lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 Apr 2012 09:41:32 +0800 From: "majianpeng" <majianpeng@...il.com> To: "eric.dumazet" <eric.dumazet@...il.com> Cc: "netdev" <netdev@...r.kernel.org> Subject: [PATCH] net/ipv4:Remove two memleak reports by kmemeleak_not_leak >From 582ed93b990e88110287ed0388bcb9057b1b8591 Mon Sep 17 00:00:00 2001 From: majianpeng <majianpeng@...il.com> Date: Tue, 17 Apr 2012 09:36:26 +0800 Subject: [PATCH] net/ipv4:Remove two memleak reports by kmemeleak_not_leak. Signed-off-by: majianpeng <majianpeng@...il.com> --- net/ipv4/route.c | 8 ++++++-- 1 files changed, 6 insertions(+), 2 deletions(-) diff --git a/net/ipv4/route.c b/net/ipv4/route.c index 167ea10..1984c82 100644 --- a/net/ipv4/route.c +++ b/net/ipv4/route.c @@ -3504,7 +3504,11 @@ int __init ip_rt_init(void) * this nonsense will go away. */ void __init ip_static_sysctl_init(void) -{ - register_sysctl_paths(ipv4_path, ipv4_skeleton); +{ + struct ctl_table_header *ctl_header; + + ctl_header = register_sysctl_paths(ipv4_path, ipv4_skeleton); + if (ctl_header) + kmemleak_not_leak(ctl_header); } #endif -- 1.7.5.4 -------------- majianpeng 2012-04-17 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists