From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-11.2 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5AD01C43461 for ; Tue, 27 Apr 2021 22:40:16 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 389F5613B1 for ; Tue, 27 Apr 2021 22:40:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239381AbhD0Wk6 (ORCPT ); Tue, 27 Apr 2021 18:40:58 -0400 Received: from mail.kernel.org ([198.145.29.99]:56422 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238548AbhD0Wky (ORCPT ); Tue, 27 Apr 2021 18:40:54 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id 845AE61404; Tue, 27 Apr 2021 22:40:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1619563210; bh=6uvEgWmSuI3CiTQgqx2XsEl8TVLiLcygDlDXC0plN6Y=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=PZAVerXYjeUe4GYtFKYrqTushQZzvbwbf19uumPcw5QlmAkpWuqAzN/q0f2/qNxpG +DnJzB6QwAiuuA+KaRw+yQ5O4fFb8XEWCdlY/9d7WstpaBNnxxYXuoJtc/NSBgvgE+ 3/jB+MyRdOboPzx6glJ6Ip3Qb/UHSisuZ4OUwfcORLLq++wTMMiXU/aL3N6AmPjo0g mOBwkWAiLSxWPuh9Fsbvoj9iaC5TeVjMxBoPOHFhnev/7jJyBgbEuV6E1FMfyEfE3Q P8Zvgm99miL7QeBLdCAamZbG/Bp0mWD5PC2wp0v2nfd0ombel/YcI5Of7VME+0cpXH 81TtKqdsx3MOA== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH] net:nfc:digital: Fix a double free in digital_tg_recv_dep_req From: patchwork-bot+netdevbpf@kernel.org Message-Id: <161956321049.28898.4886085211372158981.git-patchwork-notify@kernel.org> Date: Tue, 27 Apr 2021 22:40:10 +0000 References: <20210427162258.7238-1-lyl2019@mail.ustc.edu.cn> In-Reply-To: <20210427162258.7238-1-lyl2019@mail.ustc.edu.cn> To: Lv Yunlong Cc: davem@davemloft.net, kuba@kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to netdev/net-next.git (refs/heads/master): On Tue, 27 Apr 2021 09:22:58 -0700 you wrote: > In digital_tg_recv_dep_req, it calls nfc_tm_data_received(..,resp). > If nfc_tm_data_received() failed, the callee will free the resp via > kfree_skb() and return error. But in the exit branch, the resp > will be freed again. > > My patch sets resp to NULL if nfc_tm_data_received() failed, to > avoid the double free. > > [...] Here is the summary with links: - net:nfc:digital: Fix a double free in digital_tg_recv_dep_req https://git.kernel.org/netdev/net-next/c/75258586793e You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html