Message ID | 20231221110122.9838-1-apanov@astralinux.ru |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:2483:b0:fb:cd0c:d3e with SMTP id q3csp329061dyi; Thu, 21 Dec 2023 03:02:28 -0800 (PST) X-Google-Smtp-Source: AGHT+IGLvSvcBS4qA/WYuvICMHw7lr4t5LLmHU6frQOCB8LGEvvDRIN6DHZS8Gj9GqQTMiplRGBL X-Received: by 2002:a05:6122:20a3:b0:4b6:cb66:778a with SMTP id i35-20020a05612220a300b004b6cb66778amr182701vkd.14.1703156547832; Thu, 21 Dec 2023 03:02:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1703156547; cv=none; d=google.com; s=arc-20160816; b=RCph9fN+HHvzmbHYMvKZDHgC3Cq+xywRReAvAK3hTtRUI6nlGvGld8yDdBbA8xf6Ij 4tRE0x1l4HWJuNC7FouwMaIe7LU3lbK6aAnKaou3D6CylNZ3QzcALLfoDSJcKP6aMXiF /daYv1n+caCnMuVENS0R/gwfMmBlUImZoxUjuNKRvAOnHpaD0bN5pm5lxdJHRus6GaHs UC1gqmtHoRnwjzXIqAh30qrpQgj0OkG8N2HW5mISGjlw/DAgZJlj/F/bKJqeTZvZvSeg FoZe1JZNgvje6t+ZIC1HeD1vuIzzpfIqE2BTbl28MyZErIXDbbZfWdofTekciv0RyOH2 SCeg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=emkjIAZ1ZT7xrnFj0TaxU4NkXJopJZeXi9T5qCwzfsc=; fh=bg4yGptsNmoyHyHWuRpMgi/ZxwATSz5AYvOrJOtsvXY=; b=OoSXRGajFDsxZNmqpjHTd3l5Tatv1JDyzPIBSVINrZh3Eh7Mo/RbXygJsI1ZY+j3nB 12AZ5g9vZuiginibSLhR0yj0Ser+2mtSytdRXJRf9/ktXKrNY9LtfEI45dHTg83SlJZr FeSYbzO4nGpIbgviZivsWcxJu9r59WMCESP5lsyz9//c4YoWKFK9Lo4YqeRJcHE2W4Sz N3prufofrYXDhRzSEFi0jRqhlvL1cW9I2ev1YN+yQdD4ZkPTqzOeV5LDazm4SB2qRZGb obJvyLTvnf8TCPz0x+1loCgN62vPkBB+z418/zLQMav9ERlgokyhsE5DKj0/wJQmWDnw qBtA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org" Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id x198-20020a1f7ccf000000b004b2df287585si281703vkc.317.2023.12.21.03.02.27 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Dec 2023 03:02:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-8258-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 9D3F11C21E07 for <ouuuleilei@gmail.com>; Thu, 21 Dec 2023 11:02:27 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CBE566BB55; Thu, 21 Dec 2023 11:02:07 +0000 (UTC) X-Original-To: linux-kernel@vger.kernel.org Received: from mail.astralinux.ru (mail.astralinux.ru [217.74.38.119]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 103BA6A34B; Thu, 21 Dec 2023 11:02:00 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=astralinux.ru Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=astralinux.ru Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.astralinux.ru (Postfix) with ESMTP id CB1C31868D3B; Thu, 21 Dec 2023 14:01:58 +0300 (MSK) Received: from mail.astralinux.ru ([127.0.0.1]) by localhost (rbta-msk-vsrv-mail01.astralinux.ru [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id gt00sCmcMSre; Thu, 21 Dec 2023 14:01:58 +0300 (MSK) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.astralinux.ru (Postfix) with ESMTP id 7DA651868CE0; Thu, 21 Dec 2023 14:01:58 +0300 (MSK) X-Virus-Scanned: amavisd-new at astralinux.ru Received: from mail.astralinux.ru ([127.0.0.1]) by localhost (rbta-msk-vsrv-mail01.astralinux.ru [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id GtlX3tkcyl9n; Thu, 21 Dec 2023 14:01:58 +0300 (MSK) Received: from new-mail.astralinux.ru (unknown [10.177.185.102]) by mail.astralinux.ru (Postfix) with ESMTPS id E00AB1867B5E; Thu, 21 Dec 2023 14:01:57 +0300 (MSK) Received: from rbta-msk-lt-156703.astralinux.ru (unknown [10.177.232.135]) by new-mail.astralinux.ru (Postfix) with ESMTPA id 4SwnYx0D5MzfYkm; Thu, 21 Dec 2023 14:01:56 +0300 (MSK) From: Alexey Panov <apanov@astralinux.ru> To: stable@vger.kernel.org, Greg Kroah-Hartman <gregkh@linuxfoundation.org> Cc: Alexey Panov <apanov@astralinux.ru>, ericvh@kernel.org, lucho@ionkov.net, asmadeus@codewreck.org, linux_oss@crudebyte.com, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, v9fs@lists.linux.dev, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, lvc-project@linuxtesting.org Subject: [PATCH 5.10 0/1] 9p/net: fix possible memory leak in p9_check_errors() Date: Thu, 21 Dec 2023 14:01:21 +0300 Message-Id: <20231221110122.9838-1-apanov@astralinux.ru> X-Mailer: git-send-email 2.30.2 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1785889080555207539 X-GMAIL-MSGID: 1785889080555207539 |
Series |
9p/net: fix possible memory leak in p9_check_errors()
|
|
Message
Alexey Panov
Dec. 21, 2023, 11:01 a.m. UTC
Syzkaller reports "memory leak in p9pdu_readf" in 5.10 stable releases. I've attached reproducers in Bugzilla [1]. The problem has been fixed by the following patch which can be applied to the 5.10 branch. The fix is already present in all stable branches starting from 5.15. [1] https://bugzilla.kernel.org/show_bug.cgi?id=218235 Found by Linux Verification Center (linuxtesting.org) with Syzkaller.