[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170424164127.5a2145e8@xeon-e3>
Date: Mon, 24 Apr 2017 16:41:27 -0700
From: Stephen Hemminger <stephen@...workplumber.org>
To: Jamal Hadi Salim <hadi@...atatu.com>,
Cong Wang <xiyou.wangcong@...il.com>,
Jiri Pirko <jiri@...nulli.us>
Cc: netdev@...r.kernel.org
Subject: Fw: New Defects reported by Coverity Scan for Linux
This looks like a false positive
Date: Mon, 24 Apr 2017 14:40:46 -0700
From: scan-admin@...erity.com
To: stephen@...workplumber.org
Subject: New Defects reported by Coverity Scan for Linux
1 new defect(s) introduced to Linux found with Coverity Scan.
2 defect(s), reported by Coverity Scan earlier, were marked fixed in the recent build analyzed by Coverity Scan.
New defect(s) Reported-by: Coverity Scan
Showing 1 of 1 defect(s)
** CID 1405487: Resource leaks (RESOURCE_LEAK)
/net/sched/act_api.c: 635 in tcf_action_init_1()
________________________________________________________________________________________________________
*** CID 1405487: Resource leaks (RESOURCE_LEAK)
/net/sched/act_api.c: 635 in tcf_action_init_1()
629 * if it exists and is only bound to in a_o->init() then
630 * ACT_P_CREATED is not returned (a zero is).
631 */
632 if (err != ACT_P_CREATED)
633 module_put(a_o->owner);
634
>>> CID 1405487: Resource leaks (RESOURCE_LEAK)
>>> Variable "cookie" going out of scope leaks the storage it points to.
635 return a;
636
637 err_mod:
638 module_put(a_o->owner);
639 err_out:
640 if (cookie) {
Powered by blists - more mailing lists