Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp575801imu; Thu, 20 Dec 2018 01:40:49 -0800 (PST) X-Google-Smtp-Source: AFSGD/XKowkHPNi7IilRiozBt4tEWJOIggeLgUJpHT8gJv12Jw3QBunyqv64gDkLIhBYbtuu+PDT X-Received: by 2002:a17:902:a710:: with SMTP id w16mr22948119plq.95.1545298849265; Thu, 20 Dec 2018 01:40:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545298849; cv=none; d=google.com; s=arc-20160816; b=EHpngSyjJu/RIxE7bI0i+11roQGXdcq0kboFYHvbTXW1SqPFBxoUbGLVo6Yxw0wBIV op1Ho+Qms3j5Ub5+GDrYMiQHQz1uP+xDwoTkdVnn+UsCQKeyLuoAPlh4ow0IZLszt9vh BfRZPW826/8tuwFxtm/8xO3xwq9dGFiPBw3ajTjMcTnTMjxuUd8gsVPUNqMDOI92v8k+ EupHmHwFgsHCgfxv8n3YM3mBLZh+9YO34Vwx0jmAQSRFNUE/wE/0lxcvIvgHfYOyLWve N1mRZJn03/VeAeNGjiL5NTPqjgqFAVKeQ2l9rbWtkR/0+2nKZIHnELIJUzJ5/lV4HT3O bMtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EoGeWAVGz0YFXgLjPuQXTLKpx+tddjhmK1ncvV2jMU0=; b=OaNI09+D3T5C1wAJog9KBiEHU/nFAvAeW3m07vGIJLptEmRLwfFSX/R9/Uwnh0fS2F S3zZ33f6mTjP5TWIG+nHIhsEZAHda3CEFXuX+7r6d0uIsWDLVFXqZZDQHZPCnWqyzadi iOu6kGY7Wlnd1l+R7ByuLTztiulBNNmOVvhlpOYTVqMXxt0PLZCqrgbior9BkKQ39lOH 0KAo1fu3Ycb01sPFtHx+suhLs3BzTeHQT7WwIIjGDzMkKRjeizY7oQDayJuq4Kd7GjYK UN8TqU9fDCvQeODbSlps+aOv3Bt29HxZPUsLTPRLbBydWar/oL1z6xhuPVAykhei1bAE mv2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QSuPxlVr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 34si18417156pgt.455.2018.12.20.01.40.34; Thu, 20 Dec 2018 01:40:49 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=QSuPxlVr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387457AbeLTJjM (ORCPT + 99 others); Thu, 20 Dec 2018 04:39:12 -0500 Received: from mail.kernel.org ([198.145.29.99]:47556 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731971AbeLTJZm (ORCPT ); Thu, 20 Dec 2018 04:25:42 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8EC99218D9; Thu, 20 Dec 2018 09:25:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1545297942; bh=cJvaq2rL3bhE6sADqOOvHcOoflOr26MYD7lXf/BTG38=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QSuPxlVrs0lMTS4UkG48zURIGG3jFdbNHL0+rdsZ8dl0M/7g4dr3kFe9obIlFEfrO gjoMHwGu3uFzP4ubFSdBo5hzD3ur/l8/D0CtWP/+1L1MbphK9I92Zd30vdrTDQLI9B HX6IajtEwN7reJ2Bqf4sU6zYXucf6J7itgaGdoek= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, "Steven Rostedt (VMware)" Subject: [PATCH 4.14 13/72] tracing: Fix memory leak of instance function hash filters Date: Thu, 20 Dec 2018 10:18:12 +0100 Message-Id: <20181220085922.856004182@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20181220085922.332225035@linuxfoundation.org> References: <20181220085922.332225035@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Steven Rostedt (VMware) commit 2840f84f74035e5a535959d5f17269c69fa6edc5 upstream. The following commands will cause a memory leak: # cd /sys/kernel/tracing # mkdir instances/foo # echo schedule > instance/foo/set_ftrace_filter # rmdir instances/foo The reason is that the hashes that hold the filters to set_ftrace_filter and set_ftrace_notrace are not freed if they contain any data on the instance and the instance is removed. Found by kmemleak detector. Cc: stable@vger.kernel.org Fixes: 591dffdade9f ("ftrace: Allow for function tracing instance to filter functions") Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Greg Kroah-Hartman --- kernel/trace/ftrace.c | 1 + 1 file changed, 1 insertion(+) --- a/kernel/trace/ftrace.c +++ b/kernel/trace/ftrace.c @@ -5534,6 +5534,7 @@ void ftrace_destroy_filter_files(struct if (ops->flags & FTRACE_OPS_FL_ENABLED) ftrace_shutdown(ops, 0); ops->flags |= FTRACE_OPS_FL_DELETED; + ftrace_free_filter(ops); mutex_unlock(&ftrace_lock); }