diff options
author | Julia Lawall <julia@diku.dk> | 2009-12-23 07:52:31 -0500 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2009-12-23 07:52:31 -0500 |
commit | d3533d72e7478a61a3e1936956fc825289a2acf4 (patch) | |
tree | 5932e890fa8185bd792a94730725665a26a6102a /include | |
parent | a6b43e382568a49cc64291bfaddf896652d44f70 (diff) | |
download | kernel_samsung_tuna-d3533d72e7478a61a3e1936956fc825289a2acf4.zip kernel_samsung_tuna-d3533d72e7478a61a3e1936956fc825289a2acf4.tar.gz kernel_samsung_tuna-d3533d72e7478a61a3e1936956fc825289a2acf4.tar.bz2 |
ext4: Eliminate potential double free on error path
b_entry_name and buffer are initially NULL, are initialized within a loop
to the result of calling kmalloc, and are freed at the bottom of this loop.
The loop contains gotos to cleanup, which also frees b_entry_name and
buffer. Some of these gotos are before the reinitializations of
b_entry_name and buffer. To maintain the invariant that b_entry_name and
buffer are NULL at the top of the loop, and thus acceptable arguments to
kfree, these variables are now set to NULL after the kfrees.
This seems to be the simplest solution. A more complicated solution
would be to introduce more labels in the error handling code at the end of
the function.
A simplified version of the semantic match that finds this problem is as
follows: (http://coccinelle.lip6.fr/)
// <smpl>
@r@
identifier E;
expression E1;
iterator I;
statement S;
@@
*kfree(E);
... when != E = E1
when != I(E,...) S
when != &E
*kfree(E);
// </smpl>
Signed-off-by: Julia Lawall <julia@diku.dk>
Signed-off-by: "Theodore Ts'o" <tytso@mit.edu>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions