Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp591201pxj; Thu, 3 Jun 2021 14:23:40 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7kYMnNFV1wjHbnuknN7e8R+aX1ToiTT0YlFksgt/aPsbe1pTVPnUwbbPvhqKA8TTpyYuu X-Received: by 2002:a17:906:278f:: with SMTP id j15mr1178934ejc.388.1622755420342; Thu, 03 Jun 2021 14:23:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622755420; cv=none; d=google.com; s=arc-20160816; b=hujoTEW1zNRE+m4Z8gZJIhGFfO8DQKOs6mEl3CvvvQEB/QWQsHjOfEjZR0JZ9TQtEL hEdFSaFY9a4RBG6BKNNd2MKsQGjJtAYjoCQPkWQ+ZLfFpuuRNyyBBt//bm8PgJVxCl2w OGPgc9uuECmiRmS2bVU9qXf2GTxml6KefBjU5F0mYFPkskF3c/vjI7zCJv6cUwmreAI8 q7puRVKktrzbYvhie2SFji/hMC4KF2g1S0mXUXknxJBhqgJuRnfVSNOxaewTvhh4PuBx pNk0Zl+3Jro/q2dzGPrOzflJiYVGhvUAhrJbEEfGN/llNNOJ9+Nl3R+C1qEv5JLHnT2z tk5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=WBkhx1ex/F78q5/dMDtMDevoPZsBdVrLKCGiGl2T9JA=; b=Y8eqSO2LzDv+jxRUMTdhV6lhflrd13l+JHJEFSJ2G/4Axxqa07dM1SVUcQOfQ9gSJv 822BeWX7cf8wk+oKJq5qLW7um6W0XB3TUm5P186lzK77o85Oii8RBQ2wXEW4MVFFF0am bFqu9m40iNCwVFYoJ1KgU/YEUyJQI4tTdYZhVvDhWNPG0W2hBKEtyQa7mTDSBTQwdx2X WZ9YOziKx6zbiMf/3CyamsH5Sa0UrpWxxsI+6Qj8NOo2CxgA3ZHySw3MQjQroBmtr2mO qY9A6/GCifAHOumcZJtIoFS6585AktleOIx4ufLPPLSKn4AOFLXKN/VWpBQwlhgS7BVa ZV5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="t6a/HnLA"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cb18si3096006edb.80.2021.06.03.14.23.16; Thu, 03 Jun 2021 14:23:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="t6a/HnLA"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230035AbhFCVVs (ORCPT + 99 others); Thu, 3 Jun 2021 17:21:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:49034 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229640AbhFCVVs (ORCPT ); Thu, 3 Jun 2021 17:21:48 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id 13BE3613F6; Thu, 3 Jun 2021 21:20:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622755203; bh=cSbx5b55MaJOUg9EvsEss0JQJOuAQdD3T7xzvy+pPe0=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=t6a/HnLA+xNkiNwRCRn5p2Gho9Ke6rD41+IRIMGLw44FtuCFXlY18zE66KYsw4Ydw uvFKiMCt2PVkrYSUn+pVTaGbvC+vyOPm86ekRRoFKwQQhOK8A2s/UX9iZ8vuLjJTbU 5ihsfJ6TEkx8HDcThXzL3ySDUdXdO6Qyk05JBqKsckYO0+S/dfbk3XupYyq+pt2p1B 9rQX20a91I5SwZ8d76gJJtz0UXmkIzec5Nht475l6jjI21kxJEbicLhIF1Mw2G8vwk dgqf6MYrF6/ZB49zOn8T08y/CSWgiR36mRBB9b/RR3Pm7f7RgG/XqpEouQPLvM+HAi hnCvNFMmkAhlQ== Received: from pdx-korg-docbuild-2.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by pdx-korg-docbuild-2.ci.codeaurora.org (Postfix) with ESMTP id 07D7A60ACA; Thu, 3 Jun 2021 21:20:03 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH] net: kcm: fix memory leak in kcm_sendmsg From: patchwork-bot+netdevbpf@kernel.org Message-Id: <162275520302.10237.552144078259642267.git-patchwork-notify@kernel.org> Date: Thu, 03 Jun 2021 21:20:03 +0000 References: <20210602192640.13597-1-paskripkin@gmail.com> In-Reply-To: <20210602192640.13597-1-paskripkin@gmail.com> To: Pavel Skripkin Cc: davem@davemloft.net, kuba@kernel.org, tom@herbertland.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+b039f5699bd82e1fb011@syzkaller.appspotmail.com, stable@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (refs/heads/master): On Wed, 2 Jun 2021 22:26:40 +0300 you wrote: > Syzbot reported memory leak in kcm_sendmsg()[1]. > The problem was in non-freed frag_list in case of error. > > In the while loop: > > if (head == skb) > skb_shinfo(head)->frag_list = tskb; > else > skb->next = tskb; > > [...] Here is the summary with links: - net: kcm: fix memory leak in kcm_sendmsg https://git.kernel.org/netdev/net/c/c47cc304990a You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html