[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<174062703126.955127.3742311492313103236.git-patchwork-notify@kernel.org>
Date: Thu, 27 Feb 2025 03:30:31 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Adrian Huang <adrianhuang0701@...il.com>
Cc: kuniyu@...zon.com, davem@...emloft.net, edumazet@...gle.com,
kuba@...nel.org, pabeni@...hat.com, horms@...nel.org, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org, ahuang12@...ovo.com
Subject: Re: [PATCH v2 1/1] af_unix: Fix memory leak in unix_dgram_sendmsg()
Hello:
This patch was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@...nel.org>:
On Tue, 25 Feb 2025 10:14:57 +0800 you wrote:
> From: Adrian Huang <ahuang12@...ovo.com>
>
> After running the 'sendmsg02' program of Linux Test Project (LTP),
> kmemleak reports the following memory leak:
>
> # cat /sys/kernel/debug/kmemleak
> unreferenced object 0xffff888243866800 (size 2048):
> comm "sendmsg02", pid 67, jiffies 4294903166
> hex dump (first 32 bytes):
> 00 00 00 00 00 00 00 00 5e 00 00 00 00 00 00 00 ........^.......
> 01 00 07 40 00 00 00 00 00 00 00 00 00 00 00 00 ...@............
> backtrace (crc 7e96a3f2):
> kmemleak_alloc+0x56/0x90
> kmem_cache_alloc_noprof+0x209/0x450
> sk_prot_alloc.constprop.0+0x60/0x160
> sk_alloc+0x32/0xc0
> unix_create1+0x67/0x2b0
> unix_create+0x47/0xa0
> __sock_create+0x12e/0x200
> __sys_socket+0x6d/0x100
> __x64_sys_socket+0x1b/0x30
> x64_sys_call+0x7e1/0x2140
> do_syscall_64+0x54/0x110
> entry_SYSCALL_64_after_hwframe+0x76/0x7e
>
> [...]
Here is the summary with links:
- [v2,1/1] af_unix: Fix memory leak in unix_dgram_sendmsg()
https://git.kernel.org/netdev/net/c/bc23d4e30866
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists