From: patchwork-bot+netdevbpf@kernel.org
To: Saeed Mahameed <saeed@kernel.org>
Cc: davem@davemloft.net, kuba@kernel.org, pabeni@redhat.com,
edumazet@google.com, saeedm@nvidia.com, netdev@vger.kernel.org,
tariqt@nvidia.com, shaozhengchao@huawei.com,
simon.horman@corigine.com, leonro@nvidia.com
Subject: Re: [net 01/15] net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups
Date: Fri, 28 Jul 2023 03:30:23 +0000 [thread overview]
Message-ID: <169051502337.18144.3385123075811330874.git-patchwork-notify@kernel.org> (raw)
In-Reply-To: <20230726213206.47022-2-saeed@kernel.org>
Hello:
This series was applied to netdev/net.git (main)
by Saeed Mahameed <saeedm@nvidia.com>:
On Wed, 26 Jul 2023 14:31:52 -0700 you wrote:
> From: Zhengchao Shao <shaozhengchao@huawei.com>
>
> In function macsec_fs_tx_create_crypto_table_groups(), when the ft->g
> memory is successfully allocated but the 'in' memory fails to be
> allocated, the memory pointed to by ft->g is released once. And in function
> macsec_fs_tx_create(), macsec_fs_tx_destroy() is called to release the
> memory pointed to by ft->g again. This will cause double free problem.
>
> [...]
Here is the summary with links:
- [net,01/15] net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups
https://git.kernel.org/netdev/net/c/aeb660171b06
- [net,02/15] net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx
https://git.kernel.org/netdev/net/c/5dd77585dd9d
- [net,03/15] net/mlx5: fix potential memory leak in mlx5e_init_rep_rx
https://git.kernel.org/netdev/net/c/c6cf0b6097bf
- [net,04/15] net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer()
https://git.kernel.org/netdev/net/c/e5bcb7564d3b
- [net,05/15] net/mlx5: Honor user input for migratable port fn attr
https://git.kernel.org/netdev/net/c/0507f2c8be0d
- [net,06/15] net/mlx5e: Don't hold encap tbl lock if there is no encap action
https://git.kernel.org/netdev/net/c/93a331939d1d
- [net,07/15] net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set
https://git.kernel.org/netdev/net/c/3ec43c1b082a
- [net,08/15] net/mlx5e: Move representor neigh cleanup to profile cleanup_tx
https://git.kernel.org/netdev/net/c/d03b6e6f3182
- [net,09/15] net/mlx5e: xsk: Fix invalid buffer access for legacy rq
https://git.kernel.org/netdev/net/c/e0f52298fee4
- [net,10/15] net/mlx5e: xsk: Fix crash on regular rq reactivation
https://git.kernel.org/netdev/net/c/39646d9bcd1a
- [net,11/15] net/mlx5: Bridge, set debugfs access right to root-only
https://git.kernel.org/netdev/net/c/eb02b93aad95
- [net,12/15] net/mlx5e: kTLS, Fix protection domain in use syndrome when devlink reload
https://git.kernel.org/netdev/net/c/3e4cf1dd2ce4
- [net,13/15] net/mlx5: fs_chains: Fix ft prio if ignore_flow_level is not supported
https://git.kernel.org/netdev/net/c/61eab651f6e9
- [net,14/15] net/mlx5: DR, Fix peer domain namespace setting
https://git.kernel.org/netdev/net/c/62752c0bc67f
- [net,15/15] net/mlx5: Unregister devlink params in case interface is down
https://git.kernel.org/netdev/net/c/53d737dfd3d7
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
next prev parent reply other threads:[~2023-07-28 3:30 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-07-26 21:31 [pull request][net 00/15] mlx5 fixes 2023-07-26 Saeed Mahameed
2023-07-26 21:31 ` [net 01/15] net/mlx5e: fix double free in macsec_fs_tx_create_crypto_table_groups Saeed Mahameed
2023-07-28 3:30 ` patchwork-bot+netdevbpf [this message]
2023-07-26 21:31 ` [net 02/15] net/mlx5: DR, fix memory leak in mlx5dr_cmd_create_reformat_ctx Saeed Mahameed
2023-07-26 21:31 ` [net 03/15] net/mlx5: fix potential memory leak in mlx5e_init_rep_rx Saeed Mahameed
2023-07-26 21:31 ` [net 04/15] net/mlx5e: fix return value check in mlx5e_ipsec_remove_trailer() Saeed Mahameed
2023-07-26 21:31 ` [net 05/15] net/mlx5: Honor user input for migratable port fn attr Saeed Mahameed
2023-07-26 21:31 ` [net 06/15] net/mlx5e: Don't hold encap tbl lock if there is no encap action Saeed Mahameed
2023-07-26 21:31 ` [net 07/15] net/mlx5e: Fix crash moving to switchdev mode when ntuple offload is set Saeed Mahameed
2023-07-26 21:31 ` [net 08/15] net/mlx5e: Move representor neigh cleanup to profile cleanup_tx Saeed Mahameed
2023-07-26 21:32 ` [net 09/15] net/mlx5e: xsk: Fix invalid buffer access for legacy rq Saeed Mahameed
2023-07-26 21:32 ` [net 10/15] net/mlx5e: xsk: Fix crash on regular rq reactivation Saeed Mahameed
2023-07-26 21:32 ` [net 11/15] net/mlx5: Bridge, set debugfs access right to root-only Saeed Mahameed
2023-07-26 21:32 ` [net 12/15] net/mlx5e: kTLS, Fix protection domain in use syndrome when devlink reload Saeed Mahameed
2023-07-26 21:32 ` [net 13/15] net/mlx5: fs_chains: Fix ft prio if ignore_flow_level is not supported Saeed Mahameed
2023-07-26 21:32 ` [net 14/15] net/mlx5: DR, Fix peer domain namespace setting Saeed Mahameed
2023-07-26 21:32 ` [net 15/15] net/mlx5: Unregister devlink params in case interface is down Saeed Mahameed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=169051502337.18144.3385123075811330874.git-patchwork-notify@kernel.org \
--to=patchwork-bot+netdevbpf@kernel.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=kuba@kernel.org \
--cc=leonro@nvidia.com \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=saeed@kernel.org \
--cc=saeedm@nvidia.com \
--cc=shaozhengchao@huawei.com \
--cc=simon.horman@corigine.com \
--cc=tariqt@nvidia.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).