Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp164032yba; Mon, 20 May 2019 06:44:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqxCBcBJaVglI3fnR1LmiTZjQWbOwq4Q6tmtIgZOWmRbeQv1Baur7eXplxvuHvPib/GMfg7e X-Received: by 2002:a17:902:e583:: with SMTP id cl3mr76613242plb.35.1558359855360; Mon, 20 May 2019 06:44:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558359855; cv=none; d=google.com; s=arc-20160816; b=SFHGlUdpB7M0+tVD8g5GXngRBzyis+gHalKK7QpJemOkq0F4JLK4znna3ghZmbt30l kEgEg5DKA6s9uqTYni/Zue52sQpAWcXDCHhVcnDwD8jmrSkaONC8m0N3/bv1XIfltdf2 ZzLz6k4/qDIM/92+WHsArNyBpxpryfauXtTgNzVsFB+5zMRCro52MpitOi5bwX4KJvb4 ZSodFffT2I4spd5Un+WqbghO6ULgunDzAIf4/nMM6nDeT+plQggsAviNQck15QL968md aJmOHumXIO+ozL0MWlfrIgVF4aGrJW3bP5wVDVO81VKIDTyFWiFN9D9tBivy9WjqGn1I KSsA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=2Sr7LvQjdGOwMkOC+8GGN1xFsRP6+vvBYGrbc6wNvlM=; b=qMxjVf+5yMHg+qOdqKcQZ+dQ290PcTCCN9FD1sXJb2yyIY0WBmnw5SU1Q+EKF2kdPV +eozxadrEcKloDAbNDrQXEc3Hhg8SXCh4vWiYBmxk7yE+akgZag4DVe+qWJNtBqn75yy 69eYvx12yVOzIEwoRW95qG2wZ8Z4RqkyFhuyO4gQgIAggw+kOhTUTMTs9QBekb7x1eQi 5MRz8VNWzdhBjP9ijzVbDDNV1QofYOx+DKWMK0YxpXr2EC9x3T4SLN/ZBOuoD5SkluoK uQCBBacg5aNcR0DKQdl05bgf3gxGcElHCwF36+mMboXy3qHUL5l/FzGbqbuQvPzm9MIU 4UZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f7si18860201pgr.536.2019.05.20.06.44.00; Mon, 20 May 2019 06:44:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730641AbfETJwk (ORCPT + 99 others); Mon, 20 May 2019 05:52:40 -0400 Received: from mail3-relais-sop.national.inria.fr ([192.134.164.104]:44073 "EHLO mail3-relais-sop.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726126AbfETJwj (ORCPT ); Mon, 20 May 2019 05:52:39 -0400 X-IronPort-AV: E=Sophos;i="5.60,491,1549926000"; d="scan'208";a="306577805" Received: from unknown (HELO hadrien) ([163.173.90.196]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 May 2019 11:52:37 +0200 Date: Mon, 20 May 2019 11:52:37 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Pavel Machek cc: Julia Lawall , wen.yang99@zte.com.cn, Markus.Elfring@web.de, cocci@systeme.lip6.fr, linux-kernel@vger.kernel.org, Gilles Muller , yamada.masahiro@socionext.com, michal.lkml@markovi.net, nicolas.palix@imag.fr, sashal@kernel.org Subject: Re: Coccinelle: semantic patch for missing of_node_put In-Reply-To: <20190520093303.GA9320@atrey.karlin.mff.cuni.cz> Message-ID: References: <201905171432571474636@zte.com.cn> <20190520093303.GA9320@atrey.karlin.mff.cuni.cz> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 20 May 2019, Pavel Machek wrote: > Hi! > > > A semantic patch has no access to comments. The only thing I can see to > > do is to use python to interact with some external tools. For example, > > you could write some code to collect the comments in a file and the lines > > on which they occur, and then get the comment that most closely precedes > > the start of the function. > > How dangerous is missing of_node_put? AFAICT it will only result into > very small, one-time memory leak, right? > > Could we make sure these patches are _not_ going to stable? Leaking > few bytes once per boot is not really a serious bug. Sasha, Probably patches that add only of_node_put should not be auto selected for stable. julia