[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20221119085923.114889-1-xiujianfeng@huawei.com>
Date: Sat, 19 Nov 2022 16:59:21 +0800
From: Xiu Jianfeng <xiujianfeng@...wei.com>
To: <jgross@...e.com>, <boris.ostrovsky@...cle.com>,
<tglx@...utronix.de>, <mingo@...hat.com>, <bp@...en8.de>,
<dave.hansen@...ux.intel.com>, <hpa@...or.com>, <jeremy@...p.org>
CC: <x86@...nel.org>, <xen-devel@...ts.xenproject.org>,
<linux-kernel@...r.kernel.org>
Subject: [PATCH 0/2] x86/xen: Fix memory leak issue
The new string allocated by kasprintf() is leaked on error path
Xiu Jianfeng (2):
x86/xen: Fix memory leak in xen_smp_intr_init{_pv}()
x86/xen: Fix memory leak in xen_init_lock_cpu()
arch/x86/xen/smp.c | 16 ++++++++++++----
arch/x86/xen/smp_pv.c | 8 ++++++--
arch/x86/xen/spinlock.c | 3 ++-
3 files changed, 20 insertions(+), 7 deletions(-)
--
2.17.1
Powered by blists - more mailing lists