Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp879498yba; Thu, 18 Apr 2019 11:06:13 -0700 (PDT) X-Google-Smtp-Source: APXvYqwkG6aLcASqHZxu8fl1jkx9ilu9wAb25vX+b7fgjXxjvT08MGrrgmAMLVXs8xdku0Pcm6vX X-Received: by 2002:a62:6444:: with SMTP id y65mr97207651pfb.56.1555610773788; Thu, 18 Apr 2019 11:06:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555610773; cv=none; d=google.com; s=arc-20160816; b=jMp8eWciB1N7eSlWZ9ZaG6kl6lHzQ804IrvECHqEJImpapd6g0xZ6uBtpncbqif+40 hbgCmJQ0uHeNMwlcXO96+S4QxEV1Ik/MwOTatMsPCmKOkqLns2wSssFSnlrFTnr1YfVu yIZ623ruWN5lAXPChPmdfZze7mWdNcX8D3Dc1D9ksJujh4XJbnItgfML3UUDde7bCI6h dLNIrRwomDeyi9ZGPDMNQSmefnnMgjRln2ZtCsCtdwD1wYaWsY9rYCv5s6X8iD1drTG+ k+mWmZRVKwlUwy5+l8ksDTMT+kpUzbIYAS+qI+vYpcgVxGfBeJMWqQC+E1BFfogkQ/cm 9uDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=n5Q8NjaV+dYwwhlL8LDdwXH8ViDleWeHYgzYDH11qZk=; b=B4EtRK5jyzb4kSYlWXwJpsw+pQAt/fkxcTCi5KSitRVFiqpoas3WC/Ldet+drA1Xpd wNRR4HckwHPk1UAgeaOk12dKwSj4pbMGLTMltLZBP69/Bzek0gJTDfUmasRgNvnGAQW7 C4zloxptKzNTFnsQslGJHtcbHNBovpRMqVP+zJM8NpxV2jREfNPwRw4tnmL6o4d5EtCT uMlgFTwMQiVTzD01aA0u/HeMWNhSULWgQHvN9RYKDPGLbE7FBsK6sV0V4b/v8S+w0act NUYjh59KSaBe8HS8FyTACZyXyJyR5lA+pVoQKM4LGBG31ScB0dtkw2k8n5JMECIXlPvi kRnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kAkwuJVm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a66si3206610pfb.210.2019.04.18.11.05.59; Thu, 18 Apr 2019 11:06:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kAkwuJVm; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390062AbfDRSEH (ORCPT + 99 others); Thu, 18 Apr 2019 14:04:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:32832 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391044AbfDRSEC (ORCPT ); Thu, 18 Apr 2019 14:04:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3AD77218AE; Thu, 18 Apr 2019 18:04:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555610641; bh=AIvmDoMJ+MW+8VnR42M59AVC4Yo8iRiSIjFSAjd0o2s=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kAkwuJVmwmSKdpue4Qqj22MWSin8g4UOJMi+FqYEaDFJdi3Py75H2NzB/VYLGZeh8 2kzUqKxy2P1YIIi7PU187OrKFpxBGYzn6qHR5xJ9lVntxCOlxx3i0uOiGvpVBjXsyd JN2cbmTcs+DYlIoS9ioHZn+B106YsjE+bZI5PPcg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Changbin Du , Alexei Starovoitov , Andi Kleen , Daniel Borkmann , Jiri Olsa , Namhyung Kim , Peter Zijlstra , "Steven Rostedt (VMware)" , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 4.14 28/92] perf tests: Fix memory leak by expr__find_other() in test__expr() Date: Thu, 18 Apr 2019 19:56:46 +0200 Message-Id: <20190418160432.946019988@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190418160430.325165109@linuxfoundation.org> References: <20190418160430.325165109@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit f97a8991d3b998e518f56794d879f645964de649 ] ================================================================= ==7506==ERROR: LeakSanitizer: detected memory leaks Direct leak of 13 byte(s) in 3 object(s) allocated from: #0 0x7f03339d6070 in __interceptor_strdup (/usr/lib/x86_64-linux-gnu/libasan.so.5+0x3b070) #1 0x5625e53aaef0 in expr__find_other util/expr.y:221 #2 0x5625e51bcd3f in test__expr tests/expr.c:52 #3 0x5625e51528e6 in run_test tests/builtin-test.c:358 #4 0x5625e5152baf in test_and_print tests/builtin-test.c:388 #5 0x5625e51543fe in __cmd_test tests/builtin-test.c:583 #6 0x5625e515572f in cmd_test tests/builtin-test.c:722 #7 0x5625e51c3fb8 in run_builtin /home/changbin/work/linux/tools/perf/perf.c:302 #8 0x5625e51c44f7 in handle_internal_command /home/changbin/work/linux/tools/perf/perf.c:354 #9 0x5625e51c48fb in run_argv /home/changbin/work/linux/tools/perf/perf.c:398 #10 0x5625e51c5069 in main /home/changbin/work/linux/tools/perf/perf.c:520 #11 0x7f033214d09a in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2409a) Signed-off-by: Changbin Du Cc: Alexei Starovoitov Cc: Andi Kleen Cc: Daniel Borkmann Cc: Jiri Olsa Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Steven Rostedt (VMware) Fixes: 075167363f8b ("perf tools: Add a simple expression parser for JSON") Link: http://lkml.kernel.org/r/20190316080556.3075-16-changbin.du@gmail.com Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/tests/expr.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tools/perf/tests/expr.c b/tools/perf/tests/expr.c index 01f0706995a9..9acc1e80b936 100644 --- a/tools/perf/tests/expr.c +++ b/tools/perf/tests/expr.c @@ -19,7 +19,7 @@ int test__expr(struct test *t __maybe_unused, int subtest __maybe_unused) const char *p; const char **other; double val; - int ret; + int i, ret; struct parse_ctx ctx; int num_other; @@ -56,6 +56,9 @@ int test__expr(struct test *t __maybe_unused, int subtest __maybe_unused) TEST_ASSERT_VAL("find other", !strcmp(other[1], "BAZ")); TEST_ASSERT_VAL("find other", !strcmp(other[2], "BOZO")); TEST_ASSERT_VAL("find other", other[3] == NULL); + + for (i = 0; i < num_other; i++) + free((void *)other[i]); free((void *)other); return 0; -- 2.19.1