lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Feb 2022 14:04:31 +0100 From: Frederic Weisbecker <frederic@...nel.org> To: Peter Zijlstra <peterz@...radead.org> Cc: LKML <linux-kernel@...r.kernel.org>, Frederic Weisbecker <frederic@...nel.org>, Tejun Heo <tj@...nel.org>, Christoph Lameter <cl@...two.de>, Juri Lelli <juri.lelli@...hat.com>, Alex Belits <abelits@...vell.com>, Nitesh Lal <nilal@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, Paul Gortmaker <paul.gortmaker@...driver.com>, Nicolas Saenz <nsaenzju@...hat.com>, "Paul E . McKenney" <paulmck@...nel.org>, Phil Auld <pauld@...hat.com>, Marcelo Tosatti <mtosatti@...hat.com>, Zefan Li <lizefan.x@...edance.com> Subject: [PATCH 6/8] sched/isolation: Consolidate error handling Centralize the mask freeing and return value for the error path. This makes potential leaks more visible. Reviewed-by: Juri Lelli <juri.lelli@...hat.com> Reviewed-by: Phil Auld <pauld@...hat.com> Signed-off-by: Frederic Weisbecker <frederic@...nel.org> Cc: Thomas Gleixner <tglx@...utronix.de> Cc: Juri Lelli <juri.lelli@...hat.com> Cc: Marcelo Tosatti <mtosatti@...hat.com> Cc: Nitesh Lal <nilal@...hat.com> Cc: Nicolas Saenz <nsaenzju@...hat.com> Cc: Peter Zijlstra <peterz@...radead.org> Cc: Christoph Lameter <cl@...two.de> Cc: Tejun Heo <tj@...nel.org> Cc: Zefan Li <lizefan.x@...edance.com> Cc: Alex Belits <abelits@...vell.com> Cc: Paul Gortmaker <paul.gortmaker@...driver.com> Cc: Paul E. McKenney <paulmck@...nel.org> --- kernel/sched/isolation.c | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) diff --git a/kernel/sched/isolation.c b/kernel/sched/isolation.c index 23085e665faa..828dacec483e 100644 --- a/kernel/sched/isolation.c +++ b/kernel/sched/isolation.c @@ -92,12 +92,12 @@ void __init housekeeping_init(void) static int __init housekeeping_setup(char *str, enum hk_flags flags) { cpumask_var_t non_housekeeping_mask, housekeeping_staging; + int err = 0; alloc_bootmem_cpumask_var(&non_housekeeping_mask); if (cpulist_parse(str, non_housekeeping_mask) < 0) { pr_warn("Housekeeping: nohz_full= or isolcpus= incorrect CPU range\n"); - free_bootmem_cpumask_var(non_housekeeping_mask); - return 0; + goto free_non_housekeeping_mask; } alloc_bootmem_cpumask_var(&housekeeping_staging); @@ -119,30 +119,29 @@ static int __init housekeeping_setup(char *str, enum hk_flags flags) } else { if (!cpumask_equal(housekeeping_staging, housekeeping_mask)) { pr_warn("Housekeeping: nohz_full= must match isolcpus=\n"); - free_bootmem_cpumask_var(housekeeping_staging); - free_bootmem_cpumask_var(non_housekeeping_mask); - return 0; + goto free_housekeeping_staging; } } - free_bootmem_cpumask_var(housekeeping_staging); - if ((flags & HK_FLAG_TICK) && !(housekeeping_flags & HK_FLAG_TICK)) { if (IS_ENABLED(CONFIG_NO_HZ_FULL)) { tick_nohz_full_setup(non_housekeeping_mask); } else { pr_warn("Housekeeping: nohz unsupported." " Build with CONFIG_NO_HZ_FULL\n"); - free_bootmem_cpumask_var(non_housekeeping_mask); - return 0; + goto free_housekeeping_staging; } } housekeeping_flags |= flags; + err = 1; +free_housekeeping_staging: + free_bootmem_cpumask_var(housekeeping_staging); +free_non_housekeeping_mask: free_bootmem_cpumask_var(non_housekeeping_mask); - return 1; + return err; } static int __init housekeeping_nohz_full_setup(char *str) -- 2.25.1
Powered by blists - more mailing lists