Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp7611583rwb; Wed, 23 Nov 2022 08:33:10 -0800 (PST) X-Google-Smtp-Source: AA0mqf5ao938p7iE9R7BPGs8915n0whhRWxD0tWx2FnOkn4h1GWo/4aubcSiJAVVWSytPbMSADvl X-Received: by 2002:a17:906:c283:b0:7ae:2277:9fec with SMTP id r3-20020a170906c28300b007ae22779fecmr23453345ejz.623.1669221189552; Wed, 23 Nov 2022 08:33:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669221189; cv=none; d=google.com; s=arc-20160816; b=qH6Q4ZAEBi+hhg1N4qi4yzYz5NHo1W1vN4qtjjfr4ZGAPFv2Dx+LdmA+AyMpISr2qy Msu30hBPsQr09PFPfsEbYYKBRb0pk83NCZZWJfiS2I20ICJ8g6E+b72KYCCvF3vVSlOg dvplk6FyQQm+4ZT82LKbZAaLKyqCw/OdbRpqrG5rkYyQYw0v1AA9vTptS8BDqd5Iv1n1 RZmPEl2NXRudbv7gKUvG+JzPM+aRThqo6KtH0TiTR10BrNJ0uxHjPY55KOS2hr2/8Ud2 /hW9tdCENO6/E6cCUgCD0jA9TmdBWVvJu4e2kER0XtW3v8S5CvZo5ELNYMOxlZM0+nIy 4rHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=qF0ds5iFHrl627nh8yRgTA7rHC8mm06Cb1tPx9j/Fh8=; b=avQ2eXfEHAxLs7zfWX5mCSqnGCWT2LOs73buWBj5cPLtczH3GHbbdwNyEIvw15z5nV kukjESXMAmweg+AZHNgoo6M+3TqRX41LC/eCmhuXTwGMgBAldNBxyDahNBVVt7/EEvXq qkZRb4whyGbHKXfNBo5sMjNW57w+1A9qIhJswljGs+tlejSt7pf1QI2rCVwEymWhHw9w bvzmN7BNuDWg3W6msMTEYiVdR2DBBp32qEs3OYsLeaEzjvTwws/krP1GYF/C4gOTBD2k RWifUj6YWFf2KdIKFOXhidpSnzpB++AHIFpIoNV2o89g8g7gzcq0+UKW+NhLE3UdY33A r4Kw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y16-20020a056402271000b00467570d605dsi16581738edd.614.2022.11.23.08.32.45; Wed, 23 Nov 2022 08:33:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237621AbiKWQD6 (ORCPT + 88 others); Wed, 23 Nov 2022 11:03:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57300 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238509AbiKWQDv (ORCPT ); Wed, 23 Nov 2022 11:03:51 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F104B5E3EA for ; Wed, 23 Nov 2022 08:03:50 -0800 (PST) Received: from dggpeml500023.china.huawei.com (unknown [172.30.72.54]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NHQn54Mp3zqSV2; Wed, 23 Nov 2022 23:59:53 +0800 (CST) Received: from [10.67.110.112] (10.67.110.112) by dggpeml500023.china.huawei.com (7.185.36.114) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Thu, 24 Nov 2022 00:03:49 +0800 Subject: Re: [PATCH 0/2] x86/xen: Fix memory leak issue To: Juergen Gross , , , , , , , CC: , , References: <20221119085923.114889-1-xiujianfeng@huawei.com> <33b9d446-9907-ded6-114e-ce6c43cc3446@suse.com> From: xiujianfeng Message-ID: <22003e76-0aae-e699-f231-85f8313e4a36@huawei.com> Date: Thu, 24 Nov 2022 00:03:48 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.9.1 MIME-Version: 1.0 In-Reply-To: <33b9d446-9907-ded6-114e-ce6c43cc3446@suse.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.110.112] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpeml500023.china.huawei.com (7.185.36.114) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, 在 2022/11/23 23:23, Juergen Gross 写道: > On 19.11.22 09:59, Xiu Jianfeng wrote: >> The new string allocated by kasprintf() is leaked on error path >> >> Xiu Jianfeng (2): >>    x86/xen: Fix memory leak in xen_smp_intr_init{_pv}() >>    x86/xen: Fix memory leak in xen_init_lock_cpu() >> >>   arch/x86/xen/smp.c      | 16 ++++++++++++---- >>   arch/x86/xen/smp_pv.c   |  8 ++++++-- >>   arch/x86/xen/spinlock.c |  3 ++- >>   3 files changed, 20 insertions(+), 7 deletions(-) >> > > Hmm, I think it would make more sense to always store the name generated > via kasprintf() in the percpu variable (independently from succeeding to > bind the irq), and in the related free function to always kfree() it and > set it to NULL again. > > This would result in less code. Thanks, It's good to me, already sent v2. > > > Juergen