Received: by 2002:a05:6358:7058:b0:131:369:b2a3 with SMTP id 24csp1352830rwp; Thu, 13 Jul 2023 09:33:17 -0700 (PDT) X-Google-Smtp-Source: APBJJlHYgGAYiuf9EVFlkl3HzvhNsQ2OXPPctoIGmO+DcI+14aXAp/KErt9R64/FXeJVvYeiqzci X-Received: by 2002:a05:6a20:104a:b0:127:63a4:c588 with SMTP id gt10-20020a056a20104a00b0012763a4c588mr1306277pzc.20.1689265997463; Thu, 13 Jul 2023 09:33:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689265997; cv=none; d=google.com; s=arc-20160816; b=NGpOHJ4KWGbm9148S4HFuRIlObSr/T0cqqgSFC2eE3BQ0OxAh2UUfcXkraXoVnrm/G fU0KtIsuGk0zkaSbjl0q40VmtvSEaET9RV2XY8Y5TJMU7Ts81yhvykmiTmAIex17Lm72 3Jq22XiW/QJI3legK39EqEYnfrS31wYjaI8jWVc8yvqyrW3badFSSU4769QaByvyxfVj EngbIPssrvVvlXILFDHRPIVlMimmMf4WPoLWjv15xdyvax7u6k5h4AlK9nBE2YSbSQ02 uE6BPbDYVlR3qYgn5rWp08049pLbjc36BFB0j8GGFAsnwqYbz94dcWe+qTNjNLg8i0cY YUmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=0QcKYMwrtALIOXgGcBWjTmq5VugIxzi7r00CpKbhP18=; fh=YnVyIEcFvDD9bB9RjPWxIWHfBLuTviS9p0IMKoOVQMY=; b=SwZ9sUIirNVTBxmRGjA/r4+NoY0gn6anUAbr+U8LOb6ZFVSEenvb8ckpGSTJ4s+AsR koUrWdPke7cxonpy8t27KEGAuasUXT51UYpD37wFmkTL/57rmJrsR04HA44s9Pg+1tRG fZ+52O0JridAJLZ1ppUvZ55UVHxHItwhhU4tqZ9g+HkfUVsyyqPnGkuOktwYSggWF5UQ cS6T3y0+ZkrOdGl0PiEMpj8Mw85Bkr/f8YbtKAKjiAcIFBtTjoBqaJWAEj2gEbrfrV7y S53l0jid4bfFbJVOkEWligy/4CB2kYfeNeFd5uds8fpbMXLPWkZVX2GI9P58DSPx/HOQ fkYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e10-20020a63690a000000b0052c73367c13si5193718pgc.871.2023.07.13.09.33.05; Thu, 13 Jul 2023 09:33:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231852AbjGMPrJ (ORCPT + 99 others); Thu, 13 Jul 2023 11:47:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48598 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232700AbjGMPrF (ORCPT ); Thu, 13 Jul 2023 11:47:05 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6F2F826AE; Thu, 13 Jul 2023 08:47:03 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0504561087; Thu, 13 Jul 2023 15:47:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E2B4AC433C8; Thu, 13 Jul 2023 15:47:01 +0000 (UTC) Date: Thu, 13 Jul 2023 11:47:00 -0400 From: Steven Rostedt To: LKML , Linux Trace Kernel Cc: Masami Hiramatsu , Mark Rutland , Zheng Yejian Subject: [PATCH 2/2] tracing: Add free_trace_iter_content() helper function Message-ID: <20230713114700.450e7a17@gandalf.local.home> In-Reply-To: <20230713114510.04c452ca@gandalf.local.home> References: <20230713114510.04c452ca@gandalf.local.home> X-Mailer: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Steven Rostedt (Google)" As the trace iterator is created and used by various interfaces, the clean up of it needs to be consistent. Create a free_trace_iter_content() helper function that frees the content of the iterator and use that to clean it up in all places that it is used. Signed-off-by: Steven Rostedt (Google) --- kernel/trace/trace.c | 40 ++++++++++++++++++++++++++++------------ 1 file changed, 28 insertions(+), 12 deletions(-) diff --git a/kernel/trace/trace.c b/kernel/trace/trace.c index 1c370ffbe062..3f38250637e2 100644 --- a/kernel/trace/trace.c +++ b/kernel/trace/trace.c @@ -4815,6 +4815,25 @@ static const struct seq_operations tracer_seq_ops = { .show = s_show, }; +/* + * Note, as iter itself can be allocated and freed in different + * ways, this function is only used to free its content, and not + * the iterator itself. The only requirement to all the allocations + * is that it must zero all fields (kzalloc), as freeing works with + * ethier allocated content or NULL. + */ +static void free_trace_iter_content(struct trace_iterator *iter) +{ + /* The fmt is either NULL, allocated or points to static_fmt_buf */ + if (iter->fmt != static_fmt_buf) + kfree(iter->fmt); + + kfree(iter->temp); + kfree(iter->buffer_iter); + mutex_destroy(&iter->mutex); + free_cpumask_var(iter->started); +} + static struct trace_iterator * __tracing_open(struct inode *inode, struct file *file, bool snapshot) { @@ -4922,8 +4941,7 @@ __tracing_open(struct inode *inode, struct file *file, bool snapshot) fail: mutex_unlock(&trace_types_lock); - kfree(iter->temp); - kfree(iter->buffer_iter); + free_trace_iter_content(iter); release: seq_release_private(inode, file); return ERR_PTR(-ENOMEM); @@ -5002,11 +5020,7 @@ static int tracing_release(struct inode *inode, struct file *file) mutex_unlock(&trace_types_lock); - mutex_destroy(&iter->mutex); - free_cpumask_var(iter->started); - kfree(iter->fmt); - kfree(iter->temp); - kfree(iter->buffer_iter); + free_trace_iter_content(iter); seq_release_private(inode, file); return 0; @@ -6709,7 +6723,12 @@ static int tracing_open_pipe(struct inode *inode, struct file *filp) } trace_seq_init(&iter->seq); - iter->trace = tr->current_trace; + + iter->trace = kzalloc(sizeof(*iter->trace), GFP_KERNEL); + if (!iter->trace) + goto fail; + + *iter->trace = *tr->current_trace; if (!alloc_cpumask_var(&iter->started, GFP_KERNEL)) { ret = -ENOMEM; @@ -6763,10 +6782,7 @@ static int tracing_release_pipe(struct inode *inode, struct file *file) mutex_unlock(&trace_types_lock); - free_cpumask_var(iter->started); - kfree(iter->fmt); - kfree(iter->temp); - mutex_destroy(&iter->mutex); + free_trace_iter_content(iter); kfree(iter); trace_array_put(tr); -- 2.40.1