Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp8853435ybl; Fri, 17 Jan 2020 02:14:15 -0800 (PST) X-Google-Smtp-Source: APXvYqw6vSopXoN7IJt4ZJLbRsF4soQgOQ3PZbrgYTih1FlCJDwTPi6j+/rypO7eyujzDo4ZF0Cc X-Received: by 2002:a9d:1c95:: with SMTP id l21mr5462422ota.271.1579256055543; Fri, 17 Jan 2020 02:14:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579256055; cv=none; d=google.com; s=arc-20160816; b=yun5Y165mbKkizhCj6796sSk81dkQegWw5HtIlk8V0ncvE1LczVTA6sq1EJ/CMNY/l ez82Z2aongu/Kb0Hptht8edv8qbGE8C9HTu+he1qumpMaXE6ktGYNhcRO7oDIz77ms9O MxnTTM5Wq6OQwPzNpkuWKP1OMuh7yZ0FhQPLmCnnuHrzwaW6DXBcjStgtDAWg2Wr9hAH 0UusyYn9IXyVGVXOpW6EHSF3Tw5mnSeBIIPw5e5kRQIJVqw10g1WrnuJwETiGmAdm6be iiT5xFX3zqDORMYrRANkN014YpJ5Ate+UOik1wTTXsIOegXgfZmI6hBvvoBfcMjX4r7c NP7Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=x0OHRGb8oXNdBHvfkY5z8eqeNIdmhqaAEYXTSaXWZ2I=; b=WOzG9C0SozILsdwDDOtHnQwuM9tEJO6B0n2g+ovmIubUScgnoMVY11Q3zSbnvIR55I yfURqVf2/lGKzJ+05Fv5ic2rePdJye773uO6IBHnqL4F5bshbM4XR0FOGIdGXBfDC6GM B/8vISjU44JBf95wLzY29uHWMCN4mjgVNLeIQrJSFs2diy3GZFMylkmLis9BLrk5NKZ/ fQJTUBEbSk9snW1s29iB6tmaMfR2cGGX/AcD4cevWcXZB4efHTK9X46x1bnIvGZC2Eck a8VOIqnhZAXJxOCHVt2694s93yvOjcuDRL+rL9ytlyivP6qdh7HNl3n8TylpjorOHn0q /dAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NfdayOHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r26si15666338otc.163.2020.01.17.02.14.02; Fri, 17 Jan 2020 02:14:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NfdayOHo; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726956AbgAQKNG (ORCPT + 99 others); Fri, 17 Jan 2020 05:13:06 -0500 Received: from mail.kernel.org ([198.145.29.99]:47116 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726220AbgAQKNG (ORCPT ); Fri, 17 Jan 2020 05:13:06 -0500 Received: from pobox.suse.cz (prg-ext-pat.suse.com [213.151.95.130]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 499502087E; Fri, 17 Jan 2020 10:13:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579255985; bh=wABE1KL6Dom6ZK0s82ipPm+b7d+G3j2jQRbLEB2QhJw=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=NfdayOHo1oYl7k46HXKjfLoR0O9A88lnCmiyazES/WIG3kOFVbMOhBB7/k2B2tDnd Nb+ru+wNxgcZqLW8qBfOxDt59vzfzGPgOlmLFAODpJyT33wlCfbY0/b1N/F7Drvtlw +xu8KC2S8dkSxCtX40B1xVGdq/PjspMQthenCba0= Date: Fri, 17 Jan 2020 11:13:02 +0100 (CET) From: Jiri Kosina To: Petr Mladek cc: Josh Poimboeuf , Miroslav Benes , Joe Lawrence , Kamalesh Babulal , Nicolai Stange , Dan Carpenter , live-patching@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] livepatch/samples/selftest: Clean up show variables handling In-Reply-To: <20200116153145.2392-1-pmladek@suse.com> Message-ID: References: <20200116153145.2392-1-pmladek@suse.com> User-Agent: Alpine 2.21 (LSU 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 16 Jan 2020, Petr Mladek wrote: > Dan Carpenter reported suspicious allocations of shadow variables > in the sample module, see > https://lkml.kernel.org/r/20200107132929.ficffmrm5ntpzcqa@kili.mountain > > The code did not cause a real problem. But it was indeed misleading > and semantically wrong. I got confused several times when cleaning it. > So I decided to split the change into few steps. I hope that > it will help reviewers and future readers. > > The changes of the sample module are basically the same as in the RFC. > In addition, there is a clean up of the module used by the selftest. > > > Petr Mladek (4): > livepatch/sample: Use the right type for the leaking data pointer > livepatch/selftest: Clean up shadow variable names and type > livepatch/samples/selftest: Use klp_shadow_alloc() API correctly > livepatch: Handle allocation failure in the sample of shadow variable > API > > lib/livepatch/test_klp_shadow_vars.c | 119 +++++++++++++++++------------- > samples/livepatch/livepatch-shadow-fix1.c | 39 ++++++---- > samples/livepatch/livepatch-shadow-fix2.c | 4 +- > samples/livepatch/livepatch-shadow-mod.c | 4 +- > 4 files changed, 99 insertions(+), 67 deletions(-) I've pushed this to for-5.6/selftests. Thanks, -- Jiri Kosina SUSE Labs