lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <0E15851D-59E4-455D-985E-65F066E7A85A@amacapital.net> Date: Sun, 14 Apr 2019 13:08:09 -0700 From: Andy Lutomirski <luto@...capital.net> To: syzbot <syzbot+659574e7bcc7f7eb4df7@...kaller.appspotmail.com> Cc: alexl@...hat.com, bridge@...ts.linux-foundation.org, coreteam@...filter.org, cosimo@...lessm.com, davem@...emloft.net, dvyukov@...gle.com, fw@...len.de, kadlec@...ckhole.kfki.hu, libc-alpha@...rceware.org, linux-kernel@...r.kernel.org, luto@...nel.org, mingo@...nel.org, netdev@...r.kernel.org, netfilter-devel@...r.kernel.org, nicholson@...lessm.com, pablo@...filter.org, peterz@...radead.org, raji@...ux.vnet.ibm.com, stephen@...workplumber.org, syzkaller-bugs@...glegroups.com, tglx@...utronix.de, torvalds@...ux-foundation.org, tuliom@...ux.vnet.ibm.com Subject: Re: WARNING in compat_copy_entries (2) This is likely a confused bisection. I bet that reverting this patch breaks your test but has nothing to do with the bug. Try reproducing with socketcall() to bisect farther. --Andy > On Apr 14, 2019, at 12:20 PM, syzbot <syzbot+659574e7bcc7f7eb4df7@...kaller.appspotmail.com> wrote: > > syzbot has bisected this bug to: > > commit 9dea5dc921b5f4045a18c63eb92e84dc274d17eb > Author: Andy Lutomirski <luto@...nel.org> > Date: Tue Jul 14 22:24:24 2015 +0000 > > x86/entry/syscalls: Wire up 32-bit direct socket calls > > bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1736919f200000 > start commit: ce380619 Merge tag 'please-pull-ia64_misc' of git://git.ke.. > git tree: upstream > console output: https://syzkaller.appspot.com/x/log.txt?x=10b6919f200000 > kernel config: https://syzkaller.appspot.com/x/.config?x=36fbc8c97ef985d3 > dashboard link: https://syzkaller.appspot.com/bug?extid=659574e7bcc7f7eb4df7 > userspace arch: i386 > syz repro: https://syzkaller.appspot.com/x/repro.syz?x=179b4d8b800000 > > Reported-by: syzbot+659574e7bcc7f7eb4df7@...kaller.appspotmail.com > Fixes: 9dea5dc921b5 ("x86/entry/syscalls: Wire up 32-bit direct socket calls") > > For information about bisection process see: https://goo.gl/tpsmEJ#bisection
Powered by blists - more mailing lists