Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2648477ybl; Thu, 19 Dec 2019 17:58:03 -0800 (PST) X-Google-Smtp-Source: APXvYqzg+WAhG0VY8fPP96yqsXJ2AjX4iiY7m1n5po584Ruf43fpN3/6QJSs2z1pgnh2tKFO3GZM X-Received: by 2002:a05:6830:1442:: with SMTP id w2mr12677278otp.143.1576807083309; Thu, 19 Dec 2019 17:58:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576807083; cv=none; d=google.com; s=arc-20160816; b=I/sgJP6WlYTowZpEXAiE5rhW5HuSeI1sdBOOxR7w+TMmkwTBawedT0h0DFVRfqUY2C KwvIuf2QvaxDiJiSejx1zKpjA18FwiloSkcVVhxmCSf34LXVjVev72xoGDmbWC8HDgxH EzDA/96cvpnHu90L5oMBrMOO9/e4mlca2X5fvFtFKMtgpHey9xJczLdEFpnbE9FpNnzD OFeeSilnnS7FSy3dOROBoXe0Nl+zyO7tfpj89VN2I5G19Ri+o0v5iuHsTlSc7kpcVAqs nAQia7STF2vbD2TTWOAMxDEIbe9XIcpr1TK39tmDLBLrSEIAqJh/F/ay3zkiUfGSotWo LJrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=30QT+be5tF6QQ/KLUMVncOSPRmFg/El4yXiUelWTXs4=; b=RBHQe5bi5mLRMKtee4pqf/Zx1VAKFo7pZS5eQ2XFOC38bvQZ86uqtHkh7Rj04Ee7Xg 7UZc1qfGl0RSKndlpYZNggckSAABa3yHAYscdfJmGZKiA9j0+wC+8Gt0nrWz0Pho75yO WoJ9U8KIy8lsufbAScrS8pAEM3nXeCGCJIEd8twxj02yNvEU46BCCym5tJhGkNrqVW8b t0FlDOs20PMSL7mrueFI7/V/X7tD/H48+9txdFRiprWMiC5oXruEzrReqcq+pAN9mseg 5ddo6hEP62HhiJJj1JAzw2m8om1pqKUbCUDs54du0q6Yu6+SiYfgYDwiX141jOLyRqGf EbeA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n85si3996100oig.191.2019.12.19.17.57.51; Thu, 19 Dec 2019 17:58:03 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727534AbfLTB4g (ORCPT + 99 others); Thu, 19 Dec 2019 20:56:36 -0500 Received: from mail.kernel.org ([198.145.29.99]:53240 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727524AbfLTB4d (ORCPT ); Thu, 19 Dec 2019 20:56:33 -0500 Received: from rorschach.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ABC8F227BF; Fri, 20 Dec 2019 01:56:32 +0000 (UTC) Date: Thu, 19 Dec 2019 20:56:31 -0500 From: Steven Rostedt To: Hewenliang Cc: , , , Subject: Re: [PATCH] tools lib traceevent: Fix memory leakage in filter_event Message-ID: <20191219205631.2e12571c@rorschach.local.home> In-Reply-To: <20191209063549.59941-1-hewenliang4@huawei.com> References: <20191209063549.59941-1-hewenliang4@huawei.com> X-Mailer: Claws Mail 3.17.4git76 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 9 Dec 2019 01:35:49 -0500 Hewenliang wrote: > It is necessary to call free_arg(arg) when add_filter_type returns NULL in > the function of filter_event. > > Signed-off-by: Hewenliang This looks fine. Reviewed-by: Steven Rostedt (VMware) Arnaldo, care to take this? -- Steve > --- > tools/lib/traceevent/parse-filter.c | 4 +++- > 1 file changed, 3 insertions(+), 1 deletion(-) > > diff --git a/tools/lib/traceevent/parse-filter.c b/tools/lib/traceevent/parse-filter.c > index f3cbf86e51ac..20eed719542e 100644 > --- a/tools/lib/traceevent/parse-filter.c > +++ b/tools/lib/traceevent/parse-filter.c > @@ -1228,8 +1228,10 @@ filter_event(struct tep_event_filter *filter, struct tep_event *event, > } > > filter_type = add_filter_type(filter, event->id); > - if (filter_type == NULL) > + if (filter_type == NULL) { > + free_arg(arg); > return TEP_ERRNO__MEM_ALLOC_FAILED; > + } > > if (filter_type->filter) > free_arg(filter_type->filter);