Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2981824imu; Mon, 19 Nov 2018 08:57:36 -0800 (PST) X-Google-Smtp-Source: AJdET5coDLzJvsT8zMSpAx3pk2XWoSQDzzfuIKBgoIRLl2wwck7m+VreAnJXIqA1B/ZfzJILBrD9 X-Received: by 2002:a62:401:: with SMTP id 1-v6mr23310006pfe.156.1542646656466; Mon, 19 Nov 2018 08:57:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542646656; cv=none; d=google.com; s=arc-20160816; b=E2IsbtFHfWUoFf56aHHRNNf9zcJHFmj/G2dXTpunnypdCqzQUgoNCTieW2/tcmHY2J 4CWSneXWOF7OULgrP2VaQgF417wCoMAbD8UBScbvs/aWOv+YYHNOIX5PRSRGEwg8EX0g ALQz1U2zCZBRaH6qdGuR9xqgyq5xGltzooT6y/e6TmkYCrQntXiWIokxlieMquBeQWGv TdggqBguYvA/eFJV01awJRrTWNR3pfFv8bYeOdXB2dIm0JqhG0E9zzPD8vJ9p/gxoOAD fBU/zv7ms0qN+1K6dM7UCQxkCuJ9lfC3MMUqwnLck1Epok6iTF9RljKNpVbR19WlovJS NcTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kjIXFAo3yHFGyrVqwePsTt8Fwd0hmQgQbLV/8xxDypM=; b=FfdLGVPCd1trG6nIQ61DSyI7fpz4CuNxKH6MwHI33xc8JOEyB4cBDt4b5yve4f/hPS mE5U4n302bLAxkF19vZ8LsDJ76Cne0AFda6qLSa0A4aAKbkHY5vedG21XKl358DY6EQd xSDE+smd9C9azd3MQMHgLJoKO//mv3AmOk7ym1Xts3evmcr1UBdh+iAQrDGqwxJlm9kM XXSm0YmaImQG2GBKuo/p8HQjEZwcCu50IpBiARcajk9CwSihPyyZH9pqDGeW50tR5TxS 9YNYQ77LkB1sJE8RyG+hXDgiLShCKPqKSY7nyzt55f8/tYlw4on/bq1adn+L2v5YWHvP 3eNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wmHSVpNN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l11-v6si41020483plt.5.2018.11.19.08.57.21; Mon, 19 Nov 2018 08:57:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=wmHSVpNN; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404351AbeKTDU7 (ORCPT + 99 others); Mon, 19 Nov 2018 22:20:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:60542 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2403836AbeKTDU7 (ORCPT ); Mon, 19 Nov 2018 22:20:59 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A2A962145D; Mon, 19 Nov 2018 16:56:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1542646604; bh=dAk6n+LcqA5ELGLdfS+KbRUlggDwrbl3sGcm/TZaRJQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=wmHSVpNNglSWl6pFF3OnIUHLZWuvTmiteNtfWe69V3iUKXks1SsvksCiGAbfbneVt aIydTXYvSyBpLJsStY+tedb4J+u1YU4rv/CZsLo+sPpQjEk063JxgN++D1b+Br7JMj ACnl1kP6AMObw5YohjKhwrFYG8X0dSvuYul5qt6M= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sanskriti Sharma , Jiri Olsa , Joe Lawrence , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 4.4 020/160] perf tools: Free temporary sys string in read_event_files() Date: Mon, 19 Nov 2018 17:27:39 +0100 Message-Id: <20181119162632.446955754@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181119162630.031306128@linuxfoundation.org> References: <20181119162630.031306128@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sanskriti Sharma [ Upstream commit 1e44224fb0528b4c0cc176bde2bb31e9127eb14b ] For each system in a given pevent, read_event_files() reads in a temporary 'sys' string. Be sure to free this string before moving onto to the next system and/or leaving read_event_files(). Fixes the following coverity complaints: Error: RESOURCE_LEAK (CWE-772): tools/perf/util/trace-event-read.c:343: overwrite_var: Overwriting "sys" in "sys = read_string()" leaks the storage that "sys" points to. tools/perf/util/trace-event-read.c:353: leaked_storage: Variable "sys" going out of scope leaks the storage it points to. Signed-off-by: Sanskriti Sharma Reviewed-by: Jiri Olsa Cc: Joe Lawrence Link: http://lkml.kernel.org/r/1538490554-8161-6-git-send-email-sansharm@redhat.com Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- tools/perf/util/trace-event-read.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) --- a/tools/perf/util/trace-event-read.c +++ b/tools/perf/util/trace-event-read.c @@ -334,9 +334,12 @@ static int read_event_files(struct peven for (x=0; x < count; x++) { size = read8(pevent); ret = read_event_file(pevent, sys, size); - if (ret) + if (ret) { + free(sys); return ret; + } } + free(sys); } return 0; }