Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1416504rwb; Wed, 16 Nov 2022 17:41:16 -0800 (PST) X-Google-Smtp-Source: AA0mqf5sC1S6+Np7oxpvMXt4QKhYbbgxJC5t4zs+g+ZFs5erkBvnHA178sN/5JMTuo4TBVWR34ev X-Received: by 2002:a17:90a:ea05:b0:20a:a1a8:3719 with SMTP id w5-20020a17090aea0500b0020aa1a83719mr396194pjy.225.1668649276565; Wed, 16 Nov 2022 17:41:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668649276; cv=none; d=google.com; s=arc-20160816; b=u+3t/fBEniz7Q098yxBAIzdZR1X0ElItzFnB0+OkFay/rbeGLCPsa7A2dPZsKtU2Fz ByVZZkTbM4ARaJkhDddt/MzE8EaV40oHLm0We+niL1r0U6wG4Pz5gx7+0eHzqjDifCBj fuxzhSloGiSE0CrcXN7+NsLPnvA/T/+Rk6KQrQuGttcacm3hXt6+joJ9G1rNEWV6CYfi 1+kYUHVUI7ZhfaEBjvBUN+YtiPsPqqfPHTgv7qLdYzzg9PmPMsKJUfeVNY94wG8MJ+GL 3TS0vN+vMLtyDEajyCg+NpopaIm3TWOEAjf+n6D876MsrCZXOR40JNJ/N7olEG+bwsRf 8aCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=NZ5EOH/YzsRN9tEafrH9F5KNurYHSpQbQZ7H2geBXeM=; b=JqGzGclYAS0gNOOyNbWzakKE39s9NdMGMn8bu+yK3JGe4lQA3l4cT1sn3SJ292qfI0 W95xDVDQq/8bX0lzd2sYpBfGAAUVZT8gRpmQgS0CGpMiJVQ1P046poVtkKHZAfkVyufU Z/3JDENeBvbzUDWW/2n4pKZlnZTf9n++RqGHdI54ppT/jQLW/h8Fu38h+GDsfwKi/ATo /26RPzbeK6eKMK6jEbRB6dvAnXjG4Bqihe1WqCaboscYi6azfaWJ+x1hctbEZkRIkK41 ey8ZTVK+i0pkGIW2b9rybDILZSLRTKn48YHqAXn7y7F/pbp575Y6i98LT6PfhEKzBtxu KMBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f12-20020a63dc4c000000b0045f7fc4b812si16313146pgj.295.2022.11.16.17.41.05; Wed, 16 Nov 2022 17:41:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233803AbiKQBZ0 (ORCPT + 90 others); Wed, 16 Nov 2022 20:25:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33610 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233023AbiKQBZY (ORCPT ); Wed, 16 Nov 2022 20:25:24 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8A0D92CDDE for ; Wed, 16 Nov 2022 17:25:22 -0800 (PST) Received: from kwepemi500016.china.huawei.com (unknown [172.30.72.57]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NCMfK51ypzmVsy; Thu, 17 Nov 2022 09:24:57 +0800 (CST) Received: from huawei.com (10.175.100.227) by kwepemi500016.china.huawei.com (7.221.188.220) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 17 Nov 2022 09:25:20 +0800 From: Shang XiaoJing To: , , , , CC: Subject: [PATCH v3 1/2] tracing: Fix memory leak in test_gen_synth_cmd() and test_empty_synth_event() Date: Thu, 17 Nov 2022 09:23:45 +0800 Message-ID: <20221117012346.22647-2-shangxiaojing@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221117012346.22647-1-shangxiaojing@huawei.com> References: <20221117012346.22647-1-shangxiaojing@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.175.100.227] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemi500016.china.huawei.com (7.221.188.220) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org test_gen_synth_cmd() only free buf in fail path, hence buf will leak when there is no failure. Add kfree(buf) to prevent the memleak. The same reason and solution in test_empty_synth_event(). unreferenced object 0xffff8881127de000 (size 2048): comm "modprobe", pid 247, jiffies 4294972316 (age 78.756s) hex dump (first 32 bytes): 20 67 65 6e 5f 73 79 6e 74 68 5f 74 65 73 74 20 gen_synth_test 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 64 5f pid_t next_pid_ backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<0000000039eb1cf5>] 0xffffffffa00083cd [<000000000e8c3bc8>] 0xffffffffa00086ba [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd unreferenced object 0xffff8881127df000 (size 2048): comm "modprobe", pid 247, jiffies 4294972324 (age 78.728s) hex dump (first 32 bytes): 20 65 6d 70 74 79 5f 73 79 6e 74 68 5f 74 65 73 empty_synth_tes 74 20 20 70 69 64 5f 74 20 6e 65 78 74 5f 70 69 t pid_t next_pi backtrace: [<000000004254801a>] kmalloc_trace+0x26/0x100 [<00000000d4db9a3d>] 0xffffffffa0008071 [<00000000c31354a5>] 0xffffffffa00086ce [<00000000c293d1ea>] do_one_initcall+0xdb/0x480 [<00000000aa189e6d>] do_init_module+0x1cf/0x680 [<00000000d513222b>] load_module+0x6a50/0x70a0 [<000000001fd4d529>] __do_sys_finit_module+0x12f/0x1c0 [<00000000b36c4c0f>] do_syscall_64+0x3f/0x90 [<00000000bbf20cf3>] entry_SYSCALL_64_after_hwframe+0x63/0xcd Fixes: 9fe41efaca08 ("tracing: Add synth event generation test module") Signed-off-by: Shang XiaoJing --- changes in v2: - adjust code for clean. --- kernel/trace/synth_event_gen_test.c | 16 ++++++---------- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/kernel/trace/synth_event_gen_test.c b/kernel/trace/synth_event_gen_test.c index 0b15e975d2c2..8d77526892f4 100644 --- a/kernel/trace/synth_event_gen_test.c +++ b/kernel/trace/synth_event_gen_test.c @@ -120,15 +120,13 @@ static int __init test_gen_synth_cmd(void) /* Now generate a gen_synth_test event */ ret = synth_event_trace_array(gen_synth_test, vals, ARRAY_SIZE(vals)); - out: + free: + kfree(buf); return ret; delete: /* We got an error after creating the event, delete it */ synth_event_delete("gen_synth_test"); - free: - kfree(buf); - - goto out; + goto free; } /* @@ -227,15 +225,13 @@ static int __init test_empty_synth_event(void) /* Now trace an empty_synth_test event */ ret = synth_event_trace_array(empty_synth_test, vals, ARRAY_SIZE(vals)); - out: + free: + kfree(buf); return ret; delete: /* We got an error after creating the event, delete it */ synth_event_delete("empty_synth_test"); - free: - kfree(buf); - - goto out; + goto free; } static struct synth_field_desc create_synth_test_fields[] = { -- 2.17.1