lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <00000000000063e0d3060c20e4ce@google.com> Date: Sat, 09 Dec 2023 21:14:30 -0800 From: syzbot <syzbot+006987d1be3586e13555@...kaller.appspotmail.com> To: linux-kernel@...r.kernel.org Subject: Re: [syzbot] [arm-msm?] [net?] memory leak in radix_tree_insert For archival purposes, forwarding an incoming command email to linux-kernel@...r.kernel.org. *** Subject: [arm-msm?] [net?] memory leak in radix_tree_insert Author: eadavis@...com please test memory leak in radix_tree_insert #syz test https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git 33cc938e65a9 diff --git a/net/qrtr/af_qrtr.c b/net/qrtr/af_qrtr.c index 41ece61eb57a..3615a9f35bbb 100644 --- a/net/qrtr/af_qrtr.c +++ b/net/qrtr/af_qrtr.c @@ -267,6 +267,9 @@ static int qrtr_tx_wait(struct qrtr_node *node, int dest_node, int dest_port, /* Never set confirm_rx on non-data packets */ if (type != QRTR_TYPE_DATA) return 0; + printk("dn: %d, dp: %d, %s\n", dest_node, dest_port, type, __func__); + if (dest_node < 0) + return -EINVAL; mutex_lock(&node->qrtr_tx_lock); flow = radix_tree_lookup(&node->qrtr_tx_flow, key);
Powered by blists - more mailing lists