Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp572688ybt; Fri, 19 Jun 2020 08:27:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxweZ2iQ0jWKzCK8X+36ei9I8YuP6cmELlhJhKHdtT14juij0t3dAbc6aAEBEZA/AqK+53p X-Received: by 2002:a50:9b16:: with SMTP id o22mr3832987edi.130.1592580455436; Fri, 19 Jun 2020 08:27:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592580455; cv=none; d=google.com; s=arc-20160816; b=QA6qRm2+LWc2o+HdYTPRqMX0DMasj8uA9VBxId4/Azd9r54PgWYsajb87tYaCGwpMm G7b9URRq65EOE5Ki1Kao8t7qciUyE7JesORdSnYLXhMcoDWp+OTPfoau0yioyz0JAfq2 KTDirhvR5JCJYZLvl9ObPfgBlEUVTbBORIt4nGI6MOVA0K5A26up5CwZpUg4Mveg3hBg VqWpuYgEunKbLvp+OYwa+ZrbRLmnK0RLsvYt++RlOBiNFKFBrDOKNPNUa06Uy/XwGumW abqX3aUQw3yTQNVr549GwKyJGInmHEXu2UOfz28tDua45U8xCfyDY6Ou3b6qjXcjY5Uw yfnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=iTOal4J/yWTcR/A3MTUwaqsyj34MH3eu5IT8REm8Nxw=; b=pmumEP21v6pXDa3T955t+cWt6YpmPfNO3+e6RtIkT3uiJ1gS+N50TQXZMcx+ZlIf8B beul0AwkJFeLQf8vpadv/KZEfa8EI3y1/b6BVRJTCNTHU9bBadyF1joJ8Qiz6mbrk3BL et+/RqypOzUm1c3ooMtVIfJdtdegGpaHiyijHF2RONZzzFRj4+ZQt+ro/FPW6hiS7IHN FrWm3t9sqI4BVo9lXYmHbrfI/xlIs6OHaozfQb03UM0rNDwInZ35yvOVu3d2gBBtdQDM 7ZAuUFsEyJYo9+brrwCjOylA2aX/J/002SwTzMCzneyK3JKpsG+TkGaD2Kjyi+RW5yLZ +EKg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gucWA3cD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w13si3935514ejb.233.2020.06.19.08.27.13; Fri, 19 Jun 2020 08:27:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=gucWA3cD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393301AbgFSPYm (ORCPT + 99 others); Fri, 19 Jun 2020 11:24:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:52952 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392881AbgFSPVm (ORCPT ); Fri, 19 Jun 2020 11:21:42 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DDAD020706; Fri, 19 Jun 2020 15:21:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592580101; bh=tHgLy2WBJHYxlwWYiAqfHC5kG4VoDvhBZLkmec1G7tk=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gucWA3cDeT1GVmvR18pIyh+C+pLId3YurzIGn4RFoft+B3qcl1+GC0NPdpfKqbvFK 0cXjm9izDgYY2uOJdnb+PNt+btSCrMaXXrpGCBUE85j7tLGO9KHn8dp1JSHOCewFe0 Lh2xioBm2SxTVwu5LNTF7eJ2CQLs0k7tktQ1KmIg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrii Nakryiko , Alexei Starovoitov , Song Liu , Sasha Levin Subject: [PATCH 5.7 123/376] selftests/bpf: Fix memory leak in extract_build_id() Date: Fri, 19 Jun 2020 16:30:41 +0200 Message-Id: <20200619141716.159347958@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200619141710.350494719@linuxfoundation.org> References: <20200619141710.350494719@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrii Nakryiko [ Upstream commit 9f56bb531a809ecaa7f0ddca61d2cf3adc1cb81a ] getline() allocates string, which has to be freed. Fixes: 81f77fd0deeb ("bpf: add selftest for stackmap with BPF_F_STACK_BUILD_ID") Signed-off-by: Andrii Nakryiko Signed-off-by: Alexei Starovoitov Cc: Song Liu Link: https://lore.kernel.org/bpf/20200429012111.277390-7-andriin@fb.com Signed-off-by: Sasha Levin --- tools/testing/selftests/bpf/test_progs.c | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/testing/selftests/bpf/test_progs.c b/tools/testing/selftests/bpf/test_progs.c index 86d0020c9eec..93970ec1c9e9 100644 --- a/tools/testing/selftests/bpf/test_progs.c +++ b/tools/testing/selftests/bpf/test_progs.c @@ -351,6 +351,7 @@ int extract_build_id(char *build_id, size_t size) len = size; memcpy(build_id, line, len); build_id[len] = '\0'; + free(line); return 0; err: fclose(fp); -- 2.25.1