[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <162972360690.29348.8530821383166301782.git-patchwork-notify@kernel.org>
Date: Mon, 23 Aug 2021 13:00:06 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Jiang Wang <jiang.wang@...edance.com>
Cc: bpf@...r.kernel.org, cong.wang@...edance.com,
duanxiongchun@...edance.com, xieyongji@...edance.com,
chaiwen.cc@...edance.com, kuniyu@...zon.co.jp, digetx@...il.com,
davem@...emloft.net, kuba@...nel.org, ast@...nel.org,
daniel@...earbox.net, andrii@...nel.org, kafai@...com,
songliubraving@...com, yhs@...com, john.fastabend@...il.com,
kpsingh@...nel.org, viro@...iv.linux.org.uk,
christian.brauner@...ntu.com, rao.shoaib@...cle.com,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH bpf-next v2] af_unix: fix NULL pointer bug in unix_shutdown
Hello:
This patch was applied to bpf/bpf-next.git (refs/heads/master):
On Sat, 21 Aug 2021 18:07:36 +0000 you wrote:
> Commit 94531cfcbe79 ("af_unix: Add unix_stream_proto for sockmap")
> introduced a bug for af_unix SEQPACKET type. In unix_shutdown, the
> unhash function will call prot->unhash(), which is NULL for SEQPACKET.
> And kernel will panic. On ARM32, it will show following messages: (it
> likely affects x86 too).
>
> Fix the bug by checking the prot->unhash is NULL or not first.
>
> [...]
Here is the summary with links:
- [bpf-next,v2] af_unix: fix NULL pointer bug in unix_shutdown
https://git.kernel.org/bpf/bpf-next/c/d359902d5c35
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists