lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1554307455-40361-1-git-send-email-wen.yang99@zte.com.cn>
Date:   Thu, 4 Apr 2019 00:04:08 +0800
From:   Wen Yang <wen.yang99@....com.cn>
To:     linux-kernel@...r.kernel.org
Cc:     wang.yi59@....com.cn, Wen Yang <wen.yang99@....com.cn>
Subject: [PATCH 0/7] fix possible object reference leaks in drivers/gpu

The call to of_get_cpu_node/of_find_compatible_node/of_parse_phandle...
returns a node pointer with refcount incremented thus it must be
explicitly decremented after the last usage.

This patch series fix those possible object reference leaks in drivers/gpu.

Wen Yang (7):
  drm/mediatek: fix possible object reference leak
  drm/meson: fix possible object reference leak
  drm/msm: a5xx: fix possible object reference leak
  drm/omap: fix possible object reference leak
  drm/pl111: fix possible object reference leak
  drm: rcar-du: fix possible object reference leak
  drm/tegra: fix possible object reference leak

 drivers/gpu/drm/mediatek/mtk_hdmi.c             |  1 +
 drivers/gpu/drm/meson/meson_dw_hdmi.c           |  7 ++-----
 drivers/gpu/drm/msm/adreno/a5xx_gpu.c           | 10 ++++++----
 drivers/gpu/drm/omapdrm/dss/omapdss-boot-init.c |  5 ++++-
 drivers/gpu/drm/pl111/pl111_versatile.c         |  4 ++++
 drivers/gpu/drm/rcar-du/rcar_du_of.c            |  2 ++
 drivers/gpu/drm/tegra/output.c                  |  2 ++
 drivers/gpu/drm/tegra/rgb.c                     |  8 ++++++--
 8 files changed, 27 insertions(+), 12 deletions(-)

-- 
2.9.5

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ