[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7bea2244-dc28-4c67-b515-739b8b7d7901@redhat.com>
Date: Thu, 4 Dec 2025 11:04:18 +0100
From: Paolo Abeni <pabeni@...hat.com>
To: Wang Liang <wangliang74@...wei.com>,
Deepanshu Kartikey <kartikey406@...il.com>, davem@...emloft.net,
edumazet@...gle.com, kuba@...nel.org, horms@...nel.org
Cc: linux-hams@...r.kernel.org, netdev@...r.kernel.org,
linux-kernel@...r.kernel.org,
syzbot+d7abc36bbbb6d7d40b58@...kaller.appspotmail.com
Subject: Re: [PATCH] net: netrom: fix memory leak in nr_output()
On 11/29/25 5:01 AM, Wang Liang wrote:
> 在 2025/11/29 11:42, Deepanshu Kartikey 写道:
>> When nr_output() fragments a large packet, it calls sock_alloc_send_skb()
>
> Hi!
>
> Coincidentally, we both are working on this issue simultaneously.
>
> From the syz test requests:
> https://syzkaller.appspot.com/bug?extid=d7abc36bbbb6d7d40b58
>
> I sended the test patch earlier, only a dozen seconds...
FTR and future similar cases, we don't have the send time information
handy. Instead we use the timestamp as available on patchwork.
In this specific case Deepanshu's patch landed first, but does not apply
cleanly, so I'll apply Wang's one.
Cheers,
Paolo
Powered by blists - more mailing lists