lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 3 Dec 2021 09:18:43 +0800 From: Zhiqiang Liu <liuzhiqiang26@...wei.com> To: "Theodore Y. Ts'o" <tytso@....edu>, zhanchengbin <zhanchengbin1@...wei.com> CC: <linux-ext4@...r.kernel.org>, <linfeilong@...wei.com> Subject: Re: [PATCH 0/6] solve memory leak and check whether NULL pointer Sorry for that, we will resend the patch series. On 2021/12/2 22:53, Theodore Y. Ts'o wrote: > On Thu, Dec 02, 2021 at 07:26:25PM +0800, zhanchengbin wrote: >> Solve the memory leak of the abnormal branch and the new null pointer check >> >> zhanchengbin (6): >> alloc_string : String structure consistency >> ss_execute_command : Check whether the pointer is not null before it >> is referenced. >> quota_set_sb_inum : Check whether the pointer is not null before it >> is referenced. >> badblock_list memory leak >> ldesc Non-empty judgment >> io->name memory leak > The cover letter for the patch series arrived, but none of the patches > associated with it did. Could you resend? > > Thanks, > > - Ted > > .
Powered by blists - more mailing lists