Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3614989pxb; Mon, 24 Jan 2022 13:34:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJxbO2y0N/c3eJHzyjqglYhik7g65lUl4gwSVxoqfUMXSpiCqM4KhD/ArLFH4Zv3W9ELvole X-Received: by 2002:a63:c151:: with SMTP id p17mr7369824pgi.505.1643060059928; Mon, 24 Jan 2022 13:34:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643060059; cv=none; d=google.com; s=arc-20160816; b=Z7YUv9W0OmjmHc9Lekw2cOnuOCNnknwjRTnjvBvJYTcJw16cMF3qyidRqDfpPSVCWS 0yslmIsOFO7zN0OWLWIcKw9bJuTSTfiQArks3v5T5yEOn9uF4LgmgKWN37oP813nheND gHMb3CMHMqHEceLXc0IauEjyHhdXcnrMFJ48YNdTbGoEH+eq25SNf9ssIQkJtVG702Oa UkQnEuw9CXKJylitTpeUXpndKxeRLSsSlA3G87PYyT2ddwMFW1Epn5s5MmWSzhVUrXzf pUzXEyd4tp9clI2OAKwMq1qaV7cIBKfd1jBVfojUS1/j6G1jGHOFhZt3ecDI+k2VyctW yy0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:user-agent:date:to:cc:from:subject :references:in-reply-to:content-transfer-encoding:mime-version :dkim-signature; bh=CWKFWxvRa6vZHIAIdMl/wYqeok/9moCTzthIDGYlKRE=; b=znwyetfA7BJmp5bhhFf+tc4EFaou/RUd+3XLTE4JhJoCEuHlarUwq/xWq2OS3LrTnf k9GuZHWHhiPxcGaKbG6EVxlj0jG4TXhgEXUK7k7d/ywWURoOubsuRMNEpNWzu3NUYRmk styXcd6JIa6kgLGzGwB5m3PbGkPcg+npE+NPGv/0/+T/Q+J/q5KrN8/26hCmlSsnQ4at at92LW1ps254GFsnbuHxVNucot+mywbbWD44iC2cY9H2JgcW45QBJ4CGRf6h0Qy9rI+E KswsjjNT1icmhHvjerUlZFYiAFMzMB08nNV+UvfCQ8NqF1M/s5gaqk9o1iVW1j09hIKb MR4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YqP+5Pu8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si13565847plh.511.2022.01.24.13.33.59; Mon, 24 Jan 2022 13:34:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YqP+5Pu8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1447716AbiAXVLW (ORCPT + 99 others); Mon, 24 Jan 2022 16:11:22 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41416 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1358210AbiAXUn6 (ORCPT ); Mon, 24 Jan 2022 15:43:58 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E270EC04188A; Mon, 24 Jan 2022 11:53:43 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id AA40CB810BD; Mon, 24 Jan 2022 19:53:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 50C97C340E5; Mon, 24 Jan 2022 19:53:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643054021; bh=yLbz/AC2wjap7OdNsxdmDXBEPOrm5DJ62HNkpKHDaRE=; h=In-Reply-To:References:Subject:From:Cc:To:Date:From; b=YqP+5Pu8CLPGLQYonv8c5mI2Wp6Turrr2DjU4sM5owJF/mETT2Y3RvkrrfSMAhUK3 QcCdA7tDxRBj6ZBuxFD315wp5Hsv+1lPeSvDH2xoHVGtOXwFhpFEyjMZbLWr3TX+gZ AaJ+6bctkogAfKT2Q4HXAnzAdbeRHEA9uZ+hnt163ovtT2IwYFCruVHwMq59L4WYst vEos8xNT4eX7/HE8IHVMQFU7TKiZyHTWc82s4kIRkIeyTiSe49MaLVqLwM7BOm69Nb 5MmcjYS6JFe3icdc9Lvanvyju1XBpw15/OZX/HNxXMCphCIVSb6yuT2RkhoFUE9/0P u3vWaw7IKw94A== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable In-Reply-To: <20220124165316.55449-1-zhou1615@umn.edu> References: <20220124165316.55449-1-zhou1615@umn.edu> Subject: Re: [PATCH] clk: socfpga: Fix a memory leak bug in socfpga_gate_init() From: Stephen Boyd Cc: kjlu@umn.edu, Dinh Nguyen , Michael Turquette , linux-clk@vger.kernel.org, linux-kernel@vger.kernel.org To: zhou1615@umn.edu Date: Mon, 24 Jan 2022 11:53:39 -0800 User-Agent: alot/0.10 Message-Id: <20220124195341.50C97C340E5@smtp.kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Zhou Qingyang (2022-01-24 08:53:16) > diff --git a/drivers/clk/socfpga/clk-gate.c b/drivers/clk/socfpga/clk-gat= e.c > index 53d6e3ec4309..0ca5e0000925 100644 > --- a/drivers/clk/socfpga/clk-gate.c > +++ b/drivers/clk/socfpga/clk-gate.c > @@ -188,8 +188,10 @@ void __init socfpga_gate_init(struct device_node *no= de) > return; > =20 > ops =3D kmemdup(&gateclk_ops, sizeof(gateclk_ops), GFP_KERNEL); > - if (WARN_ON(!ops)) > + if (WARN_ON(!ops)) { A WARN_ON() after an allocation failure will lead to double stacktraces. Can you remove the WARN_ON()? Furthermore, it looks like 'ops' is never freed on failure in this function. Did the SA tool figure that out? There are more problems with this function and error paths. Seems like nobody cares. > + kfree(socfpga_clk); > return; > + } >