lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20260118111227.GAaWzAG_7QzhlSTeKe@fat_crate.local>
Date: Sun, 18 Jan 2026 12:12:27 +0100
From: Borislav Petkov <bp@...en8.de>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: linux-edac <linux-edac@...r.kernel.org>,
	lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] EDAC fixes for v6.19-rc6

Hi Linus,

please pull two forgot-to-unwind-resources-on-the-error-path fixes for
v6.19-rc6.

Thx.

---

The following changes since commit f8f9c1f4d0c7a64600e2ca312dec824a0bc2f1da:

  Linux 6.19-rc3 (2025-12-28 13:24:26 -0800)

are available in the Git repository at:

  ssh://git@...olite.kernel.org/pub/scm/linux/kernel/git/ras/ras.git tags/edac_urgent_for_v6.19_rc6

for you to fetch changes up to 0ff7c44106b4715fc27a2e455d9f57f1dfcfd54f:

  EDAC/x38: Fix a resource leak in x38_probe1() (2026-01-04 08:35:39 +0100)

----------------------------------------------------------------
- Make sure the memory-mapped memory controller registers BAR gets unmapped
  when the driver memory allocation fails. Fix that in both x38 and i3200 EDAC
  drivers as former has copied the bug from the latter, it looks like

----------------------------------------------------------------
Haoxiang Li (2):
      EDAC/i3200: Fix a resource leak in i3200_probe1()
      EDAC/x38: Fix a resource leak in x38_probe1()

 drivers/edac/i3200_edac.c | 11 ++++++-----
 drivers/edac/x38_edac.c   |  9 ++++++---
 2 files changed, 12 insertions(+), 8 deletions(-)


-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ