lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID:
 <SJ0PR11MB50725E455D5B0089507E8311E5D1A@SJ0PR11MB5072.namprd11.prod.outlook.com>
Date: Tue, 25 Nov 2025 03:28:54 +0000
From: "Liu, Yongxin" <Yongxin.Liu@...driver.com>
To: Jakub Kicinski <kuba@...nel.org>
CC: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>,
        "david.e.box@...ux.intel.com" <david.e.box@...ux.intel.com>,
        "ilpo.jarvinen@...ux.intel.com" <ilpo.jarvinen@...ux.intel.com>,
        "andrew@...n.ch" <andrew@...n.ch>,
        "platform-driver-x86@...r.kernel.org"
	<platform-driver-x86@...r.kernel.org>,
        "stable@...r.kernel.org"
	<stable@...r.kernel.org>
Subject: RE: [PATCH net v2] platform/x86: intel_pmc_ipc: fix ACPI buffer
 memory leak

> -----Original Message-----
> From: Jakub Kicinski <kuba@...nel.org>
> Sent: Tuesday, November 25, 2025 11:15
> To: Liu, Yongxin <Yongxin.Liu@...driver.com>
> Cc: linux-kernel@...r.kernel.org; netdev@...r.kernel.org;
> david.e.box@...ux.intel.com; ilpo.jarvinen@...ux.intel.com; andrew@...n.ch;
> platform-driver-x86@...r.kernel.org; stable@...r.kernel.org
> Subject: Re: [PATCH net v2] platform/x86: intel_pmc_ipc: fix ACPI buffer
> memory leak
> 
> CAUTION: This email comes from a non Wind River email account!
> Do not click links or open attachments unless you recognize the sender and
> know the content is safe.
> 
> On Tue, 25 Nov 2025 03:07:30 +0000 Liu, Yongxin wrote:
> > > -----Original Message-----
> > > From: Jakub Kicinski <kuba@...nel.org>
> > > Sent: Tuesday, November 25, 2025 10:56
> > > To: Liu, Yongxin <Yongxin.Liu@...driver.com>
> > > Cc: linux-kernel@...r.kernel.org; netdev@...r.kernel.org;
> > > david.e.box@...ux.intel.com; ilpo.jarvinen@...ux.intel.com;
> > > andrew@...n.ch; platform-driver-x86@...r.kernel.org;
> > > stable@...r.kernel.org
> > > Subject: Re: [PATCH net v2] platform/x86: intel_pmc_ipc: fix ACPI
> > > buffer memory leak
> > >
> > > CAUTION: This email comes from a non Wind River email account!
> > > Do not click links or open attachments unless you recognize the
> > > sender and know the content is safe.
> > >
> > > On Tue, 25 Nov 2025 10:29:53 +0800 yongxin.liu@...driver.com wrote:
> > > > Subject: [PATCH net v2] platform/x86: intel_pmc_ipc: fix ACPI
> > > > buffer
> > > memory leak
> > >
> > > Presumably typo in the subject? Why would this go via netdev/net.. ?
> >
> > Because the only caller of intel_pmc_ipc() is
> drivers/net/ethernet/stmicro/stmmac/dwmac-intel.c.
> > I have sent both to the platform-driver-x86@...r.kernel.org and
> netdev@...r.kernel.org mailing lists.
> 
> Just to be clear -- the CC is fine, but given the code path - the platform
> maintainer will likely take this via their tree. And the subject
> designation is to indicate which maintainer you're expecting to process
> the patch.

Got it. If needed, I will resend with the correct subject.


Thanks,
Yongxin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ