Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1503354pxv; Fri, 23 Jul 2021 09:52:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzv8cumky8rOmvGL6Pr/hUnYNNPInq24AIkmgK2IavlCT5Hg77OLhl0tUVy28l919CSUAOY X-Received: by 2002:a05:6638:1646:: with SMTP id a6mr4875677jat.1.1627059123983; Fri, 23 Jul 2021 09:52:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627059123; cv=none; d=google.com; s=arc-20160816; b=zx2bxSd/368EHqj+NvSkEz4acBU5l+ykX70HG6egxzMxzM/tQyXkfp59qhxU158aWy ItiWErtNW51plfYyp4M/rj42R6IKiRE3gK6vZaWGyNu5+kVuC7hbGd3r1xIqiVeiVUBe VUS2p/OFxCn5y/JPOuLn8y647cSfKT5e8i8TAru2Bf+DoGpajmeZjfYv9dRRmnZ04q6p vQadJL1jTlfiRLFOmJIM5fV6eP6BIZfUMSYyM0BX4Xv6XYSzITTEqd68aBn5/v638s62 iO+/pg7aa8C8HSktGCbqq7bZhUPXfh6+fAaVUTGtIN/89hEs+XsKTq1qvMFHHWaIPnWM ZNsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=U2CWZxQfMBuKH2VNRSyc0PnMY3wBJ7ZJPp6DjL3LMBA=; b=jtDL/61AXoJbIq5hmSv84ecRta3lYix+XkUZ+RaDu0JXKFh0IRkDh4TKAC2RoqoKUx pbJtByW/XpNv/k+yHCjnI9sQq3HWfMIVkaG/ccQMOdTIkAs7e5drNyBK6E8hxaoOYPz+ XxyUFOf1CahxOFCnW+IBNVzq0q1NSg0sJpH7wjs+iLVcEN5pxqczzjfvG4AGm4eycHFk OuZNnNSSxSAWHxRburznD/Q8s2HIGHHzqhGSK/d9sMQEltsaBALn+yrX7fhFT3qR1tBk iX+wWyDPYVo54nGDe6bTn/zu52N3CLk0GIQxnD5vr8c4Y/gDcVvkrvEY8CkzHiWu/xR3 uDRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bgq+DxgP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d24si22328898iob.3.2021.07.23.09.51.52; Fri, 23 Jul 2021 09:52:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=bgq+DxgP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231314AbhGWQJd (ORCPT + 99 others); Fri, 23 Jul 2021 12:09:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:35888 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230393AbhGWQJc (ORCPT ); Fri, 23 Jul 2021 12:09:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id 3C1DD60EB5; Fri, 23 Jul 2021 16:50:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627059006; bh=Maw2pDz5zbCE6MAg2tKnfkmkDkJ8MV+TvmEFBDQY8uc=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=bgq+DxgPKEY8QPCehSCYWq5Xb464GSYnESyd/qlmY854z80tfQguHiZxALcshMdqR +RGBhSzeyT+sUuvXJvzbhp7oHKqCwy2g1R4jKjvVomWxwq/hUU4FySqI1Gh/wOlVcK X4iiTN3XqxwH7vYfYXNDrbH+NkP6SPDeJW514MdNRycG5TZVw8cMunjhQ3gfm08zeV bTll/Vf1it5YSpQGGCoG7p4kSQnBiWYG9LAeEKwKqqk0fMoKhiCDq2mzYlRkEwVqe9 45S2+F5tkFhrYGSTlg99BC4qA62aLQZxi5sJPGmwY6iubWnGUVjNV7lt906Ukxqh6I KejEz/4WCKjOA== Received: from pdx-korg-docbuild-2.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by pdx-korg-docbuild-2.ci.codeaurora.org (Postfix) with ESMTP id 2F2B860721; Fri, 23 Jul 2021 16:50:06 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH v2] net: qrtr: fix memory leaks From: patchwork-bot+netdevbpf@kernel.org Message-Id: <162705900618.21133.10256385935124978429.git-patchwork-notify@kernel.org> Date: Fri, 23 Jul 2021 16:50:06 +0000 References: <20210723153132.6159-1-paskripkin@gmail.com> In-Reply-To: <20210723153132.6159-1-paskripkin@gmail.com> To: Pavel Skripkin Cc: mani@kernel.org, davem@davemloft.net, kuba@kernel.org, loic.poulain@linaro.org, bjorn.andersson@linaro.org, xiyou.wangcong@gmail.com, edumazet@google.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+35a511c72ea7356cdcf3@syzkaller.appspotmail.com Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net.git (refs/heads/master): On Fri, 23 Jul 2021 18:31:32 +0300 you wrote: > Syzbot reported memory leak in qrtr. The problem was in unputted > struct sock. qrtr_local_enqueue() function calls qrtr_port_lookup() > which takes sock reference if port was found. Then there is the following > check: > > if (!ipc || &ipc->sk == skb->sk) { > ... > return -ENODEV; > } > > [...] Here is the summary with links: - [v2] net: qrtr: fix memory leaks https://git.kernel.org/netdev/net/c/52f3456a96c0 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html