* [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
@ 2022-10-18 12:24 Yang Yingliang
2022-10-18 12:58 ` Leon Romanovsky
2022-10-20 0:40 ` patchwork-bot+netdevbpf
0 siblings, 2 replies; 10+ messages in thread
From: Yang Yingliang @ 2022-10-18 12:24 UTC (permalink / raw)
To: netdev; +Cc: yisen.zhuang, salil.mehta, davem
Inject fault while probing module, if device_register() fails,
but the refcount of kobject is not decreased to 0, the name
allocated in dev_set_name() is leaked. Fix this by calling
put_device(), so that name can be freed in callback function
kobject_cleanup().
unreferenced object 0xffff00c01aba2100 (size 128):
comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)
hex dump (first 32 bytes):
68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0
[<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0
[<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390
[<000000006c0ffb13>] kvasprintf+0x8c/0x118
[<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8
[<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0
[<000000000b87affc>] dev_set_name+0x7c/0xa0
[<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae]
[<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]
[<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
Fixes: 6fe6611ff275 ("net: add Hisilicon Network Subsystem hnae framework support")
Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
---
drivers/net/ethernet/hisilicon/hns/hnae.c | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/drivers/net/ethernet/hisilicon/hns/hnae.c b/drivers/net/ethernet/hisilicon/hns/hnae.c
index 00fafc0f8512..430eccea8e5e 100644
--- a/drivers/net/ethernet/hisilicon/hns/hnae.c
+++ b/drivers/net/ethernet/hisilicon/hns/hnae.c
@@ -419,8 +419,10 @@ int hnae_ae_register(struct hnae_ae_dev *hdev, struct module *owner)
hdev->cls_dev.release = hnae_release;
(void)dev_set_name(&hdev->cls_dev, "hnae%d", hdev->id);
ret = device_register(&hdev->cls_dev);
- if (ret)
+ if (ret) {
+ put_device(&hdev->cls_dev);
return ret;
+ }
__module_get(THIS_MODULE);
--
2.25.1
^ permalink raw reply related [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-18 12:24 [PATCH net] net: hns: fix possible memory leak in hnae_ae_register() Yang Yingliang
@ 2022-10-18 12:58 ` Leon Romanovsky
2022-10-20 0:28 ` Jakub Kicinski
2022-10-20 7:45 ` Yang Yingliang
2022-10-20 0:40 ` patchwork-bot+netdevbpf
1 sibling, 2 replies; 10+ messages in thread
From: Leon Romanovsky @ 2022-10-18 12:58 UTC (permalink / raw)
To: Yang Yingliang; +Cc: netdev, yisen.zhuang, salil.mehta, davem
On Tue, Oct 18, 2022 at 08:24:51PM +0800, Yang Yingliang wrote:
> Inject fault while probing module, if device_register() fails,
> but the refcount of kobject is not decreased to 0, the name
> allocated in dev_set_name() is leaked. Fix this by calling
> put_device(), so that name can be freed in callback function
> kobject_cleanup().
>
> unreferenced object 0xffff00c01aba2100 (size 128):
> comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)
> hex dump (first 32 bytes):
> 68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0
> [<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0
> [<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390
> [<000000006c0ffb13>] kvasprintf+0x8c/0x118
> [<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8
> [<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0
> [<000000000b87affc>] dev_set_name+0x7c/0xa0
> [<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae]
> [<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]
> [<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
>
> Fixes: 6fe6611ff275 ("net: add Hisilicon Network Subsystem hnae framework support")
> Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
> ---
> drivers/net/ethernet/hisilicon/hns/hnae.c | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/net/ethernet/hisilicon/hns/hnae.c b/drivers/net/ethernet/hisilicon/hns/hnae.c
> index 00fafc0f8512..430eccea8e5e 100644
> --- a/drivers/net/ethernet/hisilicon/hns/hnae.c
> +++ b/drivers/net/ethernet/hisilicon/hns/hnae.c
> @@ -419,8 +419,10 @@ int hnae_ae_register(struct hnae_ae_dev *hdev, struct module *owner)
> hdev->cls_dev.release = hnae_release;
> (void)dev_set_name(&hdev->cls_dev, "hnae%d", hdev->id);
^^^^^^^^^^^^ this is unexpected in netdev code.
> ret = device_register(&hdev->cls_dev);
> - if (ret)
> + if (ret) {
> + put_device(&hdev->cls_dev);
> return ret;
> + }
>
> __module_get(THIS_MODULE);
^^^^^^^^ I'm curious why? I don't see why you need this.
The change itself is ok.
Thanks,
Reviewed-by: Leon Romanovsky <leonro@nvidia.com>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-18 12:58 ` Leon Romanovsky
@ 2022-10-20 0:28 ` Jakub Kicinski
2022-10-20 7:48 ` Yang Yingliang
2022-10-20 7:45 ` Yang Yingliang
1 sibling, 1 reply; 10+ messages in thread
From: Jakub Kicinski @ 2022-10-20 0:28 UTC (permalink / raw)
To: Leon Romanovsky; +Cc: Yang Yingliang, netdev, yisen.zhuang, salil.mehta, davem
On Tue, 18 Oct 2022 15:58:38 +0300 Leon Romanovsky wrote:
> The change itself is ok.
Also the .release function is empty which is another bad smell?
> Reviewed-by: Leon Romanovsky <leonro@nvidia.com>
Thanks!
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-18 12:24 [PATCH net] net: hns: fix possible memory leak in hnae_ae_register() Yang Yingliang
2022-10-18 12:58 ` Leon Romanovsky
@ 2022-10-20 0:40 ` patchwork-bot+netdevbpf
1 sibling, 0 replies; 10+ messages in thread
From: patchwork-bot+netdevbpf @ 2022-10-20 0:40 UTC (permalink / raw)
To: Yang Yingliang; +Cc: netdev, yisen.zhuang, salil.mehta, davem
Hello:
This patch was applied to netdev/net.git (master)
by Jakub Kicinski <kuba@kernel.org>:
On Tue, 18 Oct 2022 20:24:51 +0800 you wrote:
> Inject fault while probing module, if device_register() fails,
> but the refcount of kobject is not decreased to 0, the name
> allocated in dev_set_name() is leaked. Fix this by calling
> put_device(), so that name can be freed in callback function
> kobject_cleanup().
>
> unreferenced object 0xffff00c01aba2100 (size 128):
> comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)
> hex dump (first 32 bytes):
> 68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......
> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> backtrace:
> [<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0
> [<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0
> [<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390
> [<000000006c0ffb13>] kvasprintf+0x8c/0x118
> [<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8
> [<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0
> [<000000000b87affc>] dev_set_name+0x7c/0xa0
> [<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae]
> [<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]
> [<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
>
> [...]
Here is the summary with links:
- [net] net: hns: fix possible memory leak in hnae_ae_register()
https://git.kernel.org/netdev/net/c/ff2f5ec5d009
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-18 12:58 ` Leon Romanovsky
2022-10-20 0:28 ` Jakub Kicinski
@ 2022-10-20 7:45 ` Yang Yingliang
2022-10-23 7:59 ` Leon Romanovsky
1 sibling, 1 reply; 10+ messages in thread
From: Yang Yingliang @ 2022-10-20 7:45 UTC (permalink / raw)
To: Leon Romanovsky; +Cc: netdev, yisen.zhuang, salil.mehta, davem
On 2022/10/18 20:58, Leon Romanovsky wrote:
> On Tue, Oct 18, 2022 at 08:24:51PM +0800, Yang Yingliang wrote:
>> Inject fault while probing module, if device_register() fails,
>> but the refcount of kobject is not decreased to 0, the name
>> allocated in dev_set_name() is leaked. Fix this by calling
>> put_device(), so that name can be freed in callback function
>> kobject_cleanup().
>>
>> unreferenced object 0xffff00c01aba2100 (size 128):
>> comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)
>> hex dump (first 32 bytes):
>> 68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......
>> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
>> backtrace:
>> [<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0
>> [<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0
>> [<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390
>> [<000000006c0ffb13>] kvasprintf+0x8c/0x118
>> [<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8
>> [<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0
>> [<000000000b87affc>] dev_set_name+0x7c/0xa0
>> [<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae]
>> [<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]
>> [<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
>>
>> Fixes: 6fe6611ff275 ("net: add Hisilicon Network Subsystem hnae framework support")
>> Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
>> ---
>> drivers/net/ethernet/hisilicon/hns/hnae.c | 4 +++-
>> 1 file changed, 3 insertions(+), 1 deletion(-)
>>
>> diff --git a/drivers/net/ethernet/hisilicon/hns/hnae.c b/drivers/net/ethernet/hisilicon/hns/hnae.c
>> index 00fafc0f8512..430eccea8e5e 100644
>> --- a/drivers/net/ethernet/hisilicon/hns/hnae.c
>> +++ b/drivers/net/ethernet/hisilicon/hns/hnae.c
>> @@ -419,8 +419,10 @@ int hnae_ae_register(struct hnae_ae_dev *hdev, struct module *owner)
>> hdev->cls_dev.release = hnae_release;
>> (void)dev_set_name(&hdev->cls_dev, "hnae%d", hdev->id);
> ^^^^^^^^^^^^ this is unexpected in netdev code.
Did you mean the 'void' can be removed ?
>
>> ret = device_register(&hdev->cls_dev);
>> - if (ret)
>> + if (ret) {
>> + put_device(&hdev->cls_dev);
>> return ret;
>> + }
>>
>> __module_get(THIS_MODULE);
> ^^^^^^^^ I'm curious why? I don't see why you need this.
hnae_ae_register() is called from hns_dsaf.ko(hns_dsaf_probe()), the
refcount of module hnae is already be got while loading hns_dsaf.ko
in resolve_symbol(), so I think this can be removed.
Thanks,
Yang
>
> The change itself is ok.
>
> Thanks,
> Reviewed-by: Leon Romanovsky <leonro@nvidia.com>
> .
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-20 0:28 ` Jakub Kicinski
@ 2022-10-20 7:48 ` Yang Yingliang
2022-10-20 19:43 ` Jakub Kicinski
0 siblings, 1 reply; 10+ messages in thread
From: Yang Yingliang @ 2022-10-20 7:48 UTC (permalink / raw)
To: Jakub Kicinski, Leon Romanovsky; +Cc: netdev, yisen.zhuang, salil.mehta, davem
On 2022/10/20 8:28, Jakub Kicinski wrote:
> On Tue, 18 Oct 2022 15:58:38 +0300 Leon Romanovsky wrote:
>> The change itself is ok.
> Also the .release function is empty which is another bad smell?
The upper device (struct dsaf_device *dsaf_dev) is allocated by
devm_kzalloc(),
so it's no need to free it in ->release().
Thanks,
Yang
>
>> Reviewed-by: Leon Romanovsky <leonro@nvidia.com>
> Thanks!
> .
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-20 7:48 ` Yang Yingliang
@ 2022-10-20 19:43 ` Jakub Kicinski
2022-10-21 3:01 ` Yang Yingliang
0 siblings, 1 reply; 10+ messages in thread
From: Jakub Kicinski @ 2022-10-20 19:43 UTC (permalink / raw)
To: Yang Yingliang; +Cc: Leon Romanovsky, netdev, yisen.zhuang, salil.mehta, davem
On Thu, 20 Oct 2022 15:48:38 +0800 Yang Yingliang wrote:
> On 2022/10/20 8:28, Jakub Kicinski wrote:
> > On Tue, 18 Oct 2022 15:58:38 +0300 Leon Romanovsky wrote:
> >> The change itself is ok.
> >
> > Also the .release function is empty which is another bad smell?
>
> The upper device (struct dsaf_device *dsaf_dev) is allocated by
> devm_kzalloc(), so it's no need to free it in ->release().
Nah ah. devm_* is just for objects which tie their lifetime naturally
to the lifetime of the driver instance, IOW the device ->priv.
struct device allocated by the driver is not tied to that, it's
a properly referenced object. I don't think that just because
the driver that allocated it got ->remove()d you're safe to free
allocated struct devices.
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-20 19:43 ` Jakub Kicinski
@ 2022-10-21 3:01 ` Yang Yingliang
2022-10-23 8:04 ` Leon Romanovsky
0 siblings, 1 reply; 10+ messages in thread
From: Yang Yingliang @ 2022-10-21 3:01 UTC (permalink / raw)
To: Jakub Kicinski; +Cc: Leon Romanovsky, netdev, yisen.zhuang, salil.mehta, davem
On 2022/10/21 3:43, Jakub Kicinski wrote:
> On Thu, 20 Oct 2022 15:48:38 +0800 Yang Yingliang wrote:
>> On 2022/10/20 8:28, Jakub Kicinski wrote:
>>> On Tue, 18 Oct 2022 15:58:38 +0300 Leon Romanovsky wrote:
>>>> The change itself is ok.
>>> Also the .release function is empty which is another bad smell?
>> The upper device (struct dsaf_device *dsaf_dev) is allocated by
>> devm_kzalloc(), so it's no need to free it in ->release().
> Nah ah. devm_* is just for objects which tie their lifetime naturally
> to the lifetime of the driver instance, IOW the device ->priv.
>
> struct device allocated by the driver is not tied to that, it's
> a properly referenced object. I don't think that just because
> the driver that allocated it got ->remove()d you're safe to free
> allocated struct devices.
In this driver, I see the 'cls_dev' is used as driver data and it
unregistered
before got removed to free the device memory, I think it's safe for now.
Thanks,
Yang
> .
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-20 7:45 ` Yang Yingliang
@ 2022-10-23 7:59 ` Leon Romanovsky
0 siblings, 0 replies; 10+ messages in thread
From: Leon Romanovsky @ 2022-10-23 7:59 UTC (permalink / raw)
To: Yang Yingliang; +Cc: netdev, yisen.zhuang, salil.mehta, davem
On Thu, Oct 20, 2022 at 03:45:17PM +0800, Yang Yingliang wrote:
>
> On 2022/10/18 20:58, Leon Romanovsky wrote:
> > On Tue, Oct 18, 2022 at 08:24:51PM +0800, Yang Yingliang wrote:
> > > Inject fault while probing module, if device_register() fails,
> > > but the refcount of kobject is not decreased to 0, the name
> > > allocated in dev_set_name() is leaked. Fix this by calling
> > > put_device(), so that name can be freed in callback function
> > > kobject_cleanup().
> > >
> > > unreferenced object 0xffff00c01aba2100 (size 128):
> > > comm "systemd-udevd", pid 1259, jiffies 4294903284 (age 294.152s)
> > > hex dump (first 32 bytes):
> > > 68 6e 61 65 30 00 00 00 18 21 ba 1a c0 00 ff ff hnae0....!......
> > > 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
> > > backtrace:
> > > [<0000000034783f26>] slab_post_alloc_hook+0xa0/0x3e0
> > > [<00000000748188f2>] __kmem_cache_alloc_node+0x164/0x2b0
> > > [<00000000ab0743e8>] __kmalloc_node_track_caller+0x6c/0x390
> > > [<000000006c0ffb13>] kvasprintf+0x8c/0x118
> > > [<00000000fa27bfe1>] kvasprintf_const+0x60/0xc8
> > > [<0000000083e10ed7>] kobject_set_name_vargs+0x3c/0xc0
> > > [<000000000b87affc>] dev_set_name+0x7c/0xa0
> > > [<000000003fd8fe26>] hnae_ae_register+0xcc/0x190 [hnae]
> > > [<00000000fe97edc9>] hns_dsaf_ae_init+0x9c/0x108 [hns_dsaf]
> > > [<00000000c36ff1eb>] hns_dsaf_probe+0x548/0x748 [hns_dsaf]
> > >
> > > Fixes: 6fe6611ff275 ("net: add Hisilicon Network Subsystem hnae framework support")
> > > Signed-off-by: Yang Yingliang <yangyingliang@huawei.com>
> > > ---
> > > drivers/net/ethernet/hisilicon/hns/hnae.c | 4 +++-
> > > 1 file changed, 3 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/drivers/net/ethernet/hisilicon/hns/hnae.c b/drivers/net/ethernet/hisilicon/hns/hnae.c
> > > index 00fafc0f8512..430eccea8e5e 100644
> > > --- a/drivers/net/ethernet/hisilicon/hns/hnae.c
> > > +++ b/drivers/net/ethernet/hisilicon/hns/hnae.c
> > > @@ -419,8 +419,10 @@ int hnae_ae_register(struct hnae_ae_dev *hdev, struct module *owner)
> > > hdev->cls_dev.release = hnae_release;
> > > (void)dev_set_name(&hdev->cls_dev, "hnae%d", hdev->id);
> > ^^^^^^^^^^^^ this is unexpected in netdev code.
> Did you mean the 'void' can be removed ?
I mean that ethernet names are provided by netdev code and I don't
expect to see any dev_set_name() call in drivers/net/ethernet/* folders.
> >
> > > ret = device_register(&hdev->cls_dev);
> > > - if (ret)
> > > + if (ret) {
> > > + put_device(&hdev->cls_dev);
> > > return ret;
> > > + }
> > > __module_get(THIS_MODULE);
> > ^^^^^^^^ I'm curious why? I don't see why you need this.
> hnae_ae_register() is called from hns_dsaf.ko(hns_dsaf_probe()), the
> refcount of module hnae is already be got while loading hns_dsaf.ko
> in resolve_symbol(), so I think this can be removed.
Yes.
>
> Thanks,
> Yang
> >
> > The change itself is ok.
> >
> > Thanks,
> > Reviewed-by: Leon Romanovsky <leonro@nvidia.com>
> > .
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH net] net: hns: fix possible memory leak in hnae_ae_register()
2022-10-21 3:01 ` Yang Yingliang
@ 2022-10-23 8:04 ` Leon Romanovsky
0 siblings, 0 replies; 10+ messages in thread
From: Leon Romanovsky @ 2022-10-23 8:04 UTC (permalink / raw)
To: Yang Yingliang; +Cc: Jakub Kicinski, netdev, yisen.zhuang, salil.mehta, davem
On Fri, Oct 21, 2022 at 11:01:47AM +0800, Yang Yingliang wrote:
>
> On 2022/10/21 3:43, Jakub Kicinski wrote:
> > On Thu, 20 Oct 2022 15:48:38 +0800 Yang Yingliang wrote:
> > > On 2022/10/20 8:28, Jakub Kicinski wrote:
> > > > On Tue, 18 Oct 2022 15:58:38 +0300 Leon Romanovsky wrote:
> > > > > The change itself is ok.
> > > > Also the .release function is empty which is another bad smell?
> > > The upper device (struct dsaf_device *dsaf_dev) is allocated by
> > > devm_kzalloc(), so it's no need to free it in ->release().
> > Nah ah. devm_* is just for objects which tie their lifetime naturally
> > to the lifetime of the driver instance, IOW the device ->priv.
> >
> > struct device allocated by the driver is not tied to that, it's
> > a properly referenced object. I don't think that just because
> > the driver that allocated it got ->remove()d you're safe to free
> > allocated struct devices.
> In this driver, I see the 'cls_dev' is used as driver data and it
> unregistered
> before got removed to free the device memory, I think it's safe for now.
Empty release means reference counting doesn't really count anything.
According to your reply, cls_dev is protected from outside and its life
time bounded to upper level.
The thing is that you was expected to create that cls_dev when you did
device_initalization and release it with not-empty release function.
Thanks
>
> Thanks,
> Yang
> > .
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2022-10-23 8:04 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-10-18 12:24 [PATCH net] net: hns: fix possible memory leak in hnae_ae_register() Yang Yingliang
2022-10-18 12:58 ` Leon Romanovsky
2022-10-20 0:28 ` Jakub Kicinski
2022-10-20 7:48 ` Yang Yingliang
2022-10-20 19:43 ` Jakub Kicinski
2022-10-21 3:01 ` Yang Yingliang
2022-10-23 8:04 ` Leon Romanovsky
2022-10-20 7:45 ` Yang Yingliang
2022-10-23 7:59 ` Leon Romanovsky
2022-10-20 0:40 ` patchwork-bot+netdevbpf
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.