqYkHr/l1jWyOZpwz2KVN/fk3oWb5XNLrOsUjSlMuT/KfSKOPBAdtq6862oAz0m+HSb/ RS+2GrF8k5aF/skFD041W+29gD+5YbPhvcToKXFSrtt7BeuW5qUlr2tA39vue0kA1fby G0xMPAmtBCa05MTMM3kBBktTbAmEBRXmXGrRlgqyd3+qOx+c6/O7kWSh9WSSUh+hOrHk /OU6LAnBt9yoa0Uv1xSb510PNdoQkMsS3PN2GZcml93JRV7SkZ3RQ7z03JtKMh04qCja 3kdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qU19Yqz2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 66si4161025plc.125.2019.01.24.12.03.54; Thu, 24 Jan 2019 12:04:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=qU19Yqz2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731804AbfAXTcP (ORCPT + 99 others); Thu, 24 Jan 2019 14:32:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:60124 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731796AbfAXTcN (ORCPT ); Thu, 24 Jan 2019 14:32:13 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 73E6421902; Thu, 24 Jan 2019 19:32:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1548358333; bh=Edkd26yAWGPzQS4n6hg2hSNAovP0XCc09AXja3F45JU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=qU19Yqz2Ho9W+CjnIRrTeLvidDWOhGRbKOdNSmi0xpm8NuwOtV35xZYTiv67T+kQu S72SIY1ShrlzmnTj05Dfvilm4ZnIyunCkFJydUni30s11bM0NHOa4cCMqX3lWurA0n t1sk8ONR4A0olMdQofihiQ1nvc+Lrv8CxydjDUVY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Masahiro Yamada , Sasha Levin Subject: [PATCH 4.14 34/63] kconfig: fix memory leak when EOF is encountered in quotation Date: Thu, 24 Jan 2019 20:20:23 +0100 Message-Id: <20190124190159.068642567@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190124190155.176570028@linuxfoundation.org> References: <20190124190155.176570028@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit fbac5977d81cb2b2b7e37b11c459055d9585273c ] An unterminated string literal followed by new line is passed to the parser (with "multi-line strings not supported" warning shown), then handled properly there. On the other hand, an unterminated string literal at end of file is never passed to the parser, then results in memory leak. [Test Code] ----------(Kconfig begin)---------- source "Kconfig.inc" config A bool "a" -----------(Kconfig end)----------- --------(Kconfig.inc begin)-------- config B bool "b\No new line at end of file ---------(Kconfig.inc end)--------- [Summary from Valgrind] Before the fix: LEAK SUMMARY: definitely lost: 16 bytes in 1 blocks ... After the fix: LEAK SUMMARY: definitely lost: 0 bytes in 0 blocks ... Eliminate the memory leak path by handling this case. Of course, such a Kconfig file is wrong already, so I will add an error message later. Signed-off-by: Masahiro Yamada Signed-off-by: Sasha Levin --- scripts/kconfig/zconf.l | 2 ++ 1 file changed, 2 insertions(+) diff --git a/scripts/kconfig/zconf.l b/scripts/kconfig/zconf.l index 6534dc5ac803..0c7800112ff5 100644 --- a/scripts/kconfig/zconf.l +++ b/scripts/kconfig/zconf.l @@ -191,6 +191,8 @@ n [A-Za-z0-9_-] } <> { BEGIN(INITIAL); + yylval.string = text; + return T_WORD_QUOTE; } } -- 2.19.1