From nobody Mon Feb 9 01:29:15 2026 Received: from mail-dy1-f202.google.com (mail-dy1-f202.google.com [74.125.82.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AD4BD31A7E1 for ; Sat, 17 Jan 2026 05:29:21 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=74.125.82.202 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768627762; cv=none; b=PJ1Xlb4a59g+lFqqZNqoxJDPVRpWPx9gRKtqEtwQoJpVywm9OVn0/owxzub0G1+yODoXbRXvLc4F+em5OQycGN3pb+OLpeJMomIFzB1xPnQo2L7KnjQzoFt0pauvVr6TvQIXibfQagR+eSloA/AsG9RHGRIv5peKLBA4zFobY5E= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768627762; c=relaxed/simple; bh=gbFw65gKDB9Q7CSGbuP34AO5oPVulM2chbHXMkIGkC8=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Content-Type; b=Z4Qs9SPcA1hNxPveKmknNqjkXbSHwATryFoYM+NJrv2imNyU9sK06MZSudRTTyOA4wVCKEA8c9mKpw8xVQYvBb/itxcNAUXJ832CO0f9NDnDVC7KLz2MZk3GrPZ29FA3PedxEuO/uhS9wEW3V3tOJ7d6DVPsFR2IMYO/oMY3q84= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--irogers.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=H1bGZTB9; arc=none smtp.client-ip=74.125.82.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--irogers.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="H1bGZTB9" Received: by mail-dy1-f202.google.com with SMTP id 5a478bee46e88-2b6ba50fc34so1156551eec.0 for ; Fri, 16 Jan 2026 21:29:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1768627761; x=1769232561; darn=vger.kernel.org; h=to:from:subject:message-id:references:mime-version:in-reply-to:date :from:to:cc:subject:date:message-id:reply-to; bh=7OS8+jcXChzbawXYGLy5k5VOyetH1gbj+eqgOcCR0OU=; b=H1bGZTB9/sYMy7T9/JjX2ZVtV5ZK1u2ryhz88RYKQUHOZRtrLax2Y9p87nXXaXHr9Q 4p8mChrMEdd3RMgx+A80yNCgZtEmGM3Ss6TffX/ltIqUnLhXU3/FWI1daTRwIdQop/v2 lQaw1Oge1f+2n/yAXFG4xep/0YB0IlqiaAOyZ3IJFqoIshZAf+OHbQG1FmKqUrhCtABD 3es8irDPceXBV92FBnF3XWbc8hivatbsjzV2vqFOPh+ec8N4PJcKM1arMtU2I1sbCGDt p4bAbsdX0Bm3nFpWuUr+cb2LnhwmO+sfQgqyPKinzB43TujVWsq92IW/Kw6gdf3j4xOs nenA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1768627761; x=1769232561; h=to:from:subject:message-id:references:mime-version:in-reply-to:date :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=7OS8+jcXChzbawXYGLy5k5VOyetH1gbj+eqgOcCR0OU=; b=iiHJiZcmrnlKt4pK+VxQi6wcmiVvlqgang5sPkidOq1X3qZkvJI1AapJIagChnRFDI ChOoBCUeK5YjDGEU615fwduv9llkMvdQm4RVTtl8QhiAAQzdSMl8/V9m2mKpSCHgmucC dXU+3VqXXm2aQw6GBp1Wiw1J5UcRZhV+KaiLp/H92/XI+eil+T1+4A+Is3e4YHbuf2wS cGjl+AN5stwSHY1pIT+/YH3raQVfX2LUqlsrNnihqK2oIxU8MUepEdtq5c7pnNUeQkVZ 58EOYdr8OKzKhB+2UaEUjl63UE0VY49MdtP6gJBhcHpV3PozTZHHpjqQgDPfc6sTyyCF VgTA== X-Forwarded-Encrypted: i=1; AJvYcCXiHhhtzPFmvDpbNfSXYse9PvZrn5k3avdlQlp7hHwvSDgaxfcrpkcC9AffmcrbDikHM+20UrUUAvxHw6M=@vger.kernel.org X-Gm-Message-State: AOJu0YxJqswdX0PvlVqBsxB6EQQ2oHmy8aa8zbWwmgz924lg3BzFp/H6 Os1HdQ7vrunDrYXXFrh4j83wxv40rTqm6xavlA/UztstCq38Lb7HkhhvyHRBkOiPy4TPtPcMyo5 VMgcDiBdk7w== X-Received: from dlbrh14.prod.google.com ([2002:a05:7022:f30e:b0:11a:44f1:daa3]) (user=irogers job=prod-delivery.src-stubby-dispatcher) by 2002:a05:7300:dc04:b0:2ae:5b71:d226 with SMTP id 5a478bee46e88-2b6b3ed9044mr3890490eec.3.1768627760880; Fri, 16 Jan 2026 21:29:20 -0800 (PST) Date: Fri, 16 Jan 2026 21:28:27 -0800 In-Reply-To: <20260117052849.2205545-1-irogers@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20260117052849.2205545-1-irogers@google.com> X-Mailer: git-send-email 2.52.0.457.g6b5491de43-goog Message-ID: <20260117052849.2205545-2-irogers@google.com> Subject: [PATCH v1 01/23] perf symbol-elf: Fix leak of ELF files with GNU debugdata From: Ian Rogers To: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Namhyung Kim , Jiri Olsa , Ian Rogers , Adrian Hunter , James Clark , John Garry , Will Deacon , Leo Yan , Guo Ren , Paul Walmsley , Palmer Dabbelt , Albert Ou , Alexandre Ghiti , Shimin Guo , Athira Rajeev , Stephen Brennan , Howard Chu , Thomas Falcon , Andi Kleen , "Dr. David Alan Gilbert" , Dmitry Vyukov , "=?UTF-8?q?Krzysztof=20=C5=81opatowski?=" , Chun-Tse Shao , Aditya Bodkhe , Haibo Xu , Sergei Trofimovich , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-csky@vger.kernel.org, linux-riscv@lists.infradead.org, Mark Wielaard Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The processing of DSO_BINARY_TYPE__GNU_DEBUGDATA in symsrc__init happens with an open ELF file but the error path only closes the associate fd. Fix the goto so that the ELF file is also ended and memory released. Fixes: b10f74308e13 ("perf symbol: Support .gnu_debugdata for symbols") Signed-off-by: Ian Rogers --- tools/perf/util/symbol-elf.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/perf/util/symbol-elf.c b/tools/perf/util/symbol-elf.c index b8fea12997a0..76912c62b6a0 100644 --- a/tools/perf/util/symbol-elf.c +++ b/tools/perf/util/symbol-elf.c @@ -1173,7 +1173,7 @@ int symsrc__init(struct symsrc *ss, struct dso *dso, = const char *name, Elf *embedded =3D read_gnu_debugdata(dso, elf, name, &new_fd); =20 if (!embedded) - goto out_close; + goto out_elf_end; =20 elf_end(elf); close(fd); --=20 2.52.0.457.g6b5491de43-goog