diff options
author | Robin Watts <robin.watts@artifex.com> | 2017-05-08 14:45:45 +0100 |
---|---|---|
committer | Robin Watts <robin.watts@artifex.com> | 2017-05-09 19:47:07 +0100 |
commit | 6fc5eae8e9bf4658658163fdefca9950f6320c65 (patch) | |
tree | 9a6114523756cdd4f5646702a4b41626732a6a4e /source/fitz/jmemcust.c | |
parent | 8baa9e7d6ec43792bc1545b840d28254e5f6caac (diff) | |
download | mupdf-6fc5eae8e9bf4658658163fdefca9950f6320c65.tar.xz |
Fix key_storable operations leading to leaks of fz_image.
key_storable objects can either be freed 'directly' by an API call
(such as fz_drop_image), or 'internally' by the store realising that
the sole thing holding onto a key_storable is a key.
The current code frees more structure in the direct call than it
does in the internal call. Clearly this is wrong and leads to
leaks.
The fix is to do ALL the freeing in the internal 'drop' function
within the key_storable.
This means we don't need (or want) either fz_drop_key_storable_key or
fz_drop_key_storable to return an int to tell us whether they were
actually dropped, so we make that change to simplify the code.
This shifts the responsibility for freeing the extra internal
structure into the innermost drop functions - fz_drop_image_imp and
fz_drop_image_gprf_imp. To avoid duplicating code, we put the
extra freeing logic into a fz_drop_image_base function.
Diffstat (limited to 'source/fitz/jmemcust.c')
0 files changed, 0 insertions, 0 deletions