]> git.baikalelectronics.ru Git - kernel.git/commitdiff
perf bpf: Avoid memory leak from perf_env__insert_btf()
authorIan Rogers <irogers@google.com>
Fri, 12 Nov 2021 07:45:25 +0000 (23:45 -0800)
committerArnaldo Carvalho de Melo <acme@redhat.com>
Sat, 13 Nov 2021 21:11:51 +0000 (18:11 -0300)
perf_env__insert_btf() doesn't insert if a duplicate BTF id is
encountered and this causes a memory leak. Modify the function to return
a success/error value and then free the memory if insertion didn't
happen.

v2. Adds a return -1 when the insertion error occurs in
    perf_env__fetch_btf. This doesn't affect anything as the result is
    never checked.

Fixes: a7bc1ef9833afc34 ("perf bpf: Save BTF in a rbtree in perf_env")
Signed-off-by: Ian Rogers <irogers@google.com>
Cc: Alexander Shishkin <alexander.shishkin@linux.intel.com>
Cc: Alexei Starovoitov <ast@kernel.org>
Cc: Andrii Nakryiko <andrii@kernel.org>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: John Fastabend <john.fastabend@gmail.com>
Cc: KP Singh <kpsingh@kernel.org>
Cc: Mark Rutland <mark.rutland@arm.com>
Cc: Martin KaFai Lau <kafai@fb.com>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Song Liu <songliubraving@fb.com>
Cc: Stephane Eranian <eranian@google.com>
Cc: Tiezhu Yang <yangtiezhu@loongson.cn>
Cc: Yonghong Song <yhs@fb.com>
Cc: bpf@vger.kernel.org
Cc: netdev@vger.kernel.org
Link: http://lore.kernel.org/lkml/20211112074525.121633-1-irogers@google.com
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
tools/perf/util/bpf-event.c
tools/perf/util/env.c
tools/perf/util/env.h

index 4d3b4cdce17633f6e3707064c1ea17bef6e76c2e..d49cdff8fb39568fd096ad04175851f66283cbc1 100644 (file)
@@ -119,7 +119,11 @@ static int perf_env__fetch_btf(struct perf_env *env,
        node->data_size = data_size;
        memcpy(node->data, data, data_size);
 
-       perf_env__insert_btf(env, node);
+       if (!perf_env__insert_btf(env, node)) {
+               /* Insertion failed because of a duplicate. */
+               free(node);
+               return -1;
+       }
        return 0;
 }
 
index 17f1dd0680b42424fd56219595552ae2c6ab5292..b9904896eb9746a0f2babfd1a4b5306792a8656d 100644 (file)
@@ -75,12 +75,13 @@ out:
        return node;
 }
 
-void perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node)
+bool perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node)
 {
        struct rb_node *parent = NULL;
        __u32 btf_id = btf_node->id;
        struct btf_node *node;
        struct rb_node **p;
+       bool ret = true;
 
        down_write(&env->bpf_progs.lock);
        p = &env->bpf_progs.btfs.rb_node;
@@ -94,6 +95,7 @@ void perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node)
                        p = &(*p)->rb_right;
                } else {
                        pr_debug("duplicated btf %u\n", btf_id);
+                       ret = false;
                        goto out;
                }
        }
@@ -103,6 +105,7 @@ void perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node)
        env->bpf_progs.btfs_cnt++;
 out:
        up_write(&env->bpf_progs.lock);
+       return ret;
 }
 
 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id)
index 1383876f72b3773628b690145b012489643423d6..163e5ec503a2634b55a6573592129ea3dfa907ac 100644 (file)
@@ -167,7 +167,7 @@ void perf_env__insert_bpf_prog_info(struct perf_env *env,
                                    struct bpf_prog_info_node *info_node);
 struct bpf_prog_info_node *perf_env__find_bpf_prog_info(struct perf_env *env,
                                                        __u32 prog_id);
-void perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node);
+bool perf_env__insert_btf(struct perf_env *env, struct btf_node *btf_node);
 struct btf_node *perf_env__find_btf(struct perf_env *env, __u32 btf_id);
 
 int perf_env__numa_node(struct perf_env *env, int cpu);