Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2784503pxk; Tue, 15 Sep 2020 02:11:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy904idROIvQ4kbBmczC/oesDS8O4KPIrMyeThSJ5obPFSN+9Fh5aodx/uzpwwKCEa2kX/f X-Received: by 2002:a17:906:f43:: with SMTP id h3mr18432439ejj.338.1600161095994; Tue, 15 Sep 2020 02:11:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600161095; cv=none; d=google.com; s=arc-20160816; b=AIKt+OxDcxTjPZsAgccNBV5KzCWMNBXE9KoG6cSRFYTtGLaXwCzIayO7Qx12s0oU+1 X09EaW9NbnAS+mCnKh9QW1fp0tXOrP8htvk0O0oGSTlcxUQZZUP6rWx1Q+O01v6ppeR2 YL2evgi5qd0RDllxe2I5yVe8G5/zTyudx5R0XASMPc6KD7DQe5lBqfM148Y4NJ5dHzRc glFujBvp/DoXfqGRGpbCWekeEwHGsx0+no+aNsy69k+wJnAlAU+LFLm+dyg5/qNMW4zB zZyqtHzQ/8g5AWsQ7u4eHTWqKxjpKTxn36a/m4E0jGO3hUH1+Gcj2fuoDVXCMbHIbSiT XNNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=+RaRr1rkKL0I9rBWtqad9Dv8rz6pmc1o4Jibb7XjUX0=; b=NvM76/uYwSrTYIqemWynRqEFx774Kju2KqVCXCVhX8r3X/FW0v4jirycQOXuzktPPo heBqn/+V9NSM7kx0CogvZuAl60xkrUfHfeOd+yNJ6WOxysHMCjwIL2MqHx4D2ba9lC3w 5fTlr3klgd9s/iCVfqhJGKivuT2dsQcG4L5WsTk3/hFbhU3WgPVyu/As6h20eFVf97R6 VbATQVc8hV5EFzc98bmaQsKYp2MGouYWF5w5TQeTfbWFwdbMBJ8WdjBfwy3paq4EJVEC SChaOYUQiS9KIBDTxS+sl+gRK6WaW0j51WhAnoBW55J4IWTASQesJn75iVY5xTwDtRAg Nz9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CAGnDQqu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m3si9069184edr.29.2020.09.15.02.11.13; Tue, 15 Sep 2020 02:11:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=CAGnDQqu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726208AbgIOJIQ (ORCPT + 99 others); Tue, 15 Sep 2020 05:08:16 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:36291 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726222AbgIOJII (ORCPT ); Tue, 15 Sep 2020 05:08:08 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1600160883; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+RaRr1rkKL0I9rBWtqad9Dv8rz6pmc1o4Jibb7XjUX0=; b=CAGnDQquDI0UBYULSkJZ81Na3KZpVh1G/0e26kaAqREp0qm+9z/Jqxm59ETfwTq8fv2cHH LRJrpP0oZBGkRVTxw0QmE4uUXW5harlQO30FA6P8PqT8/TYWuzTIJ7LTvXFzSNt+t4k4WC 1BSfYKW2N8xLOb1/WZqLQ+2Vod2JKHs= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-365-45ZhZMqrOEitsyteJeWAGg-1; Tue, 15 Sep 2020 05:08:00 -0400 X-MC-Unique: 45ZhZMqrOEitsyteJeWAGg-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 0AD6B640B3; Tue, 15 Sep 2020 09:07:57 +0000 (UTC) Received: from starship (unknown [10.35.207.20]) by smtp.corp.redhat.com (Postfix) with ESMTP id 061AB5DE82; Tue, 15 Sep 2020 09:07:33 +0000 (UTC) Message-ID: <922e825c090892f22d40a469fef229d62f40af5e.camel@redhat.com> Subject: Re: [PATCH] SVM: nSVM: fix resource leak on error path From: Maxim Levitsky To: Alex Dewar Cc: Paolo Bonzini , Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , Thomas Gleixner , Ingo Molnar , Borislav Petkov , x86@kernel.org, "H. Peter Anvin" , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Date: Tue, 15 Sep 2020 12:07:25 +0300 In-Reply-To: <20200914194557.10158-1-alex.dewar90@gmail.com> References: <20200914194557.10158-1-alex.dewar90@gmail.com> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.3 (3.36.3-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2020-09-14 at 20:45 +0100, Alex Dewar wrote: > In svm_set_nested_state(), if nested_svm_vmrun_msrpm() returns false, > then variables save and ctl will leak. Fix this. > > Fixes: 772b81bb2f9b ("SVM: nSVM: setup nested msr permission bitmap on nested state load") > Signed-off-by: Alex Dewar > --- > arch/x86/kvm/svm/nested.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c > index 598a769f1961..85f572cbabe4 100644 > --- a/arch/x86/kvm/svm/nested.c > +++ b/arch/x86/kvm/svm/nested.c > @@ -1148,7 +1148,7 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu, > nested_prepare_vmcb_control(svm); > > if (!nested_svm_vmrun_msrpm(svm)) > - return -EINVAL; > + goto out_free; /* ret == -EINVAL */ > > out_set_gif: > svm_set_gif(svm, !!(kvm_state->flags & KVM_STATE_NESTED_GIF_SET)); I think that this patch is based on unmerged patch, since I don't see any memory allocation in nested_svm_vmrun_msrpm, nor out_free label. in nether kvm/master, kvm/queue nor in upstream/master If I recall correctly that would be something about allocating ctrl/save dynamically rather than on stack. Best regards, Maxim Levitsky