Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1218037ybt; Sat, 20 Jun 2020 04:31:20 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxYWxhudiDexjbr9jw3m9kslJK03T1GYqy4GfUCwLWOvpzWPYiUHNWXCcsmEP6sQ210wfJV X-Received: by 2002:a50:9556:: with SMTP id v22mr7453268eda.291.1592652680755; Sat, 20 Jun 2020 04:31:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592652680; cv=none; d=google.com; s=arc-20160816; b=b93xIxwfzk4M/tl86qhlS8NsAu2NuoCin9XHYOQ1OgOzW3BJuVbLiNR4tfu0bx/7iT 8bIIwfO9lUDnDLn5f0tKj2GHfUifQNj+2KLVKJZ5cxyEg7s8BH1oBvsF3m5wN/ERuhVS WlNM3oZs4+wAmgyvcJAkEpYEx5Ffk8BqjheV4xYPfSaiWRDfhYBZoXdZi0nkeKpc28zG eObakz8T7w3YkfBCDmYYKxI4q8y8d2ZdhvMhMWIYIbHdHBucIpfFn3yj8v+j55U5X1B2 APqPvy1K91kQ3yDgUe3jsLUCJWmalcLVmphc79r1rtV3qDvZlpGYLgIqKAT5zsBpgjs0 KsCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=CX9OddYf0Q/hk0pL+GOYbJ5qXV0GeANrR8r2BUnAP5I=; b=DMlLYooy+oExNqsh01rg4u1yW9Xjvj5Uy3NR1UM0e7Nn4WKUyI6pkZ/Iif8WExMeRS ob08ib38kHdSzrY88DUrS+iEdGnB/2UWwECxeCXZqQpIj16/kLlnupDZFmu/Oq156nk/ fz+sh6/JGHfSk1rxEkz7rlRvZOpYw0N+nQareGeoYiwYfu5aISgRbGxET9O/wBes0bCQ ZFYAOCkwjIW1J/62IvosUAfujMy+QTdXYWV/S4H7TfhTkmDRngnJFzbJIdo/aFckErTr /S2HPgNt/+UmCJc6ZoWpCe7vbyEtaxz0733n9zi51MVIDhdC9exUuYG9btMKPGSIsIHj Tu1g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gh22si5395524ejb.481.2020.06.20.04.30.57; Sat, 20 Jun 2020 04:31:20 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728050AbgFTL0T (ORCPT + 99 others); Sat, 20 Jun 2020 07:26:19 -0400 Received: from mail3-relais-sop.national.inria.fr ([192.134.164.104]:1288 "EHLO mail3-relais-sop.national.inria.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727971AbgFTL0S (ORCPT ); Sat, 20 Jun 2020 07:26:18 -0400 X-IronPort-AV: E=Sophos;i="5.75,258,1589234400"; d="scan'208";a="352198204" Received: from abo-173-121-68.mrs.modulonet.fr (HELO hadrien) ([85.68.121.173]) by mail3-relais-sop.national.inria.fr with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 20 Jun 2020 13:26:14 +0200 Date: Sat, 20 Jun 2020 13:26:14 +0200 (CEST) From: Julia Lawall X-X-Sender: jll@hadrien To: Bernard cc: Markus Elfring , opensource.kernel@vivo.com, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, kernel-janitors@vger.kernel.org, linux-kernel@vger.kernel.org, Alex Deucher , =?ISO-8859-15?Q?Christian_K=F6nig?= , =?ISO-8859-15?Q?Felix_K=FChling?= , Daniel Vetter , David Airlie Subject: Re:Re: [PATCH v2] drm/amdkfd: Fix memory leaks according to error branches In-Reply-To: Message-ID: References: User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="8323329-1370080203-1592652375=:2918" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --8323329-1370080203-1592652375=:2918 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT On Sat, 20 Jun 2020, Bernard wrote: > > > From: Julia Lawall > Date: 2020-06-20 17:37:19 > To: Markus Elfring > Cc: Bernard Zhao ,opensource.kernel@vivo.com,amd-gfx@lists.freedesktop.org,dri-devel@lists.freedesktop.org,kernel-janitors@vger.kernel.org,linux-kernel@vger.kernel.org,Alex Deucher ,"Christian König" ,"Felix Kühling" ,Daniel Vetter ,David Airlie > Subject: Re: [PATCH v2] drm/amdkfd: Fix memory leaks according to error branches> > > > >On Sat, 20 Jun 2020, Markus Elfring wrote: > > > >> > The function kobject_init_and_add alloc memory like: > >> > kobject_init_and_add->kobject_add_varg->kobject_set_name_vargs > >> > ->kvasprintf_const->kstrdup_const->kstrdup->kmalloc_track_caller > >> > ->kmalloc_slab, in err branch this memory not free. If use > >> > kmemleak, this path maybe catched. > >> > These changes are to add kobject_put in kobject_init_and_add > >> > failed branch, fix potential memleak. > >> > >> I suggest to improve this change description. > >> > >> * Can an other wording variant be nicer? > > > >Markus's suggestion is as usual extremely imprecise. However, I also find > >the message quite unclear. > > > >It would be good to always use English words. alloc and err are not > >English words. Perhaps most people will figure out what they are > >abbreviations for, but it would be better to use a few more letters to > >make it so that no one has to guess. > > > >Then there are a bunch of things that are connected by arrows with no > >spaces between them. The most obvious meaning of an arrow with no space > >around it is a variable dereference. After spending some mental effort, > >one can realize that that is not what you mean here. A layout like: > > > > first_function -> > > second_function -> > > third_function > > > >would be much more readable. > > > >I don't know what "this patch maybe catched" means. Is "catched" supposed > >to be "caught" or "cached"? Overall, the sentence could be "Kmemleak > >could possibly detect this issue", or something like that. But I don't > >know what this means. Did you detect the problem with kmemleak? if you > >did not detect the problem with kmemleak, and overall you don't know > >whether kmemleak would detect the bug or not, is this information useful > >at all for the patch? > > Hi: > > Kmemleak detected a memory leak as below: > kobject_init_and_add-> > kobject_add_varg-> > kobject_set_name_vargs-> > kvasprintf_const-> > kstrdup_const-> > kstrdup-> > kmalloc_track_caller-> > kmalloc_slab > > If kobject_init_and_add is called, but kobject_put is not called in the error branch. > This will be detected by kmemleak. Thanks. This is much more understandable. The last part still seems a bit hypothetical. After the trace, which explain why you made the change, just say what you did in the patch to fix the problem. julia > > BR//Bernard > > >"These changes are to" makes a lot of words with no information. While it > >is perhaps not necessary to slavishly follow the rule about using the > >imperative, if it is convenient to use the imperative, doing so eliminates > >such meaningless phrases. > > > >memleak is also not an English word. Memory leak is only a few more > >characters, and doesn't require the reader to make the small extra effort > >to figure out what you mean. > > > >julia > > > >> > >> * Will the tag “Fixes” become helpful for the commit message? > >> > >> Regards, > >> Markus > >> > > > --8323329-1370080203-1592652375=:2918--