[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <e902e684-5953-4e71-82b3-28166666bc6d@kadam.mountain>
Date: Thu, 7 Sep 2023 14:47:20 +0300
From: Dan Carpenter <dan.carpenter@...aro.org>
To: Geert Uytterhoeven <geert@...ux-m68k.org>
Cc: oe-kbuild@...ts.linux.dev, Rob Herring <robh@...nel.org>,
lkp@...el.com, oe-kbuild-all@...ts.linux.dev,
linux-kernel@...r.kernel.org
Subject: Re: drivers/of/dynamic.c:935 of_changeset_action() warn: possible
memory leak of 'ce'
On Thu, Sep 07, 2023 at 01:30:09PM +0200, Geert Uytterhoeven wrote:
> Hi Dan,
>
> On Thu, Sep 7, 2023 at 12:52 PM Dan Carpenter <dan.carpenter@...aro.org> wrote:
> > tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
> > head: 99d99825fc075fd24b60cc9cf0fb1e20b9c16b0f
> > commit: 914d9d831e6126a6e7a92e27fcfaa250671be42c of: dynamic: Refactor action prints to not use "%pOF" inside devtree_lock
> > config: x86_64-randconfig-161-20230831 (https://download.01.org/0day-ci/archive/20230901/202309011059.EOdr4im9-lkp@intel.com/config)
> > compiler: gcc-11 (Debian 11.3.0-12) 11.3.0
> > reproduce: (https://download.01.org/0day-ci/archive/20230901/202309011059.EOdr4im9-lkp@intel.com/reproduce)
> >
> > If you fix the issue in a separate patch/commit (i.e. not just a new version of
> > the same patch/commit), kindly add following tags
> > | Reported-by: kernel test robot <lkp@...el.com>
> > | Reported-by: Dan Carpenter <dan.carpenter@...aro.org>
> > | Closes: https://lore.kernel.org/r/202309011059.EOdr4im9-lkp@intel.com/
> >
> > smatch warnings:
> > drivers/of/dynamic.c:935 of_changeset_action() warn: possible memory leak of 'ce'
> >
> > vim +/ce +935 drivers/of/dynamic.c
> >
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 925 int of_changeset_action(struct of_changeset *ocs, unsigned long action,
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 926 struct device_node *np, struct property *prop)
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 927 {
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 928 struct of_changeset_entry *ce;
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 929
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 930 ce = kzalloc(sizeof(*ce), GFP_KERNEL);
> > 606ad42aa3b1fe Rob Herring 2016-06-15 931 if (!ce)
> > 201c910bd6898d Pantelis Antoniou 2014-07-04 932 return -ENOMEM;
> > 606ad42aa3b1fe Rob Herring 2016-06-15 933
> > 914d9d831e6126 Rob Herring 2023-08-18 934 if (WARN_ON(action >= ARRAY_SIZE(action_names)))
> > 914d9d831e6126 Rob Herring 2023-08-18 @935 return -EINVAL;
> >
> > No kfree(ce). Probably we move this check before the kmalloc()?
>
> Yes, moving up sounds great.
> Care to send a patch?
>
Sure. I can do that.
These are zero day bot warnings from Intel. I normally just look them
over and hit the forward button. Quite often the zero day bot will find
the warnings before the patch has been apply. But in this case, it's
simple enough to patch.
regards,
dan carpenter
Powered by blists - more mailing lists