From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B94B343AD8; Sun, 18 Feb 2024 17:01:07 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5B0004021D; Sun, 18 Feb 2024 17:01:07 +0100 (CET) Received: from wfhigh5-smtp.messagingengine.com (wfhigh5-smtp.messagingengine.com [64.147.123.156]) by mails.dpdk.org (Postfix) with ESMTP id 0139A400D5 for ; Sun, 18 Feb 2024 17:01:05 +0100 (CET) Received: from compute5.internal (compute5.nyi.internal [10.202.2.45]) by mailfhigh.west.internal (Postfix) with ESMTP id 70FC11800075; Sun, 18 Feb 2024 11:01:04 -0500 (EST) Received: from mailfrontend1 ([10.202.2.162]) by compute5.internal (MEProxy); Sun, 18 Feb 2024 11:01:04 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=monjalon.net; h= cc:cc:content-transfer-encoding:content-type:content-type:date :date:from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to; s=fm1; t=1708272063; x=1708358463; bh=hCD9IaavG2i4X5h41ixv9Xobx71SVmnf3F+g3X6YZo8=; b= dH6cvRRAVqj9ZDVFNVjkW713z+MpoCEprBUuxjO/chcef8oLYv78d4mkXnHSVNiq 8qUSzoseSc7rWCRNDeCAm7FaZe1BMlNL6M6DOIIzE3ghbaLXN6HaCz9awZoz9Rvh C4wDqJqfY2dmYR/FZyfZZuXNF/T5uBHQ/9S2Caxo9i2CwPuQPXIYXSk0Gu0PphBE Rcg1trGTBpgV5RJBIIcBzdSG7Xn5yX4b+QCiREl4hj7XBhTgLmsAD9fvPjTT/USp 1T09Zt7eZ0ezm/r++0YaWdl3uLmStgheJ0wIkLdZ3uG19tXGWc3UOhhsXsl5rr/k ljHHJeRtlgnpOD7pIxlB3w== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:cc:content-transfer-encoding :content-type:content-type:date:date:feedback-id:feedback-id :from:from:in-reply-to:in-reply-to:message-id:mime-version :references:reply-to:subject:subject:to:to:x-me-proxy:x-me-proxy :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; t=1708272063; x= 1708358463; bh=hCD9IaavG2i4X5h41ixv9Xobx71SVmnf3F+g3X6YZo8=; b=C dX+owVcQlZFWqtRHEAPN/NPqlK3I/lYj68GIeQByLTcVzAJdlX5HdOsLCWxgxic9 evOhN1ilnvHtCkb913okNypwrNpLUSzZHGM0MCtX7Iors03p/XamD8lcM/aPW4Wc nLQgsoDzkHHm/Jm+EAhFF1iRUmCj4AE58f7qnvkNvFUWTtaJoLsu+CwCgLfqxiiH cLWjavhT7zCzRma00nmp2oymIr/1S2TZFN9rlnMPFC7emAkhYZze7JTE6H0aOWXI RykNvPm5ronPR3QE+nBUWni3XlZeEmS1tVvNFMd7u2GO5h1WpBMRqDY3MaRi9TvI PlYIMhdovGsFdPyd6x9tQ== X-ME-Sender: X-ME-Received: X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedvledrvdeigdekhecutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenuc fjughrpefhvfevufffkfgjfhgggfgtsehtufertddttddvnecuhfhrohhmpefvhhhomhgr shcuofhonhhjrghlohhnuceothhhohhmrghssehmohhnjhgrlhhonhdrnhgvtheqnecugg ftrfgrthhtvghrnheptdejieeifeehtdffgfdvleetueeffeehueejgfeuteeftddtieek gfekudehtdfgnecuvehluhhsthgvrhfuihiivgeptdenucfrrghrrghmpehmrghilhhfrh homhepthhhohhmrghssehmohhnjhgrlhhonhdrnhgvth X-ME-Proxy: Feedback-ID: i47234305:Fastmail Received: by mail.messagingengine.com (Postfix) with ESMTPA; Sun, 18 Feb 2024 11:01:02 -0500 (EST) From: Thomas Monjalon To: Chengwen Feng Cc: ferruh.yigit@amd.com, dev@dpdk.org Subject: Re: [PATCH v2 00/16] verify strdup return value Date: Sun, 18 Feb 2024 17:01:01 +0100 Message-ID: <4249814.KRxA6XjA2N@thomas> In-Reply-To: <20231110100117.8350-1-fengchengwen@huawei.com> References: <20231110100117.8350-1-fengchengwen@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org 10/11/2023 11:01, Chengwen Feng: > This patchset mainly fix the return value of strdup not checked which > may lead to segment fault. It also include two commits which fix memory > leak of strdup. > > Chengwen Feng (16): > eal: verify strdup return value > bus/dpaa: verify strdup return value > bus/fslmc: verify strdup return value > bus/vdev: verify strdup return value > dma/idxd: verify strdup return value > event/cnxk: verify strdup return value > net/failsafe: fix memory leak when parse args > net/nfp: verify strdup return value > app/dumpcap: verify strdup return value > app/pdump: verify strdup return value > app/test: verify strdup return value > app/test-crypto-perf: verify strdup return value > app/test-dma-perf: verify strdup return value > app/testpmd: verify strdup return value > examples/qos_sched: fix memory leak when parse args > examples/vhost: verify strdup return value Applied, with small change in EAL as suggested by Huisong, thanks.