x86/xen: Fix memory leak in xen_init_lock_cpu()
authorXiu Jianfeng <xiujianfeng@huawei.com>
Wed, 23 Nov 2022 15:58:58 +0000 (23:58 +0800)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 7 Jan 2023 11:07:15 +0000 (12:07 +0100)
[ Upstream commit ca84ce153d887b1dc8b118029976cc9faf2a9b40 ]

In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),
if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead
to a memory leak issue, fix it.

Fixes: 2d9e1e2f58b5 ("xen: implement Xen-specific spinlocks")
Signed-off-by: Xiu Jianfeng <xiujianfeng@huawei.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
Link: https://lore.kernel.org/r/20221123155858.11382-3-xiujianfeng@huawei.com
Signed-off-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
arch/x86/xen/spinlock.c

index 44bf8a22c97b85929b7239a0f4f5b793d297c68b..4e540958ea3690054501601ba8a674b1e7376baa 100644 (file)
@@ -80,6 +80,7 @@ void xen_init_lock_cpu(int cpu)
             cpu, per_cpu(lock_kicker_irq, cpu));
 
        name = kasprintf(GFP_KERNEL, "spinlock%d", cpu);
+       per_cpu(irq_name, cpu) = name;
        irq = bind_ipi_to_irqhandler(XEN_SPIN_UNLOCK_VECTOR,
                                     cpu,
                                     dummy_handler,
@@ -90,7 +91,6 @@ void xen_init_lock_cpu(int cpu)
        if (irq >= 0) {
                disable_irq(irq); /* make sure it's never delivered */
                per_cpu(lock_kicker_irq, cpu) = irq;
-               per_cpu(irq_name, cpu) = name;
        }
 
        printk("cpu %d spinlock event irq %d\n", cpu, irq);
@@ -103,6 +103,8 @@ void xen_uninit_lock_cpu(int cpu)
        if (!xen_pvspin)
                return;
 
+       kfree(per_cpu(irq_name, cpu));
+       per_cpu(irq_name, cpu) = NULL;
        /*
         * When booting the kernel with 'mitigations=auto,nosmt', the secondary
         * CPUs are not activated, and lock_kicker_irq is not initialized.
@@ -113,8 +115,6 @@ void xen_uninit_lock_cpu(int cpu)
 
        unbind_from_irqhandler(irq, NULL);
        per_cpu(lock_kicker_irq, cpu) = -1;
-       kfree(per_cpu(irq_name, cpu));
-       per_cpu(irq_name, cpu) = NULL;
 }