/* * xenfs.c - a filesystem for passing info between the a domain and * the hypervisor. * * 2008-10-07 Alex Zeffertt Replaced /proc/xen/xenbus with xenfs filesystem * and /proc/xen compatibility mount point. * Turned xenfs into a loadable module. */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt #include #include #include #include #include #include #include "xenfs.h" #include "../privcmd.h" #include "../xenbus/xenbus_comms.h" #include MODULE_DESCRIPTION("Xen filesystem"); MODULE_LICENSE("GPL"); static ssize_t capabilities_read(struct file *file, char __user *buf, size_t size, loff_t *off) { char *tmp = ""; if (xen_initial_domain()) tmp = "control_d\n"; return simple_read_from_buffer(buf, size, off, tmp, strlen(tmp)); } static const struct file_operations capabilities_file_ops = { .read = capabilities_read, .llseek = default_llseek, }; static int xenfs_fill_super(struct super_block *sb, void *data, int silent) { static struct tree_descr xenfs_files[] = { [2] = { "xenbus", &xen_xenbus_fops, S_IRUSR|S_IWUSR }, { "capabilities", &capabilities_file_ops, S_IRUGO }, { "privcmd", &xen_privcmd_fops, S_IRUSR|S_IWUSR }, {""}, }; static struct tree_descr xenfs_init_files[] = { [2] = { "xenbus", &xen_xenbus_fops, S_IRUSR|S_IWUSR }, { "capabilities", &capabilities_file_ops, S_IRUGO }, { "privcmd", &xen_privcmd_fops, S_IRUSR|S_IWUSR }, { "xsd_kva", &xsd_kva_file_ops, S_IRUSR|S_IWUSR}, { "xsd_port", &xsd_port_file_ops, S_IRUSR|S_IWUSR}, #ifdef CONFIG_XEN_SYMS { "xensyms", &xensyms_ops, S_IRUSR}, #endif {""}, }; return simple_fill_super(sb, XENFS_SUPER_MAGIC, xen_initial_domain() ? xenfs_init_files : xenfs_files); } static struct dentry *xenfs_mount(struct file_system_type *fs_type, int flags, const char *dev_name, void *data) { return mount_single(fs_type, flags, data, xenfs_fill_super); } static struct file_system_type xenfs_type = { .owner = THIS_MODULE, .name = "xenfs", .mount = xenfs_mount, .kill_sb = kill_litter_super, }; MODULE_ALIAS_FS("xenfs"); static int __init xenfs_init(void) { if (xen_domain()) return register_filesystem(&xenfs_type); pr_info("not registering filesystem on non-xen platform\n"); return 0; } static void __exit xenfs_exit(void) { if (xen_domain()) unregister_filesystem(&xenfs_type); } module_init(xenfs_init); module_exit(xenfs_exit); ='committer'>committer
diff options
context:
space:
mode:
authorColin Ian King <colin.king@canonical.com>2016-12-09 14:17:47 +0000
committerMark Brown <broonie@kernel.org>2016-12-15 11:36:37 +0000
commitc2b36129ce53a22b89dd2b88db33e7ffdefe0f41 (patch)
tree4e1d391586c745f556793f2b64a0bf9e041dba26
parenta5de5b74a50113564a1e0850e2da96c37c35e55d (diff)
ASoC: topology: kfree kcontrol->private_value before freeing kcontrol
kcontrol->private_value is being kfree'd after kcontrol has been freed (in previous call to snd_ctl_remove). Instead, fix this by kfreeing the private_value before kcontrol. CoverityScan CID#1388311 "Read from pointer after free" Fixes: eea3dd4f1247a ("ASoC: topology: Only free TLV for volume mixers of a widget") Signed-off-by: Colin Ian King <colin.king@canonical.com> Signed-off-by: Mark Brown <broonie@kernel.org>