Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp193836rwn; Wed, 14 Sep 2022 18:50:21 -0700 (PDT) X-Google-Smtp-Source: AA6agR6oFnd8gNgG6tRWBLiZEsOU+whPw8xBjSHTRBEsgOn/z10/DjYecC1DT+c3+zPRqb7YqTfo X-Received: by 2002:aa7:92d8:0:b0:537:acbf:5e85 with SMTP id k24-20020aa792d8000000b00537acbf5e85mr39653489pfa.61.1663206621007; Wed, 14 Sep 2022 18:50:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663206620; cv=none; d=google.com; s=arc-20160816; b=DL/fYUqtd4jg8pZvAmZXHxVxc21Opk+LggkhjiD1iAFn6ul6gxefz2ymWsP0L0xqHn ceZF+ahWEb7GOFeqyovPK/0644DIW1as+iYt5cO9UrIt0FjqnuIZmHl9PbeQzrl2NZGt G1W1bS0liHioLKHScsgAGxzKRfSnSVkNb2xKifaKL2/u2k1D6jfuw94ny+xSUuRbadmN poY444Jyt/7tXhUoZM3+SQgEEQH/PnsiIqnSFEI9ysF3tmi6Pxb+7/96m4oOW3r88kUd vI/hyCbPWg4vNQcIDo5AtMGRj4ABd5Ux005mZv91+UhshfYA2ELzvtVZcz04v1pAaOt9 zTlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=EwTnh/7nZLMdX1I8Lmf/ScXwHFlgL4yPrUxm6ta5a0Q=; b=F3otgeiNePH9pSgAZqS8H3KmqnhmTqY76S7JwijjGt/gUIUeJRJfX9ubCzKyF8nNwv q9xImHgHzBgg80ARhWTs1o3qMIz9zEB4QDBil+JUyP15pr8H5KXf1ykvQQObIi6TWMyL DGBwdFyptYFA+b5IqMiKcTkSYUGXNUM17/3yXzdhBw5cO9E+UMJW6aGi+jrl33pwtPHl pPK8pNs1GwfxF12JJREF9HJwEUYmAS31k/YYQRK0e8x5PWND9d1jQ1uFs8L038LkkNe6 MEGIGj5LRBQA+qrNBquLGUSzsqVF2y43LNjwJaNH54f6JkMWEgzXv1V2hta6gVFiLeLP XH2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id x32-20020a634a20000000b00438701a1885si16290380pga.48.2022.09.14.18.50.09; Wed, 14 Sep 2022 18:50:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229479AbiIOBfN (ORCPT + 99 others); Wed, 14 Sep 2022 21:35:13 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49672 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229701AbiIOBfL (ORCPT ); Wed, 14 Sep 2022 21:35:11 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BC9522980C for ; Wed, 14 Sep 2022 18:35:10 -0700 (PDT) Received: from dggemv703-chm.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4MSfmp5ZD0zmVNH; Thu, 15 Sep 2022 09:31:22 +0800 (CST) Received: from kwepemm600005.china.huawei.com (7.193.23.191) by dggemv703-chm.china.huawei.com (10.3.19.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Thu, 15 Sep 2022 09:35:08 +0800 Received: from huawei.com (10.69.192.56) by kwepemm600005.china.huawei.com (7.193.23.191) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 15 Sep 2022 09:35:08 +0800 From: Longfang Liu To: , , CC: , , , Subject: [PATCH 1/5] hisi_acc_vfio_pci: Fixes a memory leak bug Date: Thu, 15 Sep 2022 09:31:53 +0800 Message-ID: <20220915013157.60771-2-liulongfang@huawei.com> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20220915013157.60771-1-liulongfang@huawei.com> References: <20220915013157.60771-1-liulongfang@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.69.192.56] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To kwepemm600005.china.huawei.com (7.193.23.191) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org During the stop copy phase of live migration, the driver allocates a memory for the migrated data to save the data. When an exception occurs when the driver reads device data, the driver will report an error to qemu and exit the current migration state. But this memory is not released, which will lead to a memory leak problem. So we need to add a memory release operation. Reviewed-by: Shameer Kolothum Signed-off-by: Longfang Liu --- drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c index ea762e28c1cc..8fd68af2ed5f 100644 --- a/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c +++ b/drivers/vfio/pci/hisilicon/hisi_acc_vfio_pci.c @@ -828,15 +828,15 @@ hisi_acc_vf_stop_copy(struct hisi_acc_vf_core_device *hisi_acc_vdev) return ERR_PTR(err); } - stream_open(migf->filp->f_inode, migf->filp); - mutex_init(&migf->lock); - ret = vf_qm_state_save(hisi_acc_vdev, migf); if (ret) { - fput(migf->filp); + kfree(migf); return ERR_PTR(ret); } + stream_open(migf->filp->f_inode, migf->filp); + mutex_init(&migf->lock); + return migf; } -- 2.33.0