Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4555617ybl; Tue, 21 Jan 2020 23:49:56 -0800 (PST) X-Google-Smtp-Source: APXvYqyjIQH77ZHd/fwXQvCjEU5LBkct1YSuQZc5ULSocja79htywAxdnoTIN3cqn5BjlIMdKTuq X-Received: by 2002:a05:6830:ce:: with SMTP id x14mr6324060oto.289.1579679396639; Tue, 21 Jan 2020 23:49:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579679396; cv=none; d=google.com; s=arc-20160816; b=F3QYOTPi+jrUPCQCOJ0+VIugHtbuHCOIzZGmFDJ7VL8VwfI/UU2TOplaPMToposy9h FuY92TyjgtClK1wslwg1WwtzvelU6Xj16eAfIfCMxSqj353TFt67VZZNbf+H6enTZW/d Wk4HJF9Y9grsGEGTlm3WpJGk/NAKpISqgEtovfsnls5W+CxEZgL8PE7c8t8kuT0H2HDX 2erKVvH/LRwPJoW3Naq9RnJcW9XkPEYvXhESFz+S+3zE0LppUZNhu/SbW+tUfoU5i8am 3aLfm3xFtBDd2xR3tbwUm2naCfREqYd69WIxt3O2G2/XzQSkkEvoI5T5+b8pQZ7+sbrw FOnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:message-id:in-reply-to:date:references:subject:cc:to :from:dkim-signature; bh=xwjsIpjDVQTLXOURbJxAwsG5lamWs2lFH+xIMZoFUP4=; b=z1IHgeDT1BRf1eGF98hBk0Vy1Zr9mMjrHboeRXlNa7pQdUUfacJJHLep1pyX7gnes+ JbjeUQcimRVvE0lgaA5mNwQmt+ge2VltZSiufoUNtUWToYI12Aw+YvC97kaPaZ6PLIXm 0mTO8UhkPkmylBVcaCkgKS2AJ2twf/2MrxRUgQMY7jQ2UPGvvjHQgquEMorNXRbh/yWs fZ4OdRzR0dKPDP+/JSO6AN+5TvEl/IFCJvgp+mA4fKXwhzzjHyFMK4xD13FkItN6nWm7 ffS9Ntxjaxn02xKheN6b1wlh3ZrOcYql7Ij7vREAoIvtakRDcGjHt0k8jzps3EI4w/70 GRsw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@unikie-com.20150623.gappssmtp.com header.s=20150623 header.b="AJ/ff+Gl"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o12si20186898oie.150.2020.01.21.23.49.45; Tue, 21 Jan 2020 23:49:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@unikie-com.20150623.gappssmtp.com header.s=20150623 header.b="AJ/ff+Gl"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728992AbgAVHsw (ORCPT + 99 others); Wed, 22 Jan 2020 02:48:52 -0500 Received: from mail-lj1-f193.google.com ([209.85.208.193]:36407 "EHLO mail-lj1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728609AbgAVHsv (ORCPT ); Wed, 22 Jan 2020 02:48:51 -0500 Received: by mail-lj1-f193.google.com with SMTP id r19so5705761ljg.3 for ; Tue, 21 Jan 2020 23:48:50 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=unikie-com.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:references:date:in-reply-to:message-id :user-agent:mime-version:content-transfer-encoding; bh=xwjsIpjDVQTLXOURbJxAwsG5lamWs2lFH+xIMZoFUP4=; b=AJ/ff+Gl0mtLIrEnboH/T3vQ84C7Z2G/KJQN87cLI9CCUtJc4c+gDKJ8OGYJdcTVOb yRRvgOENZNoIbi1x7QQ+gHf9HZb3g1tDmaY/QVLR7dIEoFXutP1T1kbqruCQlOfAkX9b 4+kZDuKzke7J9kErHxXJAeAfVDQrTfkq5eiQqsyRr74DhlKehM5jIFk42icQiwqLrR/7 GkP9BhmA9gg1sytA2OjNJQ0BttL4mEsHz14pyHaIl4/pQ8kDxofMWe2s8dDHfLW2XVfk OubPOBqAOOp8zbS+kawxrC7NPS5njpPNS4Yr2rC1v1F8Uc6epdDfRdb21yQ7nClyl9+s QQHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:references:date:in-reply-to :message-id:user-agent:mime-version:content-transfer-encoding; bh=xwjsIpjDVQTLXOURbJxAwsG5lamWs2lFH+xIMZoFUP4=; b=Henx+PE2Z8xWyZ1N9KXgmI0JOMxN1hkmjq8bQMRynKawbmIdSdu6Zz9veJnSSXR2mG jKuxdpWTf9YNiVf1xXizUWmRemd3JzLjyTUOLqVIP9Y2Gi/QBJJN8sum5pGyJDVGaaQA yXw4cAiMYcYGJc2fPCkXhmtkntrdEF79pNoY4JLPTRcTtjlcVYONoraGpYrMFGTkEGWj +hBm8Y8Qc+U66hg/gP4QdlwQjcDUbvXnkOn9doJIkC42ReROLsEY2/x6mkhm/FXbhvdb C4cJhmrKF/9ShYxbWMbTe0JUn7kyd4o+IQPtfFfDYGKSfT0OSHsy7tO0p9kfDq4hCwv0 0ppA== X-Gm-Message-State: APjAAAUjbLJ/HjCAixWy5nDqyO55jlhjMH/jmVLeu/bnJ843EwIy5Pob i7rgx4ce05nzfGExUcCf46hq/A== X-Received: by 2002:a2e:9d90:: with SMTP id c16mr16918246ljj.264.1579679329441; Tue, 21 Jan 2020 23:48:49 -0800 (PST) Received: from GL-434 ([109.204.235.119]) by smtp.gmail.com with ESMTPSA id f22sm19875406ljh.74.2020.01.21.23.48.48 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 21 Jan 2020 23:48:48 -0800 (PST) From: jouni.hogander@unikie.com (Jouni =?utf-8?Q?H=C3=B6gander?=) To: Greg Kroah-Hartman Cc: Lukas Bulwahn , Naresh Kamboju , open list , Linus Torvalds , Andrew Morton , Guenter Roeck , Shuah Khan , patches@kernelci.org, Ben Hutchings , lkft-triage@lists.linaro.org, linux- stable , Netdev , Al Viro , linux-fsdevel@vger.kernel.org, Eric Dumazet , "David S. Miller" Subject: Re: [PATCH 4.19 000/306] 4.19.87-stable review References: <20191127203114.766709977@linuxfoundation.org> <20191128073623.GE3317872@kroah.com> <20191129085800.GF3584430@kroah.com> Date: Wed, 22 Jan 2020 09:48:47 +0200 In-Reply-To: <20191129085800.GF3584430@kroah.com> (Greg Kroah-Hartman's message of "Fri, 29 Nov 2019 09:58:00 +0100") Message-ID: <87sgk8szhc.fsf@unikie.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Greg Kroah-Hartman writes: >> > Now queued up, I'll push out -rc2 versions with this fix. >> > >> > greg k-h >>=20 >> We have also been informed about another regression these two commits >> are causing: >>=20 >> https://lore.kernel.org/lkml/ace19af4-7cae-babd-bac5-cd3505dcd874@I-love= .SAKURA.ne.jp/ >>=20 >> I suggest to drop these two patches from this queue, and give us a >> week to shake out the regressions of the change, and once ready, we >> can include the complete set of fixes to stable (probably in a week or >> two). > > Ok, thanks for the information, I've now dropped them from all of the > queues that had them in them. > > greg k-h I have now run more extensive Syzkaller testing on following patches: cb626bf566eb net-sysfs: Fix reference count leak ddd9b5e3e765 net-sysfs: Call dev_hold always in rx_queue_add_kobject e0b60903b434 net-sysfs: Call dev_hold always in netdev_queue_add_kobje 48a322b6f996 net-sysfs: fix netdev_queue_add_kobject() breakage b8eb718348b8 net-sysfs: Fix reference count leak in rx|netdev_queue_add_kob= ject These patches are fixing couple of memory leaks including this one found by Syzbot: https://syzkaller.appspot.com/bug?extid=3Dad8ca40ecd77896d51e2 I can reproduce these memory leaks in following stable branches: 4.14, 4.19, and 5.4. These are all now merged into net/master tree and based on my testing they are ready to be taken into stable branches as well. Best Regards, Jouni H=C3=B6gander