Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] [ntfs3?] memory leak in run_add_entry | 0 (1) | 2023/09/12 10:30 |
syzbot |
sign-in | mailing list | source | docs |
Title | Replies (including bot) | Last reply |
---|---|---|
[syzbot] [ntfs3?] memory leak in run_add_entry | 0 (1) | 2023/09/12 10:30 |
Created | Duration | User | Patch | Repo | Result |
---|---|---|---|---|---|
2023/10/11 15:00 | 20m | retest repro | upstream | OK log | |
2023/10/11 15:00 | 20m | retest repro | upstream | OK log | |
2023/10/11 15:00 | 16m | retest repro | upstream | OK log | |
2023/10/10 12:11 | 25m | retest repro | upstream | OK log | |
2023/10/10 12:11 | 18m | retest repro | upstream | OK log | |
2023/10/10 12:11 | 23m | retest repro | upstream | OK log | |
2023/10/10 12:11 | 23m | retest repro | upstream | OK log | |
2023/10/10 12:11 | 22m | retest repro | upstream | OK log | |
2023/10/06 06:11 | 22m | almaz.alexandrovich@paragon-software.com | https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git master | OK log | |
2023/09/28 13:44 | 18m | almaz.alexandrovich@paragon-software.com | https://github.com/Paragon-Software-Group/linux-ntfs3.git master | OK log |
BUG: memory leak unreferenced object 0xffff88810bfe1780 (size 64): comm "syz-executor224", pid 5019, jiffies 4294942482 (age 13.000s) hex dump (first 32 bytes): 00 00 00 00 01 00 00 00 04 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8157473e>] __do_kmalloc_node mm/slab_common.c:1022 [inline] [<ffffffff8157473e>] __kmalloc_node+0x4e/0x150 mm/slab_common.c:1030 [<ffffffff81563d69>] kmalloc_node include/linux/slab.h:619 [inline] [<ffffffff81563d69>] kvmalloc_node+0x99/0x170 mm/util.c:607 [<ffffffff81bff9f9>] kvmalloc include/linux/slab.h:737 [inline] [<ffffffff81bff9f9>] run_add_entry+0x559/0x720 fs/ntfs3/run.c:389 [<ffffffff81c00eec>] run_unpack+0x53c/0x620 fs/ntfs3/run.c:1021 [<ffffffff81c01047>] run_unpack_ex+0x77/0x320 fs/ntfs3/run.c:1060 [<ffffffff81bf0a83>] ntfs_read_mft fs/ntfs3/inode.c:400 [inline] [<ffffffff81bf0a83>] ntfs_iget5+0x633/0x1a90 fs/ntfs3/inode.c:532 [<ffffffff81bd2f96>] ntfs_loadlog_and_replay+0x86/0x280 fs/ntfs3/fsntfs.c:297 [<ffffffff81c04377>] ntfs_fill_super+0x1057/0x22f0 fs/ntfs3/super.c:1222 [<ffffffff81691e81>] get_tree_bdev+0x1b1/0x280 fs/super.c:1577 [<ffffffff8168f18a>] vfs_get_tree+0x2a/0x130 fs/super.c:1750 [<ffffffff816d461f>] do_new_mount fs/namespace.c:3335 [inline] [<ffffffff816d461f>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662 [<ffffffff816d5211>] do_mount fs/namespace.c:3675 [inline] [<ffffffff816d5211>] __do_sys_mount fs/namespace.c:3884 [inline] [<ffffffff816d5211>] __se_sys_mount fs/namespace.c:3861 [inline] [<ffffffff816d5211>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861 [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881082bee40 (size 8): comm "syz-executor224", pid 5019, jiffies 4294942482 (age 13.000s) hex dump (first 8 bytes): 00 00 00 00 00 00 00 00 ........ backtrace: [<ffffffff8157488b>] __do_kmalloc_node mm/slab_common.c:1022 [inline] [<ffffffff8157488b>] __kmalloc+0x4b/0x150 mm/slab_common.c:1036 [<ffffffff81bcba5c>] kmalloc_array include/linux/slab.h:636 [inline] [<ffffffff81bcba5c>] kcalloc include/linux/slab.h:667 [inline] [<ffffffff81bcba5c>] wnd_init+0xdc/0x140 fs/ntfs3/bitmap.c:662 [<ffffffff81c0448d>] ntfs_fill_super+0x116d/0x22f0 fs/ntfs3/super.c:1257 [<ffffffff81691e81>] get_tree_bdev+0x1b1/0x280 fs/super.c:1577 [<ffffffff8168f18a>] vfs_get_tree+0x2a/0x130 fs/super.c:1750 [<ffffffff816d461f>] do_new_mount fs/namespace.c:3335 [inline] [<ffffffff816d461f>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662 [<ffffffff816d5211>] do_mount fs/namespace.c:3675 [inline] [<ffffffff816d5211>] __do_sys_mount fs/namespace.c:3884 [inline] [<ffffffff816d5211>] __se_sys_mount fs/namespace.c:3861 [inline] [<ffffffff816d5211>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861 [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff88810bfe1580 (size 64): comm "syz-executor224", pid 5019, jiffies 4294942482 (age 13.000s) hex dump (first 32 bytes): 00 00 00 00 01 00 00 00 06 00 00 00 00 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<ffffffff8157473e>] __do_kmalloc_node mm/slab_common.c:1022 [inline] [<ffffffff8157473e>] __kmalloc_node+0x4e/0x150 mm/slab_common.c:1030 [<ffffffff81563d69>] kmalloc_node include/linux/slab.h:619 [inline] [<ffffffff81563d69>] kvmalloc_node+0x99/0x170 mm/util.c:607 [<ffffffff81bff9f9>] kvmalloc include/linux/slab.h:737 [inline] [<ffffffff81bff9f9>] run_add_entry+0x559/0x720 fs/ntfs3/run.c:389 [<ffffffff81c00eec>] run_unpack+0x53c/0x620 fs/ntfs3/run.c:1021 [<ffffffff81c01047>] run_unpack_ex+0x77/0x320 fs/ntfs3/run.c:1060 [<ffffffff81bf0a83>] ntfs_read_mft fs/ntfs3/inode.c:400 [inline] [<ffffffff81bf0a83>] ntfs_iget5+0x633/0x1a90 fs/ntfs3/inode.c:532 [<ffffffff81c0450d>] ntfs_fill_super+0x11ed/0x22f0 fs/ntfs3/super.c:1272 [<ffffffff81691e81>] get_tree_bdev+0x1b1/0x280 fs/super.c:1577 [<ffffffff8168f18a>] vfs_get_tree+0x2a/0x130 fs/super.c:1750 [<ffffffff816d461f>] do_new_mount fs/namespace.c:3335 [inline] [<ffffffff816d461f>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662 [<ffffffff816d5211>] do_mount fs/namespace.c:3675 [inline] [<ffffffff816d5211>] __do_sys_mount fs/namespace.c:3884 [inline] [<ffffffff816d5211>] __se_sys_mount fs/namespace.c:3861 [inline] [<ffffffff816d5211>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861 [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd BUG: memory leak unreferenced object 0xffff8881082be8c8 (size 8): comm "syz-executor224", pid 5019, jiffies 4294942482 (age 13.000s) hex dump (first 8 bytes): fd 03 00 00 00 00 00 00 ........ backtrace: [<ffffffff8157488b>] __do_kmalloc_node mm/slab_common.c:1022 [inline] [<ffffffff8157488b>] __kmalloc+0x4b/0x150 mm/slab_common.c:1036 [<ffffffff81bcba5c>] kmalloc_array include/linux/slab.h:636 [inline] [<ffffffff81bcba5c>] kcalloc include/linux/slab.h:667 [inline] [<ffffffff81bcba5c>] wnd_init+0xdc/0x140 fs/ntfs3/bitmap.c:662 [<ffffffff81c045b9>] ntfs_fill_super+0x1299/0x22f0 fs/ntfs3/super.c:1294 [<ffffffff81691e81>] get_tree_bdev+0x1b1/0x280 fs/super.c:1577 [<ffffffff8168f18a>] vfs_get_tree+0x2a/0x130 fs/super.c:1750 [<ffffffff816d461f>] do_new_mount fs/namespace.c:3335 [inline] [<ffffffff816d461f>] path_mount+0xc8f/0x10d0 fs/namespace.c:3662 [<ffffffff816d5211>] do_mount fs/namespace.c:3675 [inline] [<ffffffff816d5211>] __do_sys_mount fs/namespace.c:3884 [inline] [<ffffffff816d5211>] __se_sys_mount fs/namespace.c:3861 [inline] [<ffffffff816d5211>] __x64_sys_mount+0x1a1/0x1f0 fs/namespace.c:3861 [<ffffffff84b32fc8>] do_syscall_x64 arch/x86/entry/common.c:50 [inline] [<ffffffff84b32fc8>] do_syscall_64+0x38/0xb0 arch/x86/entry/common.c:80 [<ffffffff84c0008b>] entry_SYSCALL_64_after_hwframe+0x63/0xcd