Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1697193rwb; Sat, 19 Nov 2022 01:38:25 -0800 (PST) X-Google-Smtp-Source: AA0mqf6ZwRGB0yrYOwU0uMRuYJXJO6oZEYwMPuKHDj23LEaindgNdfVcELD50tMWG1gKaAVlruz2 X-Received: by 2002:a17:90a:688a:b0:213:11ab:9a41 with SMTP id a10-20020a17090a688a00b0021311ab9a41mr11733601pjd.192.1668850705280; Sat, 19 Nov 2022 01:38:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668850705; cv=none; d=google.com; s=arc-20160816; b=KXaQiL+NuDXAlPupMD/RUea5wVtH+6pftQcx6C+DLPn5ooLLxrO7iBIi/IMmcELZs8 wx5VNLMAnE0x7R1PdojEl8RodYNK+G1HRF+y1D86G2Dkf1vi5GUYuOi7HGs1ZOTN7QvK b7EzqQbVz+0L66qG7Fd9mvkWKl+f0nR5SsA9fT2G2XXJjiYPTI6H8lER0qbrNrpiqhDr ECM4nqaBeP5ZuISoupV8zxIPd9/k7/KebFRoSz8JJHJzFY2yiMhe7Hpo9ntDhnpDljg9 IU4GRjY7iWz59evdFYTqwusOD0DEtS6GlES7XnCnKTv9R5WJCF/b9yy6Bq4OmuaZXbrJ AYDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=vfjdOV/y5aE3k6OtfP3nyjtXWwtXJBkqYyY5/oM3TFI=; b=sgiw6kAkNWtxkqOCdEtkt9Gtja12UU5k6nJthyTjEIPUecrzmMRB9KABSn8uMjgMSU ZVDs7jbddiJxCjgEPqu4f6x98x96sAgK8j57fWMaBWnXHhX6dF84AH8SHwV4qlu0L5wu 3shHRFwDL9cG02jaRm8+gw/JIEtBNDoPpduH8Ms0zMf5DPaUMaF+GHipH91wz6sesRlR 9mKrBwliyPuUuQueTKYYMALsjpYWhCuTPKDSmrqgPECM26SIGEOhf+zNrbAA0xez2v0M 2RB4y6ufkkHNJtSrODF16g1YlZEaONhwte1peBE4yx82tpP3OQnzAXc1vHx6Cl0wADmk HYvQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lr18-20020a17090b4b9200b0020982a8dbf2si709202pjb.96.2022.11.19.01.38.09; Sat, 19 Nov 2022 01:38:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231666AbiKSJCf (ORCPT + 90 others); Sat, 19 Nov 2022 04:02:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34240 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230266AbiKSJCc (ORCPT ); Sat, 19 Nov 2022 04:02:32 -0500 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEEE79DBA5 for ; Sat, 19 Nov 2022 01:02:31 -0800 (PST) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.55]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4NDndf0h6HzFqQ9; Sat, 19 Nov 2022 16:59:18 +0800 (CST) Received: from ubuntu1804.huawei.com (10.67.174.58) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 19 Nov 2022 17:02:29 +0800 From: Xiu Jianfeng To: , , , , , , , CC: , , Subject: [PATCH 0/2] x86/xen: Fix memory leak issue Date: Sat, 19 Nov 2022 16:59:21 +0800 Message-ID: <20221119085923.114889-1-xiujianfeng@huawei.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.174.58] X-ClientProxiedBy: dggems702-chm.china.huawei.com (10.3.19.179) To dggpeml500023.china.huawei.com (7.185.36.114) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The new string allocated by kasprintf() is leaked on error path Xiu Jianfeng (2): x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() x86/xen: Fix memory leak in xen_init_lock_cpu() arch/x86/xen/smp.c | 16 ++++++++++++---- arch/x86/xen/smp_pv.c | 8 ++++++-- arch/x86/xen/spinlock.c | 3 ++- 3 files changed, 20 insertions(+), 7 deletions(-) -- 2.17.1