lib/bpf: Don't leak fp in bpf_find_mntpt()
If fopen() succeeded but len != PATH_MAX, the function leaks the open FILE pointer. Fix this by checking len value before calling fopen(). Signed-off-by: Phil Sutter <phil@nwl.cc> Acked-by: Daniel Borkmann <daniel@iogearbox.net>
This commit is contained in:
parent
6e33f7b0f6
commit
c3724e4bc3
|
|
@ -537,8 +537,11 @@ static const char *bpf_find_mntpt(const char *fstype, unsigned long magic,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (len != PATH_MAX)
|
||||||
|
return NULL;
|
||||||
|
|
||||||
fp = fopen("/proc/mounts", "r");
|
fp = fopen("/proc/mounts", "r");
|
||||||
if (fp == NULL || len != PATH_MAX)
|
if (fp == NULL)
|
||||||
return NULL;
|
return NULL;
|
||||||
|
|
||||||
while (fscanf(fp, "%*s %" textify(PATH_MAX) "s %99s %*s %*d %*d\n",
|
while (fscanf(fp, "%*s %" textify(PATH_MAX) "s %99s %*s %*d %*d\n",
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue