[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <00000000000084d95d05e52b7822@google.com>
Date: Mon, 01 Aug 2022 03:29:11 -0700
From: syzbot <syzbot+942d5390db2d9624ced8@...kaller.appspotmail.com>
To: linux-fsdevel@...r.kernel.org, linux-kernel@...r.kernel.org,
marka@...iation.com, miklos@...redi.hu, phind.uet@...il.com,
syzkaller-bugs@...glegroups.com, viro@...iv.linux.org.uk
Subject: Re: [syzbot] memory leak in cap_inode_getsecurity
Hello,
syzbot has tested the proposed patch and the reproducer did not trigger any issue:
Reported-and-tested-by: syzbot+942d5390db2d9624ced8@...kaller.appspotmail.com
Tested on:
commit: 3d7cb6b0 Linux 5.19
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=10aa0c2e080000
kernel config: https://syzkaller.appspot.com/x/.config?x=5466231eb53fa40e
dashboard link: https://syzkaller.appspot.com/bug?extid=942d5390db2d9624ced8
compiler: gcc (Debian 10.2.1-6) 10.2.1 20210110, GNU ld (GNU Binutils for Debian) 2.35.2
patch: https://syzkaller.appspot.com/x/patch.diff?x=10e003a6080000
Note: testing is done by a robot and is best-effort only.
Powered by blists - more mailing lists