[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <37563212.63b4.1890676ab47.Coremail.liujf628995@126.com>
Date: Thu, 29 Jun 2023 17:23:07 +0800 (CST)
From: liujf628995 <liujf628995@....com>
To: "Greg KH" <gregkh@...uxfoundation.org>
Cc: catalin.marinas@....com, akpm@...ux-foundation.org,
linux-mm@...ck.org, linux-kernel@...r.kernel.org,
syzkaller@...glegroups.com, security@...nel.org,
secalert@...hat.com
Subject: Re:Re: use-after-free in kmemleak_scan?
ok,I will send the mail by plain/text again by another email address,this crash occured many times in my fuzzing,but I'm sorry that I have not a reproducer or a patch.
At 2023-06-29 13:56:57, "Greg KH" <gregkh@...uxfoundation.org> wrote:
>On Thu, Jun 29, 2023 at 11:19:36AM +0800, liujf628995 wrote:
>> hello,here is a crash from syzkaller,it looks like happened in kmemleak scan.It could not be reproduced by syzkaller because this should not have been caused by syscall fuzz.I don't know what rhe reason for this,please check it.My fuzzed linux kernel is linux-6.2(commit/c9c3395d5e3dcc6daee66c6908354d47bf98cb0c)
>
>If you have a reproducer or a patch, we will be glad to review it,
>otherwise just sending syzbot reports like this (especially in html
>format which is rejected by the mailing lists), will not go very far as
>we have loads of them already.
>
>thanks,
>
>greg k-h
Powered by blists - more mailing lists