lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 30 Mar 2020 00:25:03 -0700 From: syzbot <syzbot+fbe81b56f7df4c0fb21b@...kaller.appspotmail.com> To: andriin@...com, ast@...nel.org, aviadye@...lanox.com, borisp@...lanox.com, bpf@...r.kernel.org, daniel@...earbox.net, davejwatson@...com, davem@...emloft.net, edumazet@...gle.com, jbaron@...mai.com, john.fastabend@...il.com, kafai@...com, kuba@...nel.org, kuznet@....inr.ac.ru, linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org, ncardwell@...gle.com, netdev@...r.kernel.org, shuah@...nel.org, soheil@...gle.com, songliubraving@...com, syzkaller-bugs@...glegroups.com, yhs@...com, yoshfuji@...ux-ipv6.org Subject: Re: WARNING in sk_stream_kill_queues (4) syzbot suspects this bug was fixed by commit: commit b6f6118901d1e867ac9177bbff3b00b185bd4fdc Author: Eric Dumazet <edumazet@...gle.com> Date: Tue Feb 25 19:52:29 2020 +0000 ipv6: restrict IPV6_ADDRFORM operation bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=1177dc25e00000 start commit: f8788d86 Linux 5.6-rc3 git tree: upstream kernel config: https://syzkaller.appspot.com/x/.config?x=9833e26bab355358 dashboard link: https://syzkaller.appspot.com/bug?extid=fbe81b56f7df4c0fb21b syz repro: https://syzkaller.appspot.com/x/repro.syz?x=14fd92c3e00000 C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11679a81e00000 If the result looks correct, please mark the bug fixed by replying with: #syz fix: ipv6: restrict IPV6_ADDRFORM operation For information about bisection process see: https://goo.gl/tpsmEJ#bisection
Powered by blists - more mailing lists