grub-devel.gnu.org archive mirror
 help / color / mirror / Atom feed
From: Juergen Gross <jgross@suse.com>
To: Daniel Kiper <daniel.kiper@oracle.com>
Cc: grub-devel@gnu.org, phcoder@gmail.com, mchang@suse.com,
	xen-devel@lists.xen.org
Subject: Re: [PATCH v4 02/11] xen: avoid memleaks on error
Date: Mon, 22 Feb 2016 10:06:29 +0100	[thread overview]
Message-ID: <56CACF95.4070307@suse.com> (raw)
In-Reply-To: <20160222082432.GM3482@olila.local.net-space.pl>

On 22/02/16 09:24, Daniel Kiper wrote:
> On Mon, Feb 22, 2016 at 07:03:10AM +0100, Juergen Gross wrote:
>> When loading a Xen pv-kernel avoid memory leaks in case of errors.
>>
>> Signed-off-by: Juergen Gross <jgross@suse.com>
>> ---
>>  grub-core/loader/i386/xen.c        |  2 +-
>>  grub-core/loader/i386/xen_fileXX.c | 17 +++++++++++------
>>  2 files changed, 12 insertions(+), 7 deletions(-)
>>
>> diff --git a/grub-core/loader/i386/xen.c b/grub-core/loader/i386/xen.c
>> index 179e89c..f45f70f 100644
>> --- a/grub-core/loader/i386/xen.c
>> +++ b/grub-core/loader/i386/xen.c
>> @@ -563,7 +563,7 @@ grub_cmd_initrd (grub_command_t cmd __attribute__ ((unused)),
>>      {
>>        err = grub_relocator_alloc_chunk_addr (relocator, &ch, max_addr, size);
>>        if (err)
>> -	return err;
>> +	goto fail;
>>
>>        if (grub_initrd_load (&initrd_ctx, argv,
>>  			    get_virtual_current_address (ch)))
>> diff --git a/grub-core/loader/i386/xen_fileXX.c b/grub-core/loader/i386/xen_fileXX.c
>> index 1ba5649..5475819 100644
>> --- a/grub-core/loader/i386/xen_fileXX.c
>> +++ b/grub-core/loader/i386/xen_fileXX.c
>> @@ -35,7 +35,8 @@ parse_xen_guest (grub_elf_t elf, struct grub_xen_file_info *xi,
>>    if (grub_file_read (elf->file, buf, sz) != (grub_ssize_t) sz)
>>      {
>>        if (grub_errno)
>> -	return grub_errno;
>> +	goto out;
>> +      grub_free (buf);
>>        return grub_error (GRUB_ERR_BAD_OS, N_("premature end of file %s"),
>>  			 elf->file->name);
>>      }
>> @@ -123,14 +124,14 @@ parse_xen_guest (grub_elf_t elf, struct grub_xen_file_info *xi,
>>  	{
>>  	  xi->virt_base = grub_strtoull (ptr + sizeof ("VIRT_BASE=") - 1, &ptr, 16);
>>  	  if (grub_errno)
>> -	    return grub_errno;
>> +	    goto out;
>>  	  continue;
>>  	}
>>        if (grub_strncmp (ptr, "VIRT_ENTRY=", sizeof ("VIRT_ENTRY=") - 1) == 0)
>>  	{
>>  	  xi->entry_point = grub_strtoull (ptr + sizeof ("VIRT_ENTRY=") - 1, &ptr, 16);
>>  	  if (grub_errno)
>> -	    return grub_errno;
>> +	    goto out;
>>  	  continue;
>>  	}
>>        if (grub_strncmp (ptr, "HYPERCALL_PAGE=", sizeof ("HYPERCALL_PAGE=") - 1) == 0)
>> @@ -138,7 +139,7 @@ parse_xen_guest (grub_elf_t elf, struct grub_xen_file_info *xi,
>>  	  xi->hypercall_page = grub_strtoull (ptr + sizeof ("HYPERCALL_PAGE=") - 1, &ptr, 16);
>>  	  xi->has_hypercall_page = 1;
>>  	  if (grub_errno)
>> -	    return grub_errno;
>> +	    goto out;
>>  	  continue;
>>  	}
>>        if (grub_strncmp (ptr, "ELF_PADDR_OFFSET=", sizeof ("ELF_PADDR_OFFSET=") - 1) == 0)
>> @@ -146,7 +147,7 @@ parse_xen_guest (grub_elf_t elf, struct grub_xen_file_info *xi,
>>  	  xi->paddr_offset = grub_strtoull (ptr + sizeof ("ELF_PADDR_OFFSET=") - 1, &ptr, 16);
>>  	  has_paddr = 1;
>>  	  if (grub_errno)
>> -	    return grub_errno;
>> +	    goto out;
>>  	  continue;
>>  	}
>>      }
>> @@ -154,7 +155,11 @@ parse_xen_guest (grub_elf_t elf, struct grub_xen_file_info *xi,
>>      xi->hypercall_page = (xi->hypercall_page << 12) + xi->virt_base;
>>    if (!has_paddr)
>>      xi->paddr_offset = xi->virt_base;
>> -  return GRUB_ERR_NONE;
>> +
>> +out:
>> +  grub_free (buf);
>> +
>> +  return grub_errno;
> 
> Are you sure that grub_errno is always set to GRUB_ERR_NONE
> if any GRUB2 function finished successfully? Maybe you should
> set initialize grub_errno with GRUB_ERR_NONE at the beginning
> of parse_xen_guest()?

Yes, probably a good idea.

Juergen



  reply	other threads:[~2016-02-22  9:06 UTC|newest]

Thread overview: 34+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-02-22  6:03 [PATCH v4 00/11] grub-xen: support booting huge pv-domains Juergen Gross
2016-02-22  6:03 ` [PATCH v4 01/11] xen: make xen loader callable multiple times Juergen Gross
2016-02-22  8:09   ` Daniel Kiper
2016-02-22  6:03 ` [PATCH v4 02/11] xen: avoid memleaks on error Juergen Gross
2016-02-22  8:24   ` Daniel Kiper
2016-02-22  9:06     ` Juergen Gross [this message]
2016-02-25 17:38     ` Andrei Borzenkov
2016-02-22  6:03 ` [PATCH v4 03/11] xen: reduce number of global variables in xen loader Juergen Gross
2016-02-22  6:03 ` [PATCH v4 04/11] xen: add elfnote.h to avoid using numbers instead of constants Juergen Gross
2016-02-22  6:03 ` [PATCH v4 05/11] xen: synchronize xen header Juergen Gross
2016-02-22  6:03 ` [PATCH v4 06/11] xen: factor out p2m list allocation into separate function Juergen Gross
2016-02-22  6:03 ` [PATCH v4 07/11] xen: factor out allocation of special pages " Juergen Gross
2016-02-22  6:03 ` [PATCH v4 08/11] xen: factor out allocation of page tables " Juergen Gross
2016-02-22  6:03 ` [PATCH v4 09/11] xen: add capability to load initrd outside of initial mapping Juergen Gross
2016-02-22  8:42   ` Daniel Kiper
2016-02-22  9:18     ` Juergen Gross
2016-02-22 12:24       ` Daniel Kiper
2016-02-22 13:26         ` Juergen Gross
2016-02-22  6:03 ` [PATCH v4 10/11] xen: modify page table construction Juergen Gross
2016-02-22  9:17   ` Daniel Kiper
2016-02-22  9:29     ` Juergen Gross
2016-02-22 12:18       ` Daniel Kiper
2016-02-22 12:30         ` Juergen Gross
2016-02-22 12:48           ` Daniel Kiper
2016-02-22 13:14             ` Juergen Gross
2016-02-25 18:33               ` Andrei Borzenkov
2016-02-29  9:13                 ` Juergen Gross
2016-02-29 12:19                   ` Juergen Gross
2016-03-01  3:52                     ` Andrei Borzenkov
2016-03-01  5:12                       ` [Xen-devel] " Juergen Gross
2016-03-02  9:12                     ` Daniel Kiper
2016-03-02 15:43                       ` Juergen Gross
2016-03-02 16:04                         ` Daniel Kiper
2016-02-22  6:03 ` [PATCH v4 11/11] xen: add capability to load p2m list outside of kernel mapping Juergen Gross

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56CACF95.4070307@suse.com \
    --to=jgross@suse.com \
    --cc=daniel.kiper@oracle.com \
    --cc=grub-devel@gnu.org \
    --cc=mchang@suse.com \
    --cc=phcoder@gmail.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).