Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp4692979pxf; Tue, 23 Mar 2021 18:10:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwANP4TpLm18sKHywm/ZE9s8tcBbPkUmqc4H/pe/alrKn7kqgI3wUi66Q2BQv4AB6/L7nCj X-Received: by 2002:a17:906:3488:: with SMTP id g8mr943752ejb.282.1616548246945; Tue, 23 Mar 2021 18:10:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616548246; cv=none; d=google.com; s=arc-20160816; b=F4oM+D0UDYSzo9t+FcrNDH4O389JwMBtRgUN7+mhN5LEXEM4mejOWjTmklDoHd961g PjjqNvsk3BoWmLGqpYUrRj3R+hapBC9vavA2c884aNN580ULefTPvQsiR4yQrijFvTE/ tNYuVUchiW9OppyP7/qh3lMRdk2MpA1qFruUTpLOQNGY7XJu4v75uc78IFQ1TT202MVP pTvJCixdZEsrSMphmXWu4LoRpgsER3D4C+A3tW9Tbcp5/PHcH8Ssn7K2eFmRLNwQmZxU Wh2VhRi522+6LioBt1EQ5dHInMrBQ2Z6H7ZNdQr7moem1eo/ojg6n/k4Chd/PwIWYATr mJfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=duILxmGsNxDb2+5bOCyInt+n2r75QNaMLWJFYjgmINo=; b=sIyMnK53tP5pX+VugiDX4sZb0e+kPl0QOrK20lk34i99ODFMCIc/3Uj97RcuG1jGlu fPf1YoOGGi9+joWHiamVAO1wv48GMQ2nbFQVDLXbl9D30I1S3aFq8VWDYTRm30g+nMX6 pGmkGGPSkq1xmwYHaRES49JjR2irTyck5NXbUJ9k1bDGC+GwkABpLhus/7j5QIFMPsPx IdlDbHLzJ3ggVTYcVtra8neicubBzBrreAO+Hka/Zm3z9KMMXnrIViJTBn6uxE4P8UZ3 4lG+0V6Xs8LChOeg+uQpahl41Bg2IxqwOeg5InOgvRdCTFf9X/wlggRhmoR5KnEw0n/m 72lg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fgQvH++0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z15si531345ejr.694.2021.03.23.18.10.24; Tue, 23 Mar 2021 18:10:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=fgQvH++0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229944AbhCWNoA (ORCPT + 99 others); Tue, 23 Mar 2021 09:44:00 -0400 Received: from mail.kernel.org ([198.145.29.99]:51504 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231388AbhCWNnj (ORCPT ); Tue, 23 Mar 2021 09:43:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9E56861931; Tue, 23 Mar 2021 13:43:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616507019; bh=mdddZvp5x0zYX5TOootSoD8M/E3qTJFRI7zcAyCNzc8=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=fgQvH++0twRXNDTu/cPfTIYlyVyOJEqBWS+5UQiZmrkY2adgzzxy17Td4E3SmQXN1 lN17vSk3dHdIDybVhkRj1VqBr5akdnljlOZ+K/SOjfjehzLtmrQubFMzRQfWLbLcma Txb65BrK+muM1RPEvT2GGxfphZzA1DPqHIBSkI+0= Date: Tue, 23 Mar 2021 14:43:36 +0100 From: Greg KH To: Xiaoming Ni Cc: linux-kernel@vger.kernel.org, kiyin@tencent.com, stable@vger.kernel.org, sameo@linux.intel.com, linville@tuxdriver.com, davem@davemloft.net, kuba@kernel.org, mkl@pengutronix.de, stefan@datenfreihafen.org, matthieu.baerts@tessares.net, netdev@vger.kernel.org, wangle6@huawei.com, xiaoqian9@huawei.com Subject: Re: [PATCH 0/4] nfc: fix Resource leakage and endless loop Message-ID: References: <20210303061654.127666-1-nixiaoming@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20210303061654.127666-1-nixiaoming@huawei.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 03, 2021 at 02:16:50PM +0800, Xiaoming Ni wrote: > fix Resource leakage and endless loop in net/nfc/llcp_sock.c, > reported by "kiyin(尹亮)". > > Link: https://www.openwall.com/lists/oss-security/2020/11/01/1 What happened to this series? Does it need to be resent against the latest networking tree? thanks, greg k-h