lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <165830881364.15784.15063193828003797442.git-patchwork-notify@kernel.org> Date: Wed, 20 Jul 2022 09:20:13 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Steffen Klassert <steffen.klassert@...unet.com> Cc: davem@...emloft.net, kuba@...nel.org, herbert@...dor.apana.org.au, netdev@...r.kernel.org Subject: Re: [PATCH 1/2] xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup() Hello: This series was applied to netdev/net.git (master) by Steffen Klassert <steffen.klassert@...unet.com>: On Wed, 20 Jul 2022 10:09:11 +0200 you wrote: > From: Hangyu Hua <hbh25y@...il.com> > > xfrm_policy_lookup() will call xfrm_pol_hold_rcu() to get a refcount of > pols[0]. This refcount can be dropped in xfrm_expand_policies() when > xfrm_expand_policies() return error. pols[0]'s refcount is balanced in > here. But xfrm_bundle_lookup() will also call xfrm_pols_put() with > num_pols == 1 to drop this refcount when xfrm_expand_policies() return > error. > > [...] Here is the summary with links: - [1/2] xfrm: xfrm_policy: fix a possible double xfrm_pols_put() in xfrm_bundle_lookup() https://git.kernel.org/netdev/net/c/f85daf0e7253 - [2/2] net: ipv4: fix clang -Wformat warnings https://git.kernel.org/netdev/net/c/e79b9473e9b5 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists