[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <166076881492.14069.1219004956913012192.git-patchwork-notify@kernel.org>
Date: Wed, 17 Aug 2022 20:40:14 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: liujian (CE) <liujian56@...wei.com>
Cc: john.fastabend@...il.com, jakub@...udflare.com,
davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
pabeni@...hat.com, daniel@...earbox.net, andrii@...nel.org,
netdev@...r.kernel.org, bpf@...r.kernel.org
Subject: Re: [PATCH bpf-next v2] skmsg: Fix wrong last sg check in
sk_msg_recvmsg()
Hello:
This patch was applied to bpf/bpf.git (master)
by Daniel Borkmann <daniel@...earbox.net>:
On Tue, 9 Aug 2022 17:49:15 +0800 you wrote:
> Fix one kernel NULL pointer dereference as below:
>
> [ 224.462334] Call Trace:
> [ 224.462394] __tcp_bpf_recvmsg+0xd3/0x380
> [ 224.462441] ? sock_has_perm+0x78/0xa0
> [ 224.462463] tcp_bpf_recvmsg+0x12e/0x220
> [ 224.462494] inet_recvmsg+0x5b/0xd0
> [ 224.462534] __sys_recvfrom+0xc8/0x130
> [ 224.462574] ? syscall_trace_enter+0x1df/0x2e0
> [ 224.462606] ? __do_page_fault+0x2de/0x500
> [ 224.462635] __x64_sys_recvfrom+0x24/0x30
> [ 224.462660] do_syscall_64+0x5d/0x1d0
> [ 224.462709] entry_SYSCALL_64_after_hwframe+0x65/0xca
>
> [...]
Here is the summary with links:
- [bpf-next,v2] skmsg: Fix wrong last sg check in sk_msg_recvmsg()
https://git.kernel.org/bpf/bpf/c/583585e48d96
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists