Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp7352433ybp; Wed, 16 Oct 2019 07:30:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqxr8fsAYb8jPZ6YBxUg895VvZ7lAcADdLPXIJ+GxAkJSvZOgzaO0IVbkmF4lwSHAMeRaN2o X-Received: by 2002:aa7:d145:: with SMTP id r5mr38803592edo.275.1571236247835; Wed, 16 Oct 2019 07:30:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571236247; cv=none; d=google.com; s=arc-20160816; b=BSuMaJn12VhRgvAlI9Yil4ioU3LnwWp6Ai7lNNm6ocsmsgHfp/4sba0RYhSonMJcgH rTDYOtBROK1TjZU/7fs5TaSHjckYdiN2TK7ScDBxHLtc4/DdfUFClBYKeLmZ+UMNxfmM FZkSDUFyY+1+BwYk9J5QgtZoBm08YhrgAmmIi8i5IwoCsQN6um1cup6w5Nk8gD62MU2Y pRkWHrQD+KMhaTUcnjhs/OBoQKSrt0KNBWpJqEHGcbHh0Z0aMi3Q9oIfk1xG5rl/1QqI OPdkJmn5B/JGnTUmPYAopJZEViRoj0RdP3mL/ecnS8k6qdHdjRhpEhQ57mOelI7jmWue tZjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=nLa95p2PJDq4FGAek6iF01GOPIoqQ8Oby57VNM+z0G8=; b=AK2g4CMO9aHWHpTYv8oPD5YBLVJ2C8jMv+O82IKEx4y/eCcyqFbuCYVcI0Uv+g9NC1 u9oybERuqPDiVrV36GlyB3Z8wB6oibnF0dsvoNm1cOpKlsN4Mz3hz3XQysPhy9gNXLJP lJ3TNQPXtivzvo0P24OR51jsknclznqg+lAhTNlOTT9fv13DzUwo2zbcL1SfYOE5IqDQ 1xYOq8Qc4rblydBhw39cCCpg+TcnXVGvTlquvo/QtGZTYEMj1iaItL5hCxv10u0DxV8F lFI7Aqzsj3S4VmDahC36ZROiOYBECx5BfRcr7AfEJa07yITwrrM/Vv2ebR123kgXB5Ol 6yHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e12si17870555edb.262.2019.10.16.07.30.24; Wed, 16 Oct 2019 07:30:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2392337AbfJPKlR (ORCPT + 99 others); Wed, 16 Oct 2019 06:41:17 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:43388 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726259AbfJPKlR (ORCPT ); Wed, 16 Oct 2019 06:41:17 -0400 Received: from DGGEMS413-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 332E06C094A5466FB9A7; Wed, 16 Oct 2019 18:41:15 +0800 (CST) Received: from [127.0.0.1] (10.202.227.179) by DGGEMS413-HUB.china.huawei.com (10.3.19.213) with Microsoft SMTP Server id 14.3.439.0; Wed, 16 Oct 2019 18:41:05 +0800 Subject: Re: [PATCH] perf jevents: Fix resource leak in process_mapfile() To: Yunfeng Ye , , , , , , , , , , , References: CC: , , From: John Garry Message-ID: <87e66585-1564-3523-59f6-cab15b7e1717@huawei.com> Date: Wed, 16 Oct 2019 11:40:57 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.202.227.179] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/10/2019 08:47, Yunfeng Ye wrote: > There are memory leaks and file descriptor resource leaks in > process_mapfile(). > > Fix this by adding free() and fclose() on the error paths. > > Fixes: 80eeb67fe577 ("perf jevents: Program to convert JSON file") > Signed-off-by: Yunfeng Ye > --- > tools/perf/pmu-events/jevents.c | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/tools/perf/pmu-events/jevents.c b/tools/perf/pmu-events/jevents.c > index e2837260ca4d..6e60d4cff592 100644 > --- a/tools/perf/pmu-events/jevents.c > +++ b/tools/perf/pmu-events/jevents.c > @@ -758,6 +758,7 @@ static int process_mapfile(FILE *outfp, char *fpath) > char *line, *p; > int line_num; > char *tblname; > + int ret = 0; > > pr_info("%s: Processing mapfile %s\n", prog, fpath); > > @@ -769,6 +770,7 @@ static int process_mapfile(FILE *outfp, char *fpath) > if (!mapfp) { > pr_info("%s: Error %s opening %s\n", prog, strerror(errno), > fpath); > + free(line); > return -1; > } > > @@ -795,7 +797,8 @@ static int process_mapfile(FILE *outfp, char *fpath) > /* TODO Deal with lines longer than 16K */ > pr_info("%s: Mapfile %s: line %d too long, aborting\n", > prog, fpath, line_num); > - return -1; > + ret = -1; > + goto out; There's a subtle change of behaviour here, i.e. now calling print_mapping_table_suffix(), but I don't think that it makes any difference. However, does outfp remain open also in this case: main(int argc, char *argv[]) { ... if (process_mapfile(eventsfp, mapfile)) { pr_info("%s: Error processing mapfile %s\n", prog, mapfile); /* Make build fail */ return 1; } return 0; empty_map: fclose(eventsfp); ... } I think that this code works on the basis that the program exits on any sort of error and releases resources automatically. Having said that, it is a good practice to tidy up. John > } > line[strlen(line)-1] = '\0'; > > @@ -825,7 +828,9 @@ static int process_mapfile(FILE *outfp, char *fpath) > > out: > print_mapping_table_suffix(outfp); > - return 0; > + fclose(mapfp); > + free(line); > + return ret; > } > > /* >