Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp6649345rwl; Tue, 4 Apr 2023 16:46:38 -0700 (PDT) X-Google-Smtp-Source: AKy350aoGj079EMLtQUoL/kDbze+3P/Lp00x48E+bZabBvIW/tq33qUWkeKe9KsJpSWTR98uHhkb X-Received: by 2002:a17:906:a08f:b0:92f:a6d3:b941 with SMTP id q15-20020a170906a08f00b0092fa6d3b941mr1337889ejy.30.1680651998152; Tue, 04 Apr 2023 16:46:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680651998; cv=none; d=google.com; s=arc-20160816; b=pKaj/8L1GnaWGoUyLRKeZTVyrnefjtdWPKXoSHHcv0PFZBcwKtxoW1U3pGosmLQr61 sdOMPHXGu/v6ERN37yMcEL8bSxZIE0NJMl8S0wIpUL+amyi+XxEGJR0gCSK8CSVr8nJD yTeV/p7sLiHic45mmGHoodjbhdulxX5489Y8TcfGrVWPbCI/4kxEcyw/RDJWHp7osw25 KdMu4foCMVryV3i/Eh5skOiG8MxXQof57OOnnESlaGClcZvhvX1YnZ4Ro8dPfFsY/gkn YGeHlSzLCB0j1gy8bHOB9F4h8ePFL6WBMqydOL7nYfDt3J7g2LOoNPmSI1wTA1hQWjCR CA9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:subject:cc:to:from:date; bh=or5BpsZc36WuOYTxTU0NhbcdTRsotGuVLZ4ifWRsLbY=; b=XpBeJF64Tt03DJXFcPtg6wk+9TGFIob4Be6z96bdqs+zhQigvehsfqnuN7PGgwr+wy 5luqg3Svrf5AAtttG7Gzp3iqWDzTN14P1nAq0TY+cH+RSLDvZ2Yp121U3GAiHWv8a8Rp 1w6a5mYdR05oT6h9GKLBe9xWGxO3v+XQs+8UJ5fIV1rkyzq0AeBn8UcWxvhv9blIKJG8 1o2uRQKR6Rp6u5pbMoNIgR5x70P9/XEIr3fZqfAsrX2pgN3wgxT0T8kktKItA3VDos/+ 9eqs70+GukWCKoAQS2W6dKD529EiCwWDp4t2cW8cUG0nKxCwyi2CKDvhIpL1gqta1qUV FWjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pv6-20020a170907208600b0092679d231easi7916025ejb.332.2023.04.04.16.46.13; Tue, 04 Apr 2023 16:46:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236610AbjDDXpM (ORCPT + 99 others); Tue, 4 Apr 2023 19:45:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236619AbjDDXpK (ORCPT ); Tue, 4 Apr 2023 19:45:10 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 269824216; Tue, 4 Apr 2023 16:45:08 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6BF1B63AC8; Tue, 4 Apr 2023 23:45:07 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B5AB4C433D2; Tue, 4 Apr 2023 23:45:05 +0000 (UTC) Date: Tue, 4 Apr 2023 19:45:04 -0400 From: Steven Rostedt To: LKML , Linux Trace Kernel Cc: Masami Hiramatsu , Andrew Morton , Mark Rutland , Mirsad Goran Todorovac , Thorsten Leemhuis , Ulf Hansson , Eric Biggers Subject: [PATCH] tracing: Free error logs of tracing instances Message-ID: <20230404194504.5790b95f@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Steven Rostedt (Google)" When a tracing instance is removed, the error messages that hold errors that occurred in the instance needs to be freed. The following reports a memory leak: # cd /sys/kernel/tracing # mkdir instances/foo # echo 'hist:keys=x' > instances/foo/events/sched/sched_switch/trigger # cat instances/foo/error_log [ 117.404795] hist:sched:sched_switch: error: Couldn't find field Command: hist:keys=x ^ # rmdir instances/foo Then check for memory leaks: # echo scan > /sys/kernel/debug/kmemleak # cat /sys/kernel/debug/kmemleak unreferenced object 0xffff88810d8ec700 (size 192): comm "bash", pid 869, jiffies 4294950577 (age 215.752s) hex dump (first 32 bytes): 60 dd 68 61 81 88 ff ff 60 dd 68 61 81 88 ff ff `.ha....`.ha.... a0 30 8c 83 ff ff ff ff 26 00 0a 00 00 00 00 00 .0......&....... backtrace: [<00000000dae26536>] kmalloc_trace+0x2a/0xa0 [<00000000b2938940>] tracing_log_err+0x277/0x2e0 [<000000004a0e1b07>] parse_atom+0x966/0xb40 [<0000000023b24337>] parse_expr+0x5f3/0xdb0 [<00000000594ad074>] event_hist_trigger_parse+0x27f8/0x3560 [<00000000293a9645>] trigger_process_regex+0x135/0x1a0 [<000000005c22b4f2>] event_trigger_write+0x87/0xf0 [<000000002cadc509>] vfs_write+0x162/0x670 [<0000000059c3b9be>] ksys_write+0xca/0x170 [<00000000f1cddc00>] do_syscall_64+0x3e/0xc0 [<00000000868ac68c>] entry_SYSCALL_64_after_hwframe+0x72/0xdc unreferenced object 0xffff888170c35a00 (size 32): comm "bash", pid 869, jiffies 4294950577 (age 215.752s) hex dump (first 32 bytes): 0a 20 20 43 6f 6d 6d 61 6e 64 3a 20 68 69 73 74 . Command: hist 3a 6b 65 79 73 3d 78 0a 00 00 00 00 00 00 00 00 :keys=x......... backtrace: [<000000006a747de5>] __kmalloc+0x4d/0x160 [<000000000039df5f>] tracing_log_err+0x29b/0x2e0 [<000000004a0e1b07>] parse_atom+0x966/0xb40 [<0000000023b24337>] parse_expr+0x5f3/0xdb0 [<00000000594ad074>] event_hist_trigger_parse+0x27f8/0x3560 [<00000000293a9645>] trigger_process_regex+0x135/0x1a0 [<000000005c22b4f2>] event_trigger_write+0x87/0xf0 [<000000002cadc509>] vfs_write+0x162/0x670 [<0000000059c3b9be>] ksys_write+0xca/0x170 [<00000000f1cddc00>] do_syscall_64+0x3e/0xc0 [<00000000868ac68c>] entry_SYSCALL_64_after_hwframe+0x72/0xdc The problem is that the error log needs to be freed when the instance is removed. Link: https://lore.kernel.org/lkml/76134d9f-a5ba-6a0d-37b3-28310b4a1e91@alu.unizg.hr/ Cc: stable@vger.kernel.org Fixes: 2f754e771b1a6 ("tracing: Have the error logs show up in the proper instances") Reported-by: Mirsad Goran Todorovac Signed-off-by: Steven Rostedt (Google) --- kernel/trace/trace.c | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 8ae51f1dea8e..352a804b016d 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -9516,6 +9516,7 @@ static int __remove_instance(struct trace_array *tr) tracefs_remove(tr->dir); free_percpu(tr->last_func_repeats); free_trace_buffers(tr); + clear_tracing_err_log(tr); for (i = 0; i < tr->nr_topts; i++) { kfree(tr->topts[i].topts); -- 2.39.2