lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190214233322.6kpdxtsczyhud2ie@ast-mbp.dhcp.thefacebook.com> Date: Thu, 14 Feb 2019 15:33:24 -0800 From: Alexei Starovoitov <alexei.starovoitov@...il.com> To: David Ahern <dsahern@...il.com> Cc: Peter Oskolkov <posk@...gle.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, netdev@...r.kernel.org, Peter Oskolkov <posk@...k.io>, Willem de Bruijn <willemb@...gle.com> Subject: Re: [PATCH bpf-next v2] bpf: fix memory leak in bpf_lwt_xmit_reroute On Thu, Feb 14, 2019 at 12:04:47PM -0700, David Ahern wrote: > On 2/14/19 11:39 AM, Peter Oskolkov wrote: > > On error the skb should be freed. Tested with diff/steps > > provided by David Ahern. > > > > v2: surface routing errors to the user instead of a generic EINVAL, > > as suggested by David Ahern. > > > > Reported-by: David Ahern <dsahern@...il.com> > > Fixes: 3bd0b15281af ("bpf: add handling of BPF_LWT_REROUTE to lwt_bpf.c") > > Signed-off-by: Peter Oskolkov <posk@...gle.com> > > --- > > net/core/lwt_bpf.c | 29 ++++++++++++++++++++--------- > > 1 file changed, 20 insertions(+), 9 deletions(-) > > > > Reviewed-by: David Ahern <dsahern@...il.com> Applied, Thanks
Powered by blists - more mailing lists