https://github.com/torvalds/linux
Revision 2127d22509aec3a83dffb2a3c736df7ba747a7ce authored by Miaohe Lin on 18 October 2021, 22:15:52 UTC, committed by Linus Torvalds on 19 October 2021, 06:22:03 UTC
Patch series "Fixups for slub".

This series contains various bug fixes for slub.  We fix memoryleak,
use-afer-free, NULL pointer dereferencing and so on in slub.  More
details can be found in the respective changelogs.

This patch (of 5):

It's possible that __seq_open_private() will return NULL.  So we should
check it before using lest dereferencing NULL pointer.  And in error
paths, we forgot to release private buffer via seq_release_private().
Memory will leak in these paths.

Link: https://lkml.kernel.org/r/20210916123920.48704-1-linmiaohe@huawei.com
Link: https://lkml.kernel.org/r/20210916123920.48704-2-linmiaohe@huawei.com
Fixes: 64dd68497be7 ("mm: slub: move sysfs slab alloc/free interfaces to debugfs")
Signed-off-by: Miaohe Lin <linmiaohe@huawei.com>
Reviewed-by: Vlastimil Babka <vbabka@suse.cz>
Cc: Christoph Lameter <cl@linux.com>
Cc: Pekka Enberg <penberg@kernel.org>
Cc: David Rientjes <rientjes@google.com>
Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Cc: Faiyaz Mohammed <faiyazm@codeaurora.org>
Cc: Andrey Konovalov <andreyknvl@gmail.com>
Cc: Andrey Ryabinin <ryabinin.a.a@gmail.com>
Cc: Kees Cook <keescook@chromium.org>
Cc: Bharata B Rao <bharata@linux.ibm.com>
Cc: Roman Gushchin <guro@fb.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1 parent 6d2aec9
History
Tip revision: 2127d22509aec3a83dffb2a3c736df7ba747a7ce authored by Miaohe Lin on 18 October 2021, 22:15:52 UTC
mm, slub: fix two bugs in slab_debug_trace_open()
Tip revision: 2127d22
File Mode Size
Makefile -rw-r--r-- 686 bytes
ap_bus.c -rw-r--r-- 48.9 KB
ap_bus.h -rw-r--r-- 11.6 KB
ap_card.c -rw-r--r-- 5.5 KB
ap_debug.h -rw-r--r-- 994 bytes
ap_queue.c -rw-r--r-- 23.8 KB
pkey_api.c -rw-r--r-- 54.3 KB
vfio_ap_drv.c -rw-r--r-- 4.7 KB
vfio_ap_ops.c -rw-r--r-- 37.2 KB
vfio_ap_private.h -rw-r--r-- 3.2 KB
zcrypt_api.c -rw-r--r-- 56.3 KB
zcrypt_api.h -rw-r--r-- 5.5 KB
zcrypt_card.c -rw-r--r-- 5.3 KB
zcrypt_cca_key.h -rw-r--r-- 7.5 KB
zcrypt_ccamisc.c -rw-r--r-- 51.3 KB
zcrypt_ccamisc.h -rw-r--r-- 9.7 KB
zcrypt_cex2a.c -rw-r--r-- 6.1 KB
zcrypt_cex2a.h -rw-r--r-- 3.3 KB
zcrypt_cex2c.c -rw-r--r-- 11.0 KB
zcrypt_cex2c.h -rw-r--r-- 517 bytes
zcrypt_cex4.c -rw-r--r-- 19.8 KB
zcrypt_cex4.h -rw-r--r-- 266 bytes
zcrypt_debug.h -rw-r--r-- 1.1 KB
zcrypt_ep11misc.c -rw-r--r-- 36.0 KB
zcrypt_ep11misc.h -rw-r--r-- 5.5 KB
zcrypt_error.h -rw-r--r-- 4.8 KB
zcrypt_msgtype50.c -rw-r--r-- 16.1 KB
zcrypt_msgtype50.h -rw-r--r-- 989 bytes
zcrypt_msgtype6.c -rw-r--r-- 39.7 KB
zcrypt_msgtype6.h -rw-r--r-- 5.1 KB
zcrypt_queue.c -rw-r--r-- 5.4 KB

back to top