Skip to content

Instantly share code, notes, and snippets.

lea 0x0(%r13,%rax,1),%rax
lea -0x10(%r14,%rax,1),%rax
lea -0x10(%rax,%r8,1),%rax
lea -0x10(%rax,%r9,1),%rax
lea -0x10(%rax,%rcx,1),%rax
lea 0x14(%rax,%rax,1),%rax
lea 0x15180(%rdi,%rax,1),%rax
lea 0x18(%r10,%rax,1),%rax
lea 0x18(%rax,%r12,1),%rax
lea -0x18(%rcx,%rax,1),%rax
00000000001ef620 <absl::Mutex::TryLock()>:
1ef620: 48 8b 07 mov (%rdi),%rax
1ef623: a8 19 test $0x19,%al
1ef625: 75 10 jne 1ef637 <absl::Mutex::TryLock()+0x17>
1ef627: 48 89 c1 mov %rax,%rcx
1ef62a: 48 83 c9 08 or $0x8,%rcx
1ef62e: f0 48 0f b1 0f lock cmpxchg %rcx,(%rdi)
1ef633: 0f 94 c0 sete %al
1ef636: c3 ret
1ef637: a8 10 test $0x10,%al
00000000001ee7c0 <absl::Mutex::TryLock()>:
1ee7c0: 55 push %rbp
1ee7c1: 48 89 e5 mov %rsp,%rbp
1ee7c4: 53 push %rbx
1ee7c5: 50 push %rax
1ee7c6: 48 8b 07 mov (%rdi),%rax
1ee7c9: a8 19 test $0x19,%al
1ee7cb: 75 10 jne 1ee7dd <absl::Mutex::TryLock()+0x1d>
1ee7cd: 48 89 c1 mov %rax,%rcx
1ee7d0: 48 83 c9 08 or $0x8,%rcx
git shortlog --grep 'Reported-.*\(syzbot\|syzkaller\)' --author=penguin-kernel --author=mudongliangabcd --author=paskripkin --author=asml.silence --author=johannes.berg
Dongliang Mu (23):
NFC: nci: fix memory leak in nci_allocate_device
misc/uss720: fix memory leak in uss720_probe
ALSA: control led: fix memory leak in snd_ctl_led_register
media: dvd_usb: memory leak in cinergyt2_fe_attach
ieee802154: hwsim: Fix memory leak in hwsim_add_one
usb: hso: fix error handling code of hso_create_net_device
netfilter: nf_tables: fix audit memory leak in nf_tables_commit
usb: hso: fix error handling code of hso_create_net_device
#include <stdio.h>
#define NARG(...) NARG_(__VA_ARGS__, RSEQ_N())
#define NARG_(...) ARG_N(__VA_ARGS__)
#define RSEQ_N() 8, 7, 6, 5, 4, 3, 2, 1, 0
#define ARG_N(_1, _2, _3, _4, _5, _6, _7, _8, N, ...) N
#define CONCAT_(x, y) x##y
#define CONCAT(x, y) CONCAT_( x, y )
#define OVERLOAD(X, ...) CONCAT(X, NARG(__VA_ARGS__))
#define INTERCEPT(ret, func, ...) OVERLOAD(INTER, __VA_ARGS__)(ret, func, __VA_ARGS__)
# ./syz-execprog -debug prog
2023/05/16 08:29:14 parsed 1 programs
2023/05/16 08:29:15 executed programs: 0
spawned loop pid 5580
mount(fusectl) failed: 16
hci dev id: 0
01 03 0c 00
01 03 10 00
01 01 10 00
01 09 10 00
3264
3264
4544
4544
192
160
160
64512
60288
64640
#
# Automatically generated file; DO NOT EDIT.
# Linux/x86 6.1.0-rc4 Kernel Configuration
#
CONFIG_CC_VERSION_TEXT="gcc (Debian 12.2.0-3) 12.2.0"
CONFIG_CC_IS_GCC=y
CONFIG_GCC_VERSION=120200
CONFIG_CLANG_VERSION=0
CONFIG_AS_IS_GNU=y
CONFIG_AS_VERSION=23900
int main(int argc, char** argv)
{
if (argc >= 2 && strcmp(argv[1], "netns-bench") == 0) {
flag_debug = false;
flag_net_injection = true;
flag_net_devices = true;
flag_wifi = true;
const int procs = std::max(1, atoi(argc >= 3 ? argv[2] : ""));
static int ops = 0;
for (int i = 0; i < procs; i++) {
dashboard/app/dashboard.go: log.Logf(0, "failed to start profiler: %v", err)
pkg/build/gvisor.go: log.Logf(0, "bazel: %v", buildArgs)
pkg/build/gvisor.go: log.Logf(0, "bazel: %v", aqueryArgs)
pkg/cover/backend/elf.go: log.Logf(0, "ignoring module %v without DEBUG_INFO", module.Name)
pkg/cover/backend/modules.go: log.Logf(0, "failed to discover module %v", mod.Name)
pkg/cover/backend/modules.go: log.Logf(0, "module %v -> %v", mod.Name, path)
pkg/cover/backend/modules.go: log.Logf(0, "failed to get %v module name: %v", path, err)
pkg/host/features.go: log.Logf(1, "executor %v\n%s", args, output)
pkg/host/syscalls.go: log.Logf(1, "detecting supported syscalls")
pkg/instance/instance.go: log.Logf(0, "failed to symbolize report: %v", err)