Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp67753ybp; Thu, 3 Oct 2019 10:15:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqxM2COWhaI6/L99xZ1Krw3aew/rDSYI49WdGTK5x4U9yuq9WSLOSphjjFnEj7dOcp2RUfMC X-Received: by 2002:a50:9384:: with SMTP id o4mr10698896eda.8.1570122957149; Thu, 03 Oct 2019 10:15:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570122957; cv=none; d=google.com; s=arc-20160816; b=ze23nvo22ZJrSiDbhdiM94QanSAIwhRuopY7m1VewarZ/of/RyBedMAq8h6rtwja6g QqjOe47qUOJBuhk23nPBMG/RoWEzBnXiGicQWHmRtMfc6EB6Ma7CG0XxlF4HQLq+LUqH fHqJ9axhYGV6X+ULXCilQfEApo7hWDQMAs3U5xIV/85CpWne58OiXvutmzOmakBovo6X Z4RPOq4i3bNPDTc/+hknSZFqN0hCJslWoupvKvJ5GHxpL0KnIPfnL/m3KAdXHuyea9q9 NN9pKpNWDpGqgWf/yTyi161fryTi5Oe1vLRoxEgn0Qs6by/puQWi2edhUz4mEpEzvFax k3LQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=F6lTrz3PUSkxuvU36bESmcwZiONAqTwB6fU405xz8VQ=; b=Y+MVwgGKAdg7I4rNgSIb9jeEMIsVZGpP2U74M+YjMMgpF5Zp+z9Vglq1b1JVA04wDy cc65KbId8lEuO6tmmkkOIXY7ZFdq/QEB4QTiHC4je1FAPZxz1enbPvAkEI801i4c3Une jbwy8g+6KnnNcMw8qFYpig+2wrUV/nuWs4EgxXHU1Nv5ZPD0+xLZPL5GiQ87qwE/mxUC FUEuBGK5lqA9GpVGWR1BSSOxckcZNvSNyEGefZUVjIrAs76utAd7f0Otmn3meIeQWx3L dGeCASHtom4tdq/H3Any+eUCY7/xSubX16QA3CmlEZ/kH8ubvVKwf0Ymabeam8eUK4mX mn2Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zeccw3kc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v20si1819881edq.195.2019.10.03.10.15.33; Thu, 03 Oct 2019 10:15:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zeccw3kc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404400AbfJCRMP (ORCPT + 99 others); Thu, 3 Oct 2019 13:12:15 -0400 Received: from mail.kernel.org ([198.145.29.99]:36894 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390445AbfJCQaj (ORCPT ); Thu, 3 Oct 2019 12:30:39 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0844620700; Thu, 3 Oct 2019 16:30:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1570120238; bh=SDlAYI9BhqBHRdwdkMZlPxl5JV58fBNfvFUMaH7kJuQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Zeccw3kcw059DsjUHAneiuyltUE2eFhm3/NoE7WJvAFVpLINZmn4Jh4Bvb//1zd7D 0NH/65XgDGWFSsqR4PhO7UaS9KeWGKHIMugfk8n7UIF6nONJEeHZjYdKd5UAUDGaGi djZApuC86NNTSonTMcx/sXUXufqhvL3REBqt9nkQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Gustavo A. R. Silva" , Alexander Shishkin , Andi Kleen , Jiri Olsa , Namhyung Kim , Peter Zijlstra , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 5.2 147/313] perf script: Fix memory leaks in list_scripts() Date: Thu, 3 Oct 2019 17:52:05 +0200 Message-Id: <20191003154547.411558084@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20191003154533.590915454@linuxfoundation.org> References: <20191003154533.590915454@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Gustavo A. R. Silva [ Upstream commit 3b4acbb92dbda4829e021e5c6d5410658849fa1c ] In case memory resources for *buf* and *paths* were allocated, jump to *out* and release them before return. Signed-off-by: Gustavo A. R. Silva Cc: Alexander Shishkin Cc: Andi Kleen Cc: Gustavo A. R. Silva Cc: Jiri Olsa Cc: Namhyung Kim Cc: Peter Zijlstra Addresses-Coverity-ID: 1444328 ("Resource leak") Fixes: 6f3da20e151f ("perf report: Support builtin perf script in scripts menu") Link: http://lkml.kernel.org/r/20190408162748.GA21008@embeddedor Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/ui/browsers/scripts.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/tools/perf/ui/browsers/scripts.c b/tools/perf/ui/browsers/scripts.c index 27cf3ab88d13f..f4edb18f67ec9 100644 --- a/tools/perf/ui/browsers/scripts.c +++ b/tools/perf/ui/browsers/scripts.c @@ -131,8 +131,10 @@ static int list_scripts(char *script_name, bool *custom, int key = ui_browser__input_window("perf script command", "Enter perf script command line (without perf script prefix)", script_args, "", 0); - if (key != K_ENTER) - return -1; + if (key != K_ENTER) { + ret = -1; + goto out; + } sprintf(script_name, "%s script %s", perf, script_args); } else if (choice < num + max_std) { strcpy(script_name, paths[choice]); -- 2.20.1