Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2911715ybx; Fri, 8 Nov 2019 11:10:01 -0800 (PST) X-Google-Smtp-Source: APXvYqzGBGCmppuz2oDVUsyMh/GzJZI+wNeGZKtFBCG/wAaGjk4iKI3UixL7ziPM7VOO/QgY8sGx X-Received: by 2002:a17:906:378d:: with SMTP id n13mr10518811ejc.260.1573240201217; Fri, 08 Nov 2019 11:10:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573240201; cv=none; d=google.com; s=arc-20160816; b=XRhfOdXjUqOzgSCcHgVeSJJVCN977mLesgb3k/3JbAwZnzy2ZJUHrH/gF8QIfKixZB Uc4s/8b0mHYeNh1IHgRHMN4lvQffibwPBSzBPdfYci14P418lf98KI/e20eeR9mkTznh 4TSRO5H6oS3MBZrTVvms7/AHDiDFStfmI1uRMuh40YPvtBiJoEG4LuePmosrKJ+b3UK9 ESur4GgBwUiqDlQPlF/pV+GhIxjmAyL3xTYOhc9Q0mNAijcQCSAbXjB37xBIXRTewp2T W7Y9uQJ/w0sQDSUR8efMjNpI5Ito0ZYa21nuOV9juuoFnH+KZNi1d4BWGjQTFzGSWG6f ml0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OhptNCgJd0+GIkorRGzZXD8cY4saDEwkYguqBTkUpJA=; b=p8mFDZUSK3Th+lkGnqakPD7W5eX22rWQcrH3f3M+LLg2jOk9NOkz4IMKilKCz/Yut5 QyKG4IYJmJbgdQqldtVD/e/wxr4VQCQaVFUtq3Z0XwNqeGWdOzGVSy7l5xrOi4PJsp2n vNbuM0scyzDaUSFqC/pSsSrLnU56FoTDO0WQAWsWaI8u2hjJPoCGcfoMtm52QnfUdOkI mO5KpV1nqhN/IeRX2Mxg9XLyhZJPv5NiOKzMj3dpf0FE1qum+urCUDCF8Z2uEVocE8/E y/whRfvRHBAxFpx6E/EYCLHIIhDjumCBvtpv9xunFo3hN0P8PU4ILuYC98HaBblGC/gN dOyA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cs90nfej; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q18si4170978eju.333.2019.11.08.11.09.37; Fri, 08 Nov 2019 11:10:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cs90nfej; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730481AbfKHTG1 (ORCPT + 99 others); Fri, 8 Nov 2019 14:06:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:36856 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391253AbfKHTGZ (ORCPT ); Fri, 8 Nov 2019 14:06:25 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 806B3215EA; Fri, 8 Nov 2019 19:06:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1573239985; bh=7skNHl2lfzqMuJ/ZX/CMowiYnncczK5DRh0cTKlhqvU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cs90nfejaDocEGG1MFpbxc9YU2cFocnJ5A/map8siuJYZgdVq+uCaYvBtRQXJ62Fe u731h3CeQ7KCoEPjKnHvGBII/zAP/CqtP7dZtayWK1xEUPEn7FfzjbloMl+j330Gb8 SkO++oj4g88U2EgZv4up0E68Xi177uB4cKpEAWiI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yunfeng Ye , Jiri Olsa , Alexander Shishkin , Alexei Starovoitov , Alexey Budankov , Andi Kleen , Daniel Borkmann , Feilong Lin , Hu Shiyuan , Igor Lubashev , Kan Liang , Mark Rutland , Martin KaFai Lau , Namhyung Kim , Peter Zijlstra , Song Liu , Yonghong Song , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 5.3 049/140] perf tools: Fix resource leak of closedir() on the error paths Date: Fri, 8 Nov 2019 19:49:37 +0100 Message-Id: <20191108174908.479126672@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191108174900.189064908@linuxfoundation.org> References: <20191108174900.189064908@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yunfeng Ye [ Upstream commit 6080728ff8e9c9116e52e6f840152356ac2fea56 ] Both build_mem_topology() and rm_rf_depth_pat() have resource leaks of closedir() on the error paths. Fix this by calling closedir() before function returns. Fixes: e2091cedd51b ("perf tools: Add MEM_TOPOLOGY feature to perf data file") Fixes: cdb6b0235f17 ("perf tools: Add pattern name checking to rm_rf") Signed-off-by: Yunfeng Ye Acked-by: Jiri Olsa Cc: Alexander Shishkin Cc: Alexei Starovoitov Cc: Alexey Budankov Cc: Andi Kleen Cc: Daniel Borkmann Cc: Feilong Lin Cc: Hu Shiyuan Cc: Igor Lubashev Cc: Kan Liang Cc: Mark Rutland Cc: Martin KaFai Lau Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Song Liu Cc: Yonghong Song Link: http://lore.kernel.org/lkml/cd5f7cd2-b80d-6add-20a1-32f4f43e0744@huawei.com Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/util/header.c | 4 +++- tools/perf/util/util.c | 6 ++++-- 2 files changed, 7 insertions(+), 3 deletions(-) diff --git a/tools/perf/util/header.c b/tools/perf/util/header.c index e95a2a26c40a8..277cdf1fc5ac8 100644 --- a/tools/perf/util/header.c +++ b/tools/perf/util/header.c @@ -1282,8 +1282,10 @@ static int build_mem_topology(struct memory_node *nodes, u64 size, u64 *cntp) continue; if (WARN_ONCE(cnt >= size, - "failed to write MEM_TOPOLOGY, way too many nodes\n")) + "failed to write MEM_TOPOLOGY, way too many nodes\n")) { + closedir(dir); return -1; + } ret = memory_node__read(&nodes[cnt++], idx); } diff --git a/tools/perf/util/util.c b/tools/perf/util/util.c index a61535cf1bca2..d0930c38e147e 100644 --- a/tools/perf/util/util.c +++ b/tools/perf/util/util.c @@ -176,8 +176,10 @@ static int rm_rf_depth_pat(const char *path, int depth, const char **pat) if (!strcmp(d->d_name, ".") || !strcmp(d->d_name, "..")) continue; - if (!match_pat(d->d_name, pat)) - return -2; + if (!match_pat(d->d_name, pat)) { + ret = -2; + break; + } scnprintf(namebuf, sizeof(namebuf), "%s/%s", path, d->d_name); -- 2.20.1