Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp3171857rwb; Tue, 8 Nov 2022 01:09:44 -0800 (PST) X-Google-Smtp-Source: AMsMyM5/CmjHryWRg6VoUOiGtWPI52yI4jMF/7EEyuRUyYybyOZFfsD+apV6uq/wZJUOxs5YY+zu X-Received: by 2002:a17:907:2cd8:b0:7ad:c8c0:265e with SMTP id hg24-20020a1709072cd800b007adc8c0265emr46406915ejc.43.1667898583767; Tue, 08 Nov 2022 01:09:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667898583; cv=none; d=google.com; s=arc-20160816; b=N28AuhJgGWRA1Ldyoq37t5BmuNBhHtIIAlx/dkrvVdqiZbjcYkmEOa38kG3RBMqzOa gIMVg3/HuGt7DaxTJTh9H4YH78DH2/9sjfdTMB4M7GNIXkvJqjE06tG+rl7GlkErp8HO lLK2KboLP4jQl+nv89IAtJWPRK95GR3PZGVbqRudqIKc8OjsWbxcxuEMiaiV+I+ptbRd NQMBP/VfpviuYQwjUo9PcIKEfDKUt4ofRtBqA3QsCxlJn+5MzFaRJKyqmQUPdsm2RPSX ktthLuc43BLXDWkfpaby85Udj17D46LdnmiY4AoLh6B6gammp3B2LtJAKQ2LtgA3Y45V H2DQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=8ela9HQWvzbH/buYRvHK38r7vzyCP0AuPLGadl6f0r8=; b=iOd5Dq68c7DmH2cEuAjF/KQUiIj5rwoYCasoSnxcv4WQWh0LwTvFGM6VWG9ZwccmCK Mlr8C8HSBx5dyFYHDi8C203koCcGFzd6JVzb8fVUN7I7Nzhitv/ER4AjesDhd7tqwAdQ Qe6TvtLlP2qbGaYBkzhHcFSyAp6gHqJjaNjSAI6N7fnI89cKYvBnWFHJbGLPy/tC4Hae Ur41xp5Q9NdAQ5Nq5iWlfuZqOF7l0SCM1YUs5TuwsRIGWbanMxSUyY1shv+vFj63RNhW W+yTiY7CGlcYZdOu4DB0LlvagR0xxIDr74br+8WJu+NYaQdm8008PIUqrF7WlKuh9NX+ D+oA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qq18-20020a17090720d200b00773db351c39si852552ejb.64.2022.11.08.01.09.21; Tue, 08 Nov 2022 01:09:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233539AbiKHIct (ORCPT + 91 others); Tue, 8 Nov 2022 03:32:49 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43704 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232798AbiKHIcp (ORCPT ); Tue, 8 Nov 2022 03:32:45 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AAA827B2B for ; Tue, 8 Nov 2022 00:32:45 -0800 (PST) Received: from kwepemi500016.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4N61Yb5TKZzHvk0; Tue, 8 Nov 2022 16:32:19 +0800 (CST) Received: from huawei.com (10.175.100.227) by kwepemi500016.china.huawei.com (7.221.188.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Tue, 8 Nov 2022 16:32:42 +0800 From: Shang XiaoJing To: , , , , CC: Subject: [PATCH 1/2] tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() Date: Tue, 8 Nov 2022 16:31:22 +0800 Message-ID: <20221108083124.27218-2-shangxiaojing@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221108083124.27218-1-shangxiaojing@huawei.com> References: <20221108083124.27218-1-shangxiaojing@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.100.227] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To kwepemi500016.china.huawei.com (7.221.188.220) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org test_gen_synth_cmd() only free buf in fail path, hence buf will leak when there is no failure. Add kfree(buf) to prevent the memleak. The same reason and solution in test_empty_synth_event(). unreferenced object 0xffff8881127de000 (size 2048): comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s) hex dump (first 32 bytes): 20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_ backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<0000000039eb1cf5>] 0xffffffffa00083cd [<000000000e8c3bc8>] 0xffffffffa00086ba [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd unreferenced object 0xffff8881127df000 (size 2048): comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s) hex dump (first 32 bytes): 20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes 74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<00000000d4db9a3d>] 0xffffffffa0008071 [<00000000c31354a5>] 0xffffffffa00086ce [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd Fixes: 9fe41efaca08 ("tracing: Add synth event generation test module") Signed-off-by: Shang XiaoJing --- kernel/trace/synth_event_gen_test.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/trace/synth_event_gen_test.c b/kernel/trace/synth_event_gen_test.c index 0b15e975d2c2..db1ec4809ad1 100644 --- a/kernel/trace/synth_event_gen_test.c +++ b/kernel/trace/synth_event_gen_test.c @@ -120,6 +120,7 @@ static int __init test_gen_synth_cmd(void) /* Now generate a gen_synth_test event */ ret = synth_event_trace_array(gen_synth_test, vals, ARRAY_SIZE(vals)); + kfree(buf); out: return ret; delete: @@ -227,6 +228,7 @@ static int __init test_empty_synth_event(void) /* Now trace an empty_synth_test event */ ret = synth_event_trace_array(empty_synth_test, vals, ARRAY_SIZE(vals)); + kfree(buf); out: return ret; delete: -- 2.17.1