From nobody Tue Dec 2 00:05:28 2025 Received: from smtpbg154.qq.com (smtpbg154.qq.com [15.184.224.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7673C2D6E7C for ; Wed, 26 Nov 2025 08:46:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=15.184.224.54 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764146780; cv=none; b=bIzPvIzj7Tbp9sJiGPrqbEAKqV80OSTcfXaojKI5XhAA6KBp9phSF8xTcihYWIilV7I7zYk4OGYTH65GZl/SWToViEw+gDiPqBlagigTMLu5L4IENHlntJqEkIX86e43/iF2VF02CMWJO7PMnF/ZetagkTc///1wyY1BMKQY99c= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1764146780; c=relaxed/simple; bh=4aglrJL59adAqF1Wlfr3wfM0tQSoHETQpMw62HmaduY=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=se68jibfS8tdjskF90uhlyYToilgNDEHTZRumpgJrMLBBycaMN24h21cf5Imv5E6ZsJqkuROghv08YU9UKyc6exHSiO65TRsdwg3xowzTYNnAoQyq7OYkjnqit9j6CXZhQKZ4Fm/hSkjPbSR2pc9xWN+qX6Ja0gOiwe8e3bDQxg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=uniontech.com; spf=pass smtp.mailfrom=uniontech.com; dkim=pass (1024-bit key) header.d=uniontech.com header.i=@uniontech.com header.b=lhUUGRDa; arc=none smtp.client-ip=15.184.224.54 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=uniontech.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=uniontech.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=uniontech.com header.i=@uniontech.com header.b="lhUUGRDa" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uniontech.com; s=onoh2408; t=1764146736; bh=WufCdDOpzfL/WfQ3htR6pHmHReVaZ+8ySuuRY7Lmf9g=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=lhUUGRDauK/AI2nblJZp5Xq0G6QtNYjkYdU21rs/5R0XxQXcIsAnwxU3lFpyCl80E S4QEdAWWM4RHnFdKcKMi6qORy2FrsWZcvEnnGjI0QBkRpbctDg2DRUaG34c++HK21J neO5vZUgBPtE/dxpLNbqH93NuqWxhZMEP/abP2AQ= X-QQ-mid: zesmtpgz7t1764146731t05aa1bad X-QQ-Originating-IP: rjDpBB+HlmgtOOJx3N41NKQSqniequPMppjqpg9r/ME= Received: from localhost.localdomain ( [123.114.60.34]) by bizesmtp.qq.com (ESMTP) with id ; Wed, 26 Nov 2025 16:45:07 +0800 (CST) X-QQ-SSF: 0000000000000000000000000000000 X-QQ-GoodBg: 1 X-BIZMAIL-ID: 4168768459753501341 EX-QQ-RecipientCnt: 5 From: Qiang Ma To: akpm@linux-foundation.org, bhe@redhat.com Cc: kexec@lists.infradead.org, linux-kernel@vger.kernel.org, Qiang Ma Subject: [PATCH v3 1/3] kexec: Fix uninitialized struct kimage *image pointer Date: Wed, 26 Nov 2025 16:44:25 +0800 Message-Id: <20251126084427.3222212-2-maqianga@uniontech.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20251126084427.3222212-1-maqianga@uniontech.com> References: <20251126084427.3222212-1-maqianga@uniontech.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-QQ-SENDSIZE: 520 Feedback-ID: zesmtpgz:uniontech.com:qybglogicsvrsz:qybglogicsvrsz3b-0 X-QQ-XMAILINFO: OQhZ3T0tjf0aipUoODJiBJfVzWfh7sTjffBRh/jiLQkPX80f/edV/qCi NnfWqpapYAKQQO+SwqXukYaDt0D6FXp+SOlPoN4/LMCOl232VzTfmc+v15hHwV1pAAP1PlX WHHOLmURdgtvfV2lBMJsINTU/0yQWf0icIr5jKRHjcWth2G63fBiPkH0zEA4A6Sd99wEDsM rl/VXijWIeHbEd8cpKEjTs5uHb62+cWOBQ3zwLLyxsZeRvj9oBlJn2Dm9NEKlQAzyKy2++Q HfndFdxvnNZ6wjrfuxAvshGyM8KTRfLSYt+wppoAcizynju16Lz955gFbrSK4l3S3XDkAx8 ypePyrrdmZvk8U/tDOrJu/YNvaPju0FsbssrW/0QQdSaw2vBhudlL6gjSWt7MX8UjIMf1Ju Mkxc9TB9Mt92i9y9Q2JMh+19+euxBBaQv4jec2cdyhowOMs6O3z+YZTO3VDm7sd7K8M4Rje EeOVuPPObcol7TJOJKV3VFTE0Bnh2VmVI/JS+zlcI08jz+JApEIcmvMisW4TV9eGhLMfXc5 Gw+HSKgMbhPoj2WHz9iN/4B3+h+6Pn6zLzpE8+rFb2bqHXrAeUXUMQRXF81U6M1E3OXV3lV Q277rnxY4honUzbpcJ+RhUHmWxW8P8+AGK/zeKfgn3WVKuyzWt7Dr+FtW2acyURDuyahycB 0kbVcS+9t0LSlD3sjYAb10rHA+/ylMwMEda2da6x+DeZ9Ne2ssoyhwe+14TKRM4FOE4jIJ7 k3SfNM7MbypzetylHvdwtnT64mY/O33TVjaJBkYiIUUHeED6u0/OiN7I8ZjaJ8ydRVlaLWl NxNNajDxtri6v9wvkqZ+5URVvlWNey/irNndzaqVMLQ//xY23MVoA6l9mibvxBEY59W3sHL DwVfpF2IYYLFJCz9VerR46Ho+HnLdeilxjQzllP6DuBIgeBxd6BcGJLZLXtTuwlATOs+Cql IhUJJQlgZzvs+OtY9Gsf6zznZk025SWOo2nXCVmAjdGoYxAtGLZvbRL+/W1En90RZ4q0Msk paFhllOaKwQAc0hEzkauzAfHNJCDKFgIz53UC4gA== X-QQ-XMRINFO: NyFYKkN4Ny6FSmKK/uo/jdU= X-QQ-RECHKSPAM: 0 Content-Type: text/plain; charset="utf-8" The image is initialized to NULL. Then, after calling kimage_alloc_init, we can directly goto 'out' because at this time, the kimage_free will determine whether image is a NULL pointer. This can also prepare for the subsequent patch's kexec_core_dbg_print to be reset to zero in kimage_free. Signed-off-by: Qiang Ma --- kernel/kexec.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/kernel/kexec.c b/kernel/kexec.c index 28008e3d462e..9bb1f2b6b268 100644 --- a/kernel/kexec.c +++ b/kernel/kexec.c @@ -95,6 +95,8 @@ static int do_kexec_load(unsigned long entry, unsigned lo= ng nr_segments, unsigned long i; int ret; =20 + image =3D NULL; + /* * Because we write directly to the reserved memory region when loading * crash kernels we need a serialization here to prevent multiple crash @@ -129,7 +131,7 @@ static int do_kexec_load(unsigned long entry, unsigned = long nr_segments, =20 ret =3D kimage_alloc_init(&image, entry, nr_segments, segments, flags); if (ret) - goto out_unlock; + goto out; =20 if (flags & KEXEC_PRESERVE_CONTEXT) image->preserve_context =3D 1; --=20 2.20.1