lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAK8P3a0G51Ky6aHq=YS8T-TafcxfW0+E7=A0LX4zT-Yxo-JB2g@mail.gmail.com>
Date:   Thu, 12 May 2022 08:35:33 +0200
From:   Arnd Bergmann <arnd@...db.de>
To:     Miaoqian Lin <linmq006@...il.com>
Cc:     Russell King <linux@...linux.org.uk>,
        Linus Walleij <linus.walleij@...aro.org>,
        Anders Berg <anders.berg@....com>,
        Arnd Bergmann <arnd@...db.de>,
        Linux ARM <linux-arm-kernel@...ts.infradead.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] ARM: Fix refcount leak in axxia_boot_secondary

On Thu, May 12, 2022 at 4:06 AM Miaoqian Lin <linmq006@...il.com> wrote:
>
> of_find_compatible_node() returns a node pointer with refcount
> incremented, we should use of_node_put() on it when done.
> Add missing of_node_put() to avoid refcount leak.
>
> Fixes: 1d22924e1c4e ("ARM: Add platform support for LSI AXM55xx SoC")
> Signed-off-by: Miaoqian Lin <linmq006@...il.com>

This looks good to me, thanks a lot for the fixes. The arch/arm/mach-*/
patches usually get picked  up by platform maintainers, but not all of
them are very active.

I would suggest you wait a few more days for individual  maintainers to either
pick up, ack or nack the patches. For those that you get either an Ack or
no reply, please resend them to soc@...nel.org, and I'll apply them to
the soc tree directly.

       Arnd

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ