https://github.com/torvalds/linux
Revision 2127d22509aec3a83dffb2a3c736df7ba747a7ce authored by Miaohe Lin on 18 October 2021, 22:15:52 UTC, committed by Linus Torvalds on 19 October 2021, 06:22:03 UTC
Patch series "Fixups for slub". This series contains various bug fixes for slub. We fix memoryleak, use-afer-free, NULL pointer dereferencing and so on in slub. More details can be found in the respective changelogs. This patch (of 5): It's possible that __seq_open_private() will return NULL. So we should check it before using lest dereferencing NULL pointer. And in error paths, we forgot to release private buffer via seq_release_private(). Memory will leak in these paths. Link: https://lkml.kernel.org/r/20210916123920.48704-1-linmiaohe@huawei.com Link: https://lkml.kernel.org/r/20210916123920.48704-2-linmiaohe@huawei.com Fixes: 64dd68497be7 ("mm: slub: move sysfs slab alloc/free interfaces to debugfs") Signed-off-by: Miaohe Lin <linmiaohe@huawei.com> Reviewed-by: Vlastimil Babka <vbabka@suse.cz> Cc: Christoph Lameter <cl@linux.com> Cc: Pekka Enberg <penberg@kernel.org> Cc: David Rientjes <rientjes@google.com> Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com> Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Faiyaz Mohammed <faiyazm@codeaurora.org> Cc: Andrey Konovalov <andreyknvl@gmail.com> Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com> Cc: Kees Cook <keescook@chromium.org> Cc: Bharata B Rao <bharata@linux.ibm.com> Cc: Roman Gushchin <guro@fb.com> Cc: <stable@vger.kernel.org> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1 parent 6d2aec9
Tip revision: 2127d22509aec3a83dffb2a3c736df7ba747a7ce authored by Miaohe Lin on 18 October 2021, 22:15:52 UTC
mm, slub: fix two bugs in slab_debug_trace_open()
mm, slub: fix two bugs in slab_debug_trace_open()
Tip revision: 2127d22
File | Mode | Size |
---|---|---|
Makefile | -rw-r--r-- | 686 bytes |
ap_bus.c | -rw-r--r-- | 48.9 KB |
ap_bus.h | -rw-r--r-- | 11.6 KB |
ap_card.c | -rw-r--r-- | 5.5 KB |
ap_debug.h | -rw-r--r-- | 994 bytes |
ap_queue.c | -rw-r--r-- | 23.8 KB |
pkey_api.c | -rw-r--r-- | 54.3 KB |
vfio_ap_drv.c | -rw-r--r-- | 4.7 KB |
vfio_ap_ops.c | -rw-r--r-- | 37.2 KB |
vfio_ap_private.h | -rw-r--r-- | 3.2 KB |
zcrypt_api.c | -rw-r--r-- | 56.3 KB |
zcrypt_api.h | -rw-r--r-- | 5.5 KB |
zcrypt_card.c | -rw-r--r-- | 5.3 KB |
zcrypt_cca_key.h | -rw-r--r-- | 7.5 KB |
zcrypt_ccamisc.c | -rw-r--r-- | 51.3 KB |
zcrypt_ccamisc.h | -rw-r--r-- | 9.7 KB |
zcrypt_cex2a.c | -rw-r--r-- | 6.1 KB |
zcrypt_cex2a.h | -rw-r--r-- | 3.3 KB |
zcrypt_cex2c.c | -rw-r--r-- | 11.0 KB |
zcrypt_cex2c.h | -rw-r--r-- | 517 bytes |
zcrypt_cex4.c | -rw-r--r-- | 19.8 KB |
zcrypt_cex4.h | -rw-r--r-- | 266 bytes |
zcrypt_debug.h | -rw-r--r-- | 1.1 KB |
zcrypt_ep11misc.c | -rw-r--r-- | 36.0 KB |
zcrypt_ep11misc.h | -rw-r--r-- | 5.5 KB |
zcrypt_error.h | -rw-r--r-- | 4.8 KB |
zcrypt_msgtype50.c | -rw-r--r-- | 16.1 KB |
zcrypt_msgtype50.h | -rw-r--r-- | 989 bytes |
zcrypt_msgtype6.c | -rw-r--r-- | 39.7 KB |
zcrypt_msgtype6.h | -rw-r--r-- | 5.1 KB |
zcrypt_queue.c | -rw-r--r-- | 5.4 KB |
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...