Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp153997ybh; Fri, 2 Aug 2019 20:15:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqzNPhXVs6trxzcr0Ets/HnMb3+snEw6F5YKn+T8ndmZgav8wO3yzS87TvwAuiEmoQDgtQzt X-Received: by 2002:a17:902:2ae7:: with SMTP id j94mr134110827plb.270.1564802101402; Fri, 02 Aug 2019 20:15:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564802101; cv=none; d=google.com; s=arc-20160816; b=D+PqW6tPBdYaZt+dV4X1LPdb8BdDc7Z2w11GqHCQztLvgITXuvTLGf/PZ1Pza7SY+u vVsygHtq5BFeP3Q93W+UcCDRXvjnfa7hxlsouOKeqkQ+/agOVSNZ0fiuJllj5CjU6mbl qAyxROD1UuDjE2Zl5t7oFUH0MJY3fbrskaT1OVpyC01sjAcUOia3XFW8ipW7UMv2zWlJ +smvkz17NZeQTJPr24LkIaTi1NwsrS6y4/6xo7ng2vIaoWM5QsFa05MvZruaYkxCUWvR D4+SEZgcEKIDswQ2BtNSgye6B1jFymkOllra/fNQLb4EqdzQQ1dGl974OBLdVm5XeLdO 3u6w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Dr/jG6VrH6QdsYeXok4tDvIQ3QUde6r4YKlobO58pqw=; b=b+GaiWSJjkqA5iviETf2NzA+gELu809E/iHSKc/V+350WEYuIHrWPMNK+ndlS005jQ u+zaex4M/xgki36HWNEC9+Wbs+Q8Iaq2iAYFOstcLyI7tLLakc6vMSNMyI/z5xPNJRwH G+VSbZJclYen/0fB6/vnQon3GM4PpulOQ8aVEDoRctncKseIBShCzPmPBwhWc+rmvKCG 7LT6zg5lhwJPo3rm2Xm4Prb6ujomYH+b/sDanE2ugvFHF+m3rhncQR5Xfev08/36894v ERNo8EsTTXI6hp/2fh6tEcUdm5DVJtPEnIVtjeQGGwxyTFyheQxsaacIgZXoiRosT9RB vObA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Y5vmPsHD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q42si7844240pjc.103.2019.08.02.20.14.45; Fri, 02 Aug 2019 20:15:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Y5vmPsHD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405204AbfHBNcq (ORCPT + 99 others); Fri, 2 Aug 2019 09:32:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:34554 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389214AbfHBNX4 (ORCPT ); Fri, 2 Aug 2019 09:23:56 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1A42621850; Fri, 2 Aug 2019 13:23:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564752235; bh=/uCvZKWMqfzUScBLGFyCMp7naXjedMgbJFr9O/xgho4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y5vmPsHD+JtrzyL9ScJPTsL5+5X7UEvrykirXPUJBbFp9qWJB0Azlb199A1q1I0XO ksYSsvOYCneWDkI5q83A91egua+K9HM3wAj/PiixSwXKRYL8rzqTdUaKZql0/LuSoo NzD4L/TRj9D1+FBPKdDlqCDdmMUtrj5e5XJm+j1E= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Arnaldo Carvalho de Melo , Adrian Hunter , Jiri Olsa , Masami Hiramatsu , Namhyung Kim , Sasha Levin Subject: [PATCH AUTOSEL 4.19 28/42] perf probe: Avoid calling freeing routine multiple times for same pointer Date: Fri, 2 Aug 2019 09:22:48 -0400 Message-Id: <20190802132302.13537-28-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190802132302.13537-1-sashal@kernel.org> References: <20190802132302.13537-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnaldo Carvalho de Melo [ Upstream commit d95daf5accf4a72005daa13fbb1d1bd8709f2861 ] When perf_add_probe_events() we call cleanup_perf_probe_events() for the pev pointer it receives, then, as part of handling this failure the main 'perf probe' goes on and calls cleanup_params() and that will again call cleanup_perf_probe_events()for the same pointer, so just set nevents to zero when handling the failure of perf_add_probe_events() to avoid the double free. Cc: Adrian Hunter Cc: Jiri Olsa Cc: Masami Hiramatsu Cc: Namhyung Kim Link: https://lkml.kernel.org/n/tip-x8qgma4g813z96dvtw9w219q@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/builtin-probe.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/tools/perf/builtin-probe.c b/tools/perf/builtin-probe.c index 99de91698de1e..0bdb34fee9d81 100644 --- a/tools/perf/builtin-probe.c +++ b/tools/perf/builtin-probe.c @@ -711,6 +711,16 @@ __cmd_probe(int argc, const char **argv) ret = perf_add_probe_events(params.events, params.nevents); if (ret < 0) { + + /* + * When perf_add_probe_events() fails it calls + * cleanup_perf_probe_events(pevs, npevs), i.e. + * cleanup_perf_probe_events(params.events, params.nevents), which + * will call clear_perf_probe_event(), so set nevents to zero + * to avoid cleanup_params() to call clear_perf_probe_event() again + * on the same pevs. + */ + params.nevents = 0; pr_err_with_code(" Error: Failed to add events.", ret); return ret; } -- 2.20.1