lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20211101143004.GD2914@kadam>
Date:   Mon, 1 Nov 2021 17:30:04 +0300
From:   Dan Carpenter <dan.carpenter@...cle.com>
To:     Dongliang Mu <mudongliangabcd@...il.com>
Cc:     Pavel Skripkin <paskripkin@...il.com>,
        Mauro Carvalho Chehab <mchehab@...nel.org>,
        linux-media@...r.kernel.org,
        linux-kernel <linux-kernel@...r.kernel.org>,
        Greg KH <gregkh@...uxfoundation.org>
Subject: Re: Need help in debugging "memory leak in em28xx_init_dev"

On Mon, Nov 01, 2021 at 05:58:56PM +0800, Dongliang Mu wrote:
> On Mon, Nov 1, 2021 at 5:43 PM Pavel Skripkin <paskripkin@...il.com> wrote:
> >
> > On 11/1/21 12:41, Dongliang Mu wrote:
> > >> Hi, Dongliang,
> > >>
> > >> Did patch attached to my previous email pass syzbot's reproducer test?
> > >> Unfortunately, I am not able to test rn :(
> > >
> > > Yes, it works. The memory leak does not occur anymore.
> > >
> > > But I am crafting another patch based on yours as there is a small
> > > issue in the retval and I would like to make the error handling code
> > > uniform.
> > >
> >
> > Cool! Thank you for confirmation.
> 
> Hi Pavel,
> 
> Thanks for your advice. I have sent the patch and you are on the CC
> list. Can you please take a look at and review my patch?
> 

What's the Message-ID of your patch so I can b4 it.

This whole thread has no patches.  I don't know why I'm CC'd when the
only part I'm interested in is not included...  :/  Hashtag Grumble.

regards,
dan carpenter

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ