From patchwork Sat Jun 1 09:37:50 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Thomas Meyer X-Patchwork-Id: 2647631 Return-Path: X-Original-To: patchwork-linux-btrfs@patchwork.kernel.org Delivered-To: patchwork-process-083081@patchwork2.kernel.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by patchwork2.kernel.org (Postfix) with ESMTP id C6EADDFE76 for ; Sat, 1 Jun 2013 09:46:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932272Ab3FAJqV (ORCPT ); Sat, 1 Jun 2013 05:46:21 -0400 Received: from www17.your-server.de ([213.133.104.17]:59468 "EHLO www17.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932178Ab3FAJqJ (ORCPT ); Sat, 1 Jun 2013 05:46:09 -0400 Received: from [88.68.124.133] (helo=[192.168.2.108]) by www17.your-server.de with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.74) (envelope-from ) id 1UiiG2-0001Mg-9l; Sat, 01 Jun 2013 11:37:54 +0200 Message-ID: <1370079470.29224.3.camel@localhost.localdomain> Subject: [PATCH] Btrfs: Cocci spatch "memdup.spatch" From: Thomas Meyer To: chris.mason@fusionio.com, linux-btrfs@vger.kernel.org, linux-kernel@vger.kernel.org Date: Sat, 01 Jun 2013 11:37:50 +0200 X-Mailer: Evolution 3.6.4 (3.6.4-3.fc18) Mime-Version: 1.0 X-Authenticated-Sender: thomas@m3y3r.de X-Virus-Scanned: Clear (ClamAV 0.97.6/17282/Sat Jun 1 04:12:14 2013) Sender: linux-btrfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-btrfs@vger.kernel.org Signed-off-by: Thomas Meyer --- -- To unsubscribe from this list: send the line "unsubscribe linux-btrfs" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff -u -p a/fs/btrfs/send.c b/fs/btrfs/send.c --- a/fs/btrfs/send.c +++ b/fs/btrfs/send.c @@ -3429,10 +3429,9 @@ static int __find_xattr(int num, struct strncmp(name, ctx->name, name_len) == 0) { ctx->found_idx = num; ctx->found_data_len = data_len; - ctx->found_data = kmalloc(data_len, GFP_NOFS); + ctx->found_data = kmemdup(data, data_len, GFP_NOFS); if (!ctx->found_data) return -ENOMEM; - memcpy(ctx->found_data, data, data_len); return 1; } return 0;