Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp167642pxk; Sat, 29 Aug 2020 21:36:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwdggkXBfT045s3MtryuIReHYurKxbqPS6IOvw4jENd/5LBBcBNQSr3aTbB6C5AezGLervD X-Received: by 2002:a17:906:b286:: with SMTP id q6mr5893603ejz.99.1598762197217; Sat, 29 Aug 2020 21:36:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598762197; cv=none; d=google.com; s=arc-20160816; b=inDBNpJR0B5mMWA6m+3qGBXeEr670RFrotksZs1C7DwBJ40WGHMFCxeA4uoM2f69d9 zb6KfK8D80V5u6qsTk776NeeXDI3ykDCpqCzF4Mrbt8hWgaTQDRr0ztELLziuHhLbjN2 TIIEQhunRGpBXdWoBluMNkUGcfrFxHhrDHO+r/BSDGAfghDL01IpAY6yhkr+gAz8EGLN 5O4r0sPJaAAN93dX4a4UOa5EuZUbzImKV4ySanblfEK/Y5rYzX+8N5oRI4wkYNA7sR36 VHvK3uhCKJ6lB0MmkOF22JsQQcTmo189VDVtIvS2LW/LfUXBB4WuzA29sAQo4FdDdJ5K ahPg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=xT5hOA3Q9LtPiLNaX+syaa1JIKrmhIwC08WtkEEf/0E=; b=xj/jm6ckbQX90grmx9C7kyphHGh2TnWm2UFB5oK7qX+EbE7qhjGZ2z7tYOZOVJ2DLJ //hOGoO4ziBL9cD3sAvv4a5CjX/r0pnxQrj4VgpgB7Sr58zdRPLaUoFONhAaqv+FkDBo j2e5hp2cgTtn5oHRh6wWHGgX+yEgbvgV57BBaD1PRcyLdnXOsQkje5Q5C+MYd8811ukm nJ9Z5Q9heIdetirnJxrzGtvBCK6Y3IA19aWtWasE9F6KGaiOKIyYlMmF2Sp3BxiNFi3V hp9qwbtiToVI03yh1wv/3o4RotBWjFYAu4OLgxjzgDN0g0m8ecA9etSSlXmQ8S9dt/CD +ybw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=nmmq4yt2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o17si3082653ejg.21.2020.08.29.21.35.45; Sat, 29 Aug 2020 21:36:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=nmmq4yt2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725934AbgH3EeG (ORCPT + 99 others); Sun, 30 Aug 2020 00:34:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725766AbgH3EeD (ORCPT ); Sun, 30 Aug 2020 00:34:03 -0400 Received: from mail-pf1-x443.google.com (mail-pf1-x443.google.com [IPv6:2607:f8b0:4864:20::443]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 66E63C061573; Sat, 29 Aug 2020 21:34:03 -0700 (PDT) Received: by mail-pf1-x443.google.com with SMTP id g207so2754174pfb.1; Sat, 29 Aug 2020 21:34:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=xT5hOA3Q9LtPiLNaX+syaa1JIKrmhIwC08WtkEEf/0E=; b=nmmq4yt2jDGvMdopd9AnAONRTa4o80logLsYKaV7kuMUI6EYuTNs8A+SfJOCmrCiGU 9TBCTO6Zqp1UghiKDOh/jVOVEyMWWfPDJBL4frWHmSCarqcERdZRwSZ/9HXxAcup6yBJ O+GUy7CSvKdtoFN43GxKYsQt8ubs+YyGw/Wszeo8IDodUaLRakVbXoP0n3IG/SdWSSdk 5jY//dKbifCKbHgxugw5kOulA5x/kU6Gh0DFvYakBca5HCLZfTJgvxXzX4PoZdBTYJ7u mkyp+gSWke2XO9T0/gCDh4ej+fpHY0Tror4tF+qoCf0We3od1htIhkJgY1WpnZ+u1mb2 Io8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=xT5hOA3Q9LtPiLNaX+syaa1JIKrmhIwC08WtkEEf/0E=; b=VJD/r6QdEp1wLiuzgsBAei/nyIkw7saOi8YvE120pt5DYXSeo100Kimkk+R0FUlohc dloDlFVheAjDvU4wdYtxGcF+G/7jZqiGT7LTbGVevimeQoeglKQKRQW2aafwMHIIYCJE E+CLmwxWxUO3NXEJqaUIfdCZpUQcjQAnlfC19TwD6nebxnA/DekfJBd8yDSkI5YdnYTv Alhfrr6qrQldOSaqAx4y+Yecdljag+2t/XQbQSj7J3wfIh7kyXxvP3Yyh85GLieTaz1u 4BR/toqhzXV4qzZTvXrDegm5sbaCHevC/S0mvqzT0GOrMyaQyxk+Flk6f2uADXtFwa+u BOrQ== X-Gm-Message-State: AOAM530mDrN86cA4Gh3J9ZdNPpagV21siDWjhw7F4SC8BDjNaCi8lMQI 101Yli3qU+gJ/NFOODIl+Zw= X-Received: by 2002:a63:fe06:: with SMTP id p6mr4181417pgh.337.1598762039854; Sat, 29 Aug 2020 21:33:59 -0700 (PDT) Received: from thinkpad.teksavvy.com (104.36.148.139.aurocloud.com. [104.36.148.139]) by smtp.gmail.com with ESMTPSA id j18sm3740390pgm.30.2020.08.29.21.33.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 29 Aug 2020 21:33:59 -0700 (PDT) From: Rustam Kovhaev To: pbonzini@redhat.com, kvm@vger.kernel.org Cc: linux-kernel@vger.kernel.org, gregkh@linuxfoundation.org, Rustam Kovhaev Subject: [PATCH] KVM: fix memory leak in kvm_io_bus_unregister_dev() Date: Sat, 29 Aug 2020 21:34:05 -0700 Message-Id: <20200830043405.268044-1-rkovhaev@gmail.com> X-Mailer: git-send-email 2.28.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org when kmalloc() fails in kvm_io_bus_unregister_dev(), before removing the bus, we should iterate over all other devices linked to it and call kvm_iodevice_destructor() for them Reported-and-tested-by: syzbot+f196caa45793d6374707@syzkaller.appspotmail.com Link: https://syzkaller.appspot.com/bug?extid=f196caa45793d6374707 Signed-off-by: Rustam Kovhaev --- virt/kvm/kvm_main.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c index 67cd0b88a6b6..646aa7b82548 100644 --- a/virt/kvm/kvm_main.c +++ b/virt/kvm/kvm_main.c @@ -4332,7 +4332,7 @@ int kvm_io_bus_register_dev(struct kvm *kvm, enum kvm_bus bus_idx, gpa_t addr, void kvm_io_bus_unregister_dev(struct kvm *kvm, enum kvm_bus bus_idx, struct kvm_io_device *dev) { - int i; + int i, j; struct kvm_io_bus *new_bus, *bus; bus = kvm_get_bus(kvm, bus_idx); @@ -4351,6 +4351,11 @@ void kvm_io_bus_unregister_dev(struct kvm *kvm, enum kvm_bus bus_idx, GFP_KERNEL_ACCOUNT); if (!new_bus) { pr_err("kvm: failed to shrink bus, removing it completely\n"); + for (j = 0; j < bus->dev_count; j++) { + if (j == i) + continue; + kvm_iodevice_destructor(bus->range[j].dev); + } goto broken; } -- 2.28.0