Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp13454341ybl; Sun, 29 Dec 2019 12:15:10 -0800 (PST) X-Google-Smtp-Source: APXvYqz4iNbJbeJ2N3U0fniQp/IvhNtGvYM8t7mHDCZCTPqcP+v9CCTINRtgymkyX23VK2ECTwQF X-Received: by 2002:a05:6830:1cc5:: with SMTP id p5mr45622138otg.218.1577650510562; Sun, 29 Dec 2019 12:15:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577650510; cv=none; d=google.com; s=arc-20160816; b=uMX0P/hIjiawc2EtPJaduCedx3V3k1aA2iwXcN4zYzXpIlDK/djQLx431tZmle9mM4 tfofPvHUEcUJ9IyYkiZjTDX03b6h11kuVrFROJZRVHwcy888f3QrjMVoTorT1NC/2AN/ APyovKeidbVcI10v3jfks0jIWDa4XXgfkkl5oTx493i8lZ67yZ2s4qXGAK0OEPpZ4lIK QmkmFn4j7odA7Ymj+3SVftAG4zemafG0GlOXffn8eZpMULY4lyZynKlGv9arEu1Z5TUs bVrJiT6xZdAdV5W/pGqH3FpKbHJdJjkXM3XXwjKkpCPHpVL/WxNeL86Nkrkpq3MciK/n IXPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=prAp9bJiqt4Y1qtWt0vuGie1fqsflfw3Ft1KvUi9r10=; b=ts4lsyYZmxHvqvEG0NEu+6JSVgcWnQ6JL5sA5yK01vCmO8EYBniQJorL0C0fvzH27V hwxSp6kEiaaH2FjJZ8moG6KVZoPkcCWIGPk5y9q1ZsCG5Xc3cACezM78SPQezcrHW9+U Hzm09lZfjNmhEasY1kIuz5JVc6XKPIjasaOQcSGEXLAYS8UprCpz8vLQ4LfB93JK3RBk miiOJmaYMMDVTarLxkjXpmv47IRKorDwhmZxR3EPhT9d292DHHqaKpq8cZhS4WFmR4HJ X5cnu1TdHWXTUipB8sAlLVgzlMmptEBxEF2IXIVhgJyH8vVL4FC4CeN/67Ul8MhWP4gV If/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t4HTLu5L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w6si18637287oti.4.2019.12.29.12.14.59; Sun, 29 Dec 2019 12:15:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t4HTLu5L; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729346AbfL2Rco (ORCPT + 99 others); Sun, 29 Dec 2019 12:32:44 -0500 Received: from mail.kernel.org ([198.145.29.99]:33214 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727029AbfL2Rci (ORCPT ); Sun, 29 Dec 2019 12:32:38 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3C97720722; Sun, 29 Dec 2019 17:32:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1577640757; bh=nPbKkTiUXTZbXtDFcv0qMIXx7RYcsCD2UZEM/RpLOtc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=t4HTLu5LdoYv4UTvISy+K3W+NNV/IbWdomgY1/RgazJZygijyg6PPKInmhnfmXfw1 MBmW916K+pzaQ4bW3uowsS+mqbik+Z5vMZUFT7pVoHdZsGpxdWUrMaqvS9km0s0L6k W6FJT9Je3JukmoV0Mp+G4e8ggMNclGGQL5QO9OmI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Yunfeng Ye , Alexander Shishkin , Andi Kleen , Feilong Lin , Hu Shiyuan , Jiri Olsa , John Garry , Kan Liang , Luke Mujica , Mark Rutland , Namhyung Kim , Peter Zijlstra , Zenghui Yu , Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 4.19 125/219] perf jevents: Fix resource leak in process_mapfile() and main() Date: Sun, 29 Dec 2019 18:18:47 +0100 Message-Id: <20191229162527.271168129@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191229162508.458551679@linuxfoundation.org> References: <20191229162508.458551679@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Yunfeng Ye [ Upstream commit 1785fbb73896dbd9d27a406f0d73047df42db710 ] There are memory leaks and file descriptor resource leaks in process_mapfile() and main(). Fix this by adding free(), fclose() and free_arch_std_events() on the error paths. Fixes: 80eeb67fe577 ("perf jevents: Program to convert JSON file") Fixes: 3f056b66647b ("perf jevents: Make build fail on JSON parse error") Fixes: e9d32c1bf0cd ("perf vendor events: Add support for arch standard events") Signed-off-by: Yunfeng Ye Cc: Alexander Shishkin Cc: Andi Kleen Cc: Feilong Lin Cc: Hu Shiyuan Cc: Jiri Olsa Cc: John Garry Cc: Kan Liang Cc: Luke Mujica Cc: Mark Rutland Cc: Namhyung Kim Cc: Peter Zijlstra Cc: Zenghui Yu Link: http://lore.kernel.org/lkml/d7907042-ec9c-2bef-25b4-810e14602f89@huawei.com Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/pmu-events/jevents.c | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/tools/perf/pmu-events/jevents.c b/tools/perf/pmu-events/jevents.c index 6cd9623ebc93..38b5888ef7b3 100644 --- a/tools/perf/pmu-events/jevents.c +++ b/tools/perf/pmu-events/jevents.c @@ -754,6 +754,7 @@ static int process_mapfile(FILE *outfp, char *fpath) char *line, *p; int line_num; char *tblname; + int ret = 0; pr_info("%s: Processing mapfile %s\n", prog, fpath); @@ -765,6 +766,7 @@ static int process_mapfile(FILE *outfp, char *fpath) if (!mapfp) { pr_info("%s: Error %s opening %s\n", prog, strerror(errno), fpath); + free(line); return -1; } @@ -791,7 +793,8 @@ static int process_mapfile(FILE *outfp, char *fpath) /* TODO Deal with lines longer than 16K */ pr_info("%s: Mapfile %s: line %d too long, aborting\n", prog, fpath, line_num); - return -1; + ret = -1; + goto out; } line[strlen(line)-1] = '\0'; @@ -821,7 +824,9 @@ static int process_mapfile(FILE *outfp, char *fpath) out: print_mapping_table_suffix(outfp); - return 0; + fclose(mapfp); + free(line); + return ret; } /* @@ -1118,6 +1123,7 @@ int main(int argc, char *argv[]) goto empty_map; } else if (rc < 0) { /* Make build fail */ + fclose(eventsfp); free_arch_std_events(); return 1; } else if (rc) { @@ -1130,6 +1136,7 @@ int main(int argc, char *argv[]) goto empty_map; } else if (rc < 0) { /* Make build fail */ + fclose(eventsfp); free_arch_std_events(); return 1; } else if (rc) { @@ -1147,6 +1154,8 @@ int main(int argc, char *argv[]) if (process_mapfile(eventsfp, mapfile)) { pr_info("%s: Error processing mapfile %s\n", prog, mapfile); /* Make build fail */ + fclose(eventsfp); + free_arch_std_events(); return 1; } -- 2.20.1