linux/drivers/firmware/efi/libstub
Arvind Sankar ff397be685 efi/gop: Fix memory leak in __gop_query32/64()
efi_graphics_output_protocol::query_mode() returns info in
callee-allocated memory which must be freed by the caller, which
we aren't doing.

We don't actually need to call query_mode() in order to obtain the
info for the current graphics mode, which is already there in
gop->mode->info, so just access it directly in the setup_gop32/64()
functions.

Also nothing uses the size of the info structure, so don't update the
passed-in size (which is the size of the gop_handle table in bytes)
unnecessarily.

Signed-off-by: Arvind Sankar <nivedita@alum.mit.edu>
Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
Cc: Andy Shevchenko <andriy.shevchenko@linux.intel.com>
Cc: Bhupesh Sharma <bhsharma@redhat.com>
Cc: Masayoshi Mizuma <m.mizuma@jp.fujitsu.com>
Cc: linux-efi@vger.kernel.org
Link: https://lkml.kernel.org/r/20191206165542.31469-5-ardb@kernel.org
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2019-12-08 12:42:18 +01:00
..
arm-stub.c efi: libstub/tpm: enable tpm eventlog function for ARM platforms 2019-11-07 10:18:45 +01:00
arm32-stub.c arm/efi: EFI soft reservation to memblock 2019-11-07 15:44:19 +01:00
arm64-stub.c efi: Replace GPL license boilerplate with SPDX headers 2019-02-04 08:27:25 +01:00
efi-stub-helper.c efi: Common enable/disable infrastructure for EFI soft reservation 2019-11-07 15:44:08 +01:00
efistub.h x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table 2019-11-07 10:18:45 +01:00
fdt.c Abstract out support for locating an EFI config table 2019-06-24 23:57:49 +03:00
gop.c efi/gop: Fix memory leak in __gop_query32/64() 2019-12-08 12:42:18 +01:00
Makefile x86: efi/random: Invoke EFI_RNG_PROTOCOL to seed the UEFI RNG table 2019-11-07 10:18:45 +01:00
random.c ACPI updates for 5.5-rc1 2019-11-26 19:25:25 -08:00
secureboot.c efi: Replace GPL license boilerplate with SPDX headers 2019-02-04 08:27:25 +01:00
string.c License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00
tpm.c tpm: Don't duplicate events from the final event log in the TCG2 log 2019-06-24 23:57:50 +03:00