From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.6 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id B87F5C433DB for ; Tue, 9 Feb 2021 23:51:53 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 5E41460202 for ; Tue, 9 Feb 2021 23:51:53 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234141AbhBIXvd (ORCPT ); Tue, 9 Feb 2021 18:51:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:40458 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234861AbhBIXQ5 (ORCPT ); Tue, 9 Feb 2021 18:16:57 -0500 Received: by mail.kernel.org (Postfix) with ESMTPS id 4CD2964DED; Tue, 9 Feb 2021 22:50:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1612911007; bh=wUs9WTuVmgOAUO4SpCTeHJAMDwmlRdDl37A6r3KJYeY=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=Hn+wEcjgo7PshdHBkvVQ65lRW4B6DIBzP2McAqKQ0WbEcF05viZHpzIepc0hVUqR5 gJulPLAc4Ki1obE/qHkL1/V5ID2OFH+Z09m8/Epi1n+NahcsMCbZdD9XI7PX8D1+UL 6LUcaD3SlFXtI54GeoCFTWow877SQOPyTDfmeOmm03XqMH1MzV6NmE++lBQMFPDUXQ TtChl8RbbKWwDlfSqXkWiAsg7RAuJuiOKDro6dpSq6VxWPga7kY5LsHdYgVnw7xY1A WfXYBdy5FO2w5jAqcBGyJkLJEm3MtsmbZa8SY8WuCny4kQmE/EmBJAwRf5q09eQirN a1bBB8YLk10+A== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH] remoteproc: core: Fix rproc->firmware free in rproc_set_firmware() From: patchwork-bot+linux-remoteproc@kernel.org Message-Id: <161291100726.6282.7146787273205980697.git-patchwork-notify@kernel.org> Date: Tue, 09 Feb 2021 22:50:07 +0000 References: <20210118165904.719999-1-daniele.alessandrelli@linux.intel.com> In-Reply-To: <20210118165904.719999-1-daniele.alessandrelli@linux.intel.com> To: Daniele Alessandrelli Cc: linux-remoteproc@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-remoteproc@vger.kernel.org Hello: This patch was applied to andersson/remoteproc.git (refs/heads/for-next): On Mon, 18 Jan 2021 16:59:04 +0000 you wrote: > From: Daniele Alessandrelli > > rproc_alloc_firmware() (called by rproc_alloc()) can allocate > rproc->firmware using kstrdup_const() and therefore should be freed > using kfree_const(); however, rproc_set_firmware() frees it using the > simple kfree(). This causes a kernel oops if a constant string is passed > to rproc_alloc() and rproc_set_firmware() is subsequently called. > > [...] Here is the summary with links: - remoteproc: core: Fix rproc->firmware free in rproc_set_firmware() https://git.kernel.org/andersson/remoteproc/c/43d3f2c715ce You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html