lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 05 Jan 2021 13:02:03 -0800
From:   Saeed Mahameed <>
To:     Dinghao Liu <>,
Cc:     Leon Romanovsky <>,
        "David S. Miller" <>,
        Jakub Kicinski <>,
        Or Gerlitz <>,
        Gal Pressman <>,
        Maor Gottlieb <>,,,
Subject: Re: [PATCH] [v2] net/mlx5e: Fix two double free cases

On Mon, 2020-12-28 at 16:48 +0800, Dinghao Liu wrote:
> mlx5e_create_ttc_table_groups() frees ft->g on failure of
> kvzalloc(), but such failure will be caught by its caller
> in mlx5e_create_ttc_table() and ft->g will be freed again
> in mlx5e_destroy_flow_table(). The same issue also occurs
> in mlx5e_create_ttc_table_groups(). Set ft->g to NULL after
> kfree() to avoid double free.
> Fixes: 7b3722fa9ef64 ("net/mlx5e: Support RSS for GRE tunneled
> packets")
> Fixes: 33cfaaa8f36ff ("net/mlx5e: Split the main flow steering
> table")
> Signed-off-by: Dinghao Liu <>
> ---
> Changelog:
> v2: - Set ft->g to NULL after kfree() instead of removing kfree().
>       Refine commit message.

applied to net-next-mlx5,

Powered by blists - more mailing lists