ksym_tracer: Fix memory leak

- When remove a filter, we leak entry->ksym_hbp->info.name.

- With CONFIG_FTRAC_SELFTEST enabled, we leak ->info.name:
    # echo ksym_tracer > current_tracer
    # echo 'ksym_selftest_dummy:rw-' > ksym_trace_filter
    # echo nop > current_tracer

Signed-off-by: Li Zefan <lizf@cn.fujitsu.com>
Acked-by: Frederic Weisbecker <fweisbec@gmail.com>
Cc: "K.Prasad" <prasad@linux.vnet.ibm.com>
Cc: Alan Stern <stern@rowland.harvard.edu>
Cc: Steven Rostedt <rostedt@goodmis.org>
LKML-Reference: <4A52E328.8010200@cn.fujitsu.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
This commit is contained in:
Li Zefan
2009-07-07 13:54:48 +08:00
committed by Ingo Molnar
parent 0d109c8f70
commit 558df6c8f7

View File

@@ -179,7 +179,7 @@ static int parse_ksym_trace_str(char *input_string, char **ksymname,
int process_new_ksym_entry(char *ksymname, int op, unsigned long addr) int process_new_ksym_entry(char *ksymname, int op, unsigned long addr)
{ {
struct trace_ksym *entry; struct trace_ksym *entry;
int ret; int ret = -ENOMEM;
if (ksym_filter_entry_count >= KSYM_TRACER_MAX) { if (ksym_filter_entry_count >= KSYM_TRACER_MAX) {
printk(KERN_ERR "ksym_tracer: Maximum limit:(%d) reached. No" printk(KERN_ERR "ksym_tracer: Maximum limit:(%d) reached. No"
@@ -193,12 +193,13 @@ int process_new_ksym_entry(char *ksymname, int op, unsigned long addr)
return -ENOMEM; return -ENOMEM;
entry->ksym_hbp = kzalloc(sizeof(struct hw_breakpoint), GFP_KERNEL); entry->ksym_hbp = kzalloc(sizeof(struct hw_breakpoint), GFP_KERNEL);
if (!entry->ksym_hbp) { if (!entry->ksym_hbp)
kfree(entry); goto err;
return -ENOMEM;
} entry->ksym_hbp->info.name = kstrdup(ksymname, GFP_KERNEL);
if (!entry->ksym_hbp->info.name)
goto err;
entry->ksym_hbp->info.name = ksymname;
entry->ksym_hbp->info.type = op; entry->ksym_hbp->info.type = op;
entry->ksym_addr = entry->ksym_hbp->info.address = addr; entry->ksym_addr = entry->ksym_hbp->info.address = addr;
#ifdef CONFIG_X86 #ifdef CONFIG_X86
@@ -210,14 +211,18 @@ int process_new_ksym_entry(char *ksymname, int op, unsigned long addr)
if (ret < 0) { if (ret < 0) {
printk(KERN_INFO "ksym_tracer request failed. Try again" printk(KERN_INFO "ksym_tracer request failed. Try again"
" later!!\n"); " later!!\n");
kfree(entry->ksym_hbp); ret = -EAGAIN;
kfree(entry); goto err;
return -EAGAIN;
} }
hlist_add_head_rcu(&(entry->ksym_hlist), &ksym_filter_head); hlist_add_head_rcu(&(entry->ksym_hlist), &ksym_filter_head);
ksym_filter_entry_count++; ksym_filter_entry_count++;
return 0; return 0;
err:
if (entry->ksym_hbp)
kfree(entry->ksym_hbp->info.name);
kfree(entry->ksym_hbp);
kfree(entry);
return ret;
} }
static ssize_t ksym_trace_filter_read(struct file *filp, char __user *ubuf, static ssize_t ksym_trace_filter_read(struct file *filp, char __user *ubuf,
@@ -289,7 +294,7 @@ static ssize_t ksym_trace_filter_write(struct file *file,
if (entry->ksym_hbp->info.type != op) if (entry->ksym_hbp->info.type != op)
changed = 1; changed = 1;
else else
goto err_ret; goto out;
break; break;
} }
} }
@@ -298,34 +303,29 @@ static ssize_t ksym_trace_filter_write(struct file *file,
entry->ksym_hbp->info.type = op; entry->ksym_hbp->info.type = op;
if (op > 0) { if (op > 0) {
ret = register_kernel_hw_breakpoint(entry->ksym_hbp); ret = register_kernel_hw_breakpoint(entry->ksym_hbp);
if (ret == 0) { if (ret == 0)
ret = count; goto out;
goto unlock_ret_path;
} }
} else
ret = count;
ksym_filter_entry_count--; ksym_filter_entry_count--;
hlist_del_rcu(&(entry->ksym_hlist)); hlist_del_rcu(&(entry->ksym_hlist));
synchronize_rcu(); synchronize_rcu();
kfree(entry->ksym_hbp->info.name);
kfree(entry->ksym_hbp); kfree(entry->ksym_hbp);
kfree(entry); kfree(entry);
goto err_ret; goto out;
} else { } else {
/* Check for malformed request: (4) */ /* Check for malformed request: (4) */
if (op == 0) if (op == 0)
goto err_ret; goto out;
ret = process_new_ksym_entry(ksymname, op, ksym_addr); ret = process_new_ksym_entry(ksymname, op, ksym_addr);
if (ret)
goto err_ret;
} }
ret = count; out:
goto unlock_ret_path; mutex_unlock(&ksym_tracer_mutex);
err_ret:
kfree(input_string); kfree(input_string);
unlock_ret_path: if (!ret)
mutex_unlock(&ksym_tracer_mutex); ret = count;
return ret; return ret;
} }
@@ -349,13 +349,6 @@ static void ksym_trace_reset(struct trace_array *tr)
ksym_filter_entry_count--; ksym_filter_entry_count--;
hlist_del_rcu(&(entry->ksym_hlist)); hlist_del_rcu(&(entry->ksym_hlist));
synchronize_rcu(); synchronize_rcu();
/* Free the 'input_string' only if reset
* after startup self-test
*/
#ifdef CONFIG_FTRACE_SELFTEST
if (strncmp(entry->ksym_hbp->info.name, KSYM_SELFTEST_ENTRY,
strlen(KSYM_SELFTEST_ENTRY)) != 0)
#endif /* CONFIG_FTRACE_SELFTEST*/
kfree(entry->ksym_hbp->info.name); kfree(entry->ksym_hbp->info.name);
kfree(entry->ksym_hbp); kfree(entry->ksym_hbp);
kfree(entry); kfree(entry);