Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp222943ybl; Thu, 15 Aug 2019 16:06:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqxE61SNYzXWVkaVpb8RDbyymyVH9bo3Zta5BI2/VEJvyTvF/lPn5B5Yo8NUDyUkWQf2mdIK X-Received: by 2002:a62:2c93:: with SMTP id s141mr7818412pfs.114.1565910370108; Thu, 15 Aug 2019 16:06:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565910370; cv=none; d=google.com; s=arc-20160816; b=E5s/3JTcDY5URjgeM5JNZcdt9bKoYJtLf2LwzwjIZWYyU8lscRgvHgSAbP1kukVvj5 bTkziWXz/UGsuwDct8e0+O25uilx8eV/wLy1N4GTUlONbcDzY1UnQgHo+1I9iois/cW0 n//FxJ/MVl3mnx6tiAiSmMoiRfQ3gtmX0pTorILmFQDEy5SKlpoWqJvsWkUC+5tFCZSy KNoxJzSsvUq4nETnFLz/TKJ/AkRep23/KQyv4svPVnGKvzr2RcpkKdDLGCiST3ettnaq FQG+sa1q4WcQzsdd4PCm1MxdB4uDXZ6gBoWgmzOWc0oySXmIMIWSDz4SG0riWG7RYd4i 9nJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=8FtoZWxmjenZ99s1TgzzSkPwKWAhL+iPgH0tAhfsHxE=; b=1Ass6j1JBUviCYyxf3ZlygcxY51AxOkA0DiWA3NFGquap7dTybyUQ0SJKserZvtJjf M4kuVIU5fA3FJxv0cwF2dFQxEUm1gL3i3T3TrFwRGqs/V5nZ/5t8Y7iqvyEx7AxKX0Za 48yfONcJInoG33cVQLiicySUOzuxXvH/bmgug8tLdx1ywChfUV32XurtL1kq2Bc39dCm Yr5iWW23ZahqYpVsysc3rWRbRfMKTaJvkT0Et+aV48vMidpWS2+RzOj9aLQgIGbe+OlV NidfUzAnIr0i5L5yOuqBcwXHem94wcZLdObyFe9XieyjCnVJccJipgzkptWXhGwc/JaG Nr4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n9si2543678pgp.338.2019.08.15.16.05.54; Thu, 15 Aug 2019 16:06:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732132AbfHOUaC (ORCPT + 99 others); Thu, 15 Aug 2019 16:30:02 -0400 Received: from mail-yw1-f67.google.com ([209.85.161.67]:40724 "EHLO mail-yw1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731769AbfHOUaC (ORCPT ); Thu, 15 Aug 2019 16:30:02 -0400 Received: by mail-yw1-f67.google.com with SMTP id z64so1114575ywe.7; Thu, 15 Aug 2019 13:30:01 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=8FtoZWxmjenZ99s1TgzzSkPwKWAhL+iPgH0tAhfsHxE=; b=VyQp5e/BtP4p0yqJjVL59nIssRaXIAKtJurk0Hjv+5MY5VgLivPZKB/VgRaY5L4pwv UoiyvbF4CCzq/QBErdMKYGrW8bYTat5H1H98/8tYK/hmB2aWdBAMr2V2qSeeL1vS1H6v V2oCTdbrgSPQwkO3nTbz4XQkQlYOH+967j61XkvQo5RKhUE3dTmk58uikAkWoSoHOUm7 IXmIAHjl66lrzCtBI5gQ2dq9QKRCWZXRN02RUqBoMrp45gxKt/9HornSoz1jRMxff0BR nIqbSEkNCXxUbL7Of2vFbBCvlU9ErOs/rM+t8pvnqF8hvVjQv6zD7j/kRTfC+MLQoQPu 3h5Q== X-Gm-Message-State: APjAAAXs38ucfhzcWhVan6EiTTA53H4UkNHsP9cNrzHWfjxGKcN845c1 oTry5EAH/L2YSAFnanVSO1c= X-Received: by 2002:a81:ae55:: with SMTP id g21mr4533904ywk.222.1565901001047; Thu, 15 Aug 2019 13:30:01 -0700 (PDT) Received: from localhost.localdomain (24-158-240-219.dhcp.smyr.ga.charter.com. [24.158.240.219]) by smtp.gmail.com with ESMTPSA id u14sm836257ywg.67.2019.08.15.13.29.59 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 15 Aug 2019 13:29:59 -0700 (PDT) From: Wenwen Wang To: Wenwen Wang Cc: Inaky Perez-Gonzalez , linux-wimax@intel.com (supporter:INTEL WIRELESS WIMAX CONNECTION 2400), "David S. Miller" , netdev@vger.kernel.org (open list:NETWORKING DRIVERS), linux-kernel@vger.kernel.org (open list) Subject: [PATCH v2] wimax/i2400m: fix a memory leak bug Date: Thu, 15 Aug 2019 15:29:51 -0500 Message-Id: <1565900991-3573-1-git-send-email-wenwen@cs.uga.edu> X-Mailer: git-send-email 2.7.4 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In i2400m_barker_db_init(), 'options_orig' is allocated through kstrdup() to hold the original command line options. Then, the options are parsed. However, if an error occurs during the parsing process, 'options_orig' is not deallocated, leading to a memory leak bug. To fix this issue, free 'options_orig' before returning the error. Signed-off-by: Wenwen Wang --- drivers/net/wimax/i2400m/fw.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/drivers/net/wimax/i2400m/fw.c b/drivers/net/wimax/i2400m/fw.c index e9fc168..489cba9 100644 --- a/drivers/net/wimax/i2400m/fw.c +++ b/drivers/net/wimax/i2400m/fw.c @@ -351,13 +351,15 @@ int i2400m_barker_db_init(const char *_options) } result = i2400m_barker_db_add(barker); if (result < 0) - goto error_add; + goto error_parse_add; } kfree(options_orig); } return 0; +error_parse_add: error_parse: + kfree(options_orig); error_add: kfree(i2400m_barker_db); return result; -- 2.7.4