Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1535323imm; Tue, 2 Oct 2018 09:42:47 -0700 (PDT) X-Google-Smtp-Source: ACcGV63lNoP324XtmjgTazL06oCuW44N/VdcOwdrhpfCufdJ2Sq5ThcdhSh08pvm/8/MUKP/6uwX X-Received: by 2002:a63:ce56:: with SMTP id r22-v6mr13683454pgi.217.1538498567469; Tue, 02 Oct 2018 09:42:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538498567; cv=none; d=google.com; s=arc-20160816; b=RoDqPUQ4OaaEzmOCiV8M0NehxWqAPP9xxlqZSCOIoNV08vLXBCPzNUr7GmucYCzXI0 +BPCLc9Z+Hh63a7knCLCNfHbdto59u0V0RsWr47caiGpxgVHNffOUafo6NfSr/QOJ04p qQ6Oq9RFFbiQnZNKLJklQrHiJdUZAusmcjy3+id9CAsk5rWjz7Ltckoqo6OjeoMq2/rQ 6bScPGOacaMgIy4IqzIvD8lLVzKxhBaW4+9p3gSPG0KGlFbFuJGBzIlTUu+LbslqfaxY QFC22dBTkwu0G+ebLtfEtiKTCqqHgq9WW5mEzyIIZ3UQ1bnPwSMYVOYIucAzH7yqBZwi /oag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=XcgviUNZFlwqG7xr1Vm2qVIeQDMv2a8ooM/aXnmuT9k=; b=clWcQbKOQYRIqzYpeOWwezlYOQhlkhB36empwQK2K7lo15w3QdI926bOiiC3GsG/6h WDDKJ3PlEpVSN4wHMV3/4MWOKsE4gw3tazZy08Tae95AtMNJdVKJV9o0qgFCgGWrNqkE d+s//2lDGgjQTU40F2yJNKtnZq/ps55qh+xF5I4cCWX8s1fQtAB86jPVTdH/9dLcuXqG F9ZRbiO61j+UpznMFVNmDAbJSGv8vo4vx3De/mcx2TcKu1NP2wzrIv8OKYhVCsy2jQib 3dwhHv6Lr6zIIe7/CrBzdNsf68OHNjHbqzUG4eF+HdfwAwXKYjff6k12Hgf9hLIByEV7 BSnw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h63-v6si639008pfd.228.2018.10.02.09.42.32; Tue, 02 Oct 2018 09:42:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728498AbeJBWc7 (ORCPT + 99 others); Tue, 2 Oct 2018 18:32:59 -0400 Received: from mx1.redhat.com ([209.132.183.28]:49682 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728386AbeJBWc7 (ORCPT ); Tue, 2 Oct 2018 18:32:59 -0400 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.25]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 50E6E30821EC for ; Tue, 2 Oct 2018 15:48:58 +0000 (UTC) Received: from sandy.ghostprotocols.net (ovpn-112-5.gru2.redhat.com [10.97.112.5]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 3921F2010CEF; Tue, 2 Oct 2018 15:48:55 +0000 (UTC) Received: by sandy.ghostprotocols.net (Postfix, from userid 1000) id 23B722F34; Tue, 2 Oct 2018 12:48:52 -0300 (BRT) Date: Tue, 2 Oct 2018 12:48:52 -0300 From: Arnaldo Carvalho de Melo To: Sanskriti Sharma Cc: linux-kernel@vger.kernel.org, Jiri Olsa , Joe Lawrence Subject: Re: [PATCH 4/5] perf tools: avoid double free in read_event_file() Message-ID: <20181002154852.GE9457@redhat.com> References: <1538490554-8161-1-git-send-email-sansharm@redhat.com> <1538490554-8161-5-git-send-email-sansharm@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1538490554-8161-5-git-send-email-sansharm@redhat.com> X-Url: http://acmel.wordpress.com User-Agent: Mutt/1.5.20 (2009-12-10) X-Scanned-By: MIMEDefang 2.84 on 10.5.11.25 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.47]); Tue, 02 Oct 2018 15:48:58 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Tue, Oct 02, 2018 at 10:29:13AM -0400, Sanskriti Sharma escreveu: > The temporary 'buf' buffer allocated in read_event_file() may be freed > twice. Move the free() call to the common function exit point. > > Fixes the following coverity complaints: > > Error: USE_AFTER_FREE (CWE-825): > tools/perf/util/trace-event-read.c:309: double_free: Calling "free" > frees pointer "buf" which has already been freed. Thanks, applied. - Arnaldo > Signed-off-by: Sanskriti Sharma > --- > tools/perf/util/trace-event-read.c | 4 +--- > 1 file changed, 1 insertion(+), 3 deletions(-) > > diff --git a/tools/perf/util/trace-event-read.c b/tools/perf/util/trace-event-read.c > index 3dfc1db..6a0d0f2 100644 > --- a/tools/perf/util/trace-event-read.c > +++ b/tools/perf/util/trace-event-read.c > @@ -297,10 +297,8 @@ static int read_event_file(struct tep_handle *pevent, char *sys, > } > > ret = do_read(buf, size); > - if (ret < 0) { > - free(buf); > + if (ret < 0) > goto out; > - } > > ret = parse_event_file(pevent, buf, size, sys); > if (ret < 0) > -- > 1.8.3.1