[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <67571132.050a0220.2477f.004a.GAE@google.com>
Date: Mon, 09 Dec 2024 07:48:02 -0800
From: syzbot <syzbot+885c03ad650731743489@...kaller.appspotmail.com>
To: akpm@...ux-foundation.org, asmadeus@...ewreck.org, dhowells@...hat.com,
ericvh@...nel.org, linux-kernel@...r.kernel.org, linux-mm@...ck.org,
linux_oss@...debyte.com, lucho@...kov.net, syzkaller-bugs@...glegroups.com,
v9fs@...ts.linux.dev
Subject: Re: [syzbot] [mm?] [v9fs?] BUG: stack guard page was hit in sys_open
Hello,
syzbot has tested the proposed patch and the reproducer did not trigger any issue:
Reported-by: syzbot+885c03ad650731743489@...kaller.appspotmail.com
Tested-by: syzbot+885c03ad650731743489@...kaller.appspotmail.com
Tested on:
commit: fac04efc Linux 6.13-rc2
git tree: upstream
console output: https://syzkaller.appspot.com/x/log.txt?x=13ee54df980000
kernel config: https://syzkaller.appspot.com/x/.config?x=b041310d53c18b96
dashboard link: https://syzkaller.appspot.com/bug?extid=885c03ad650731743489
compiler: gcc (Debian 12.2.0-14) 12.2.0, GNU ld (GNU Binutils for Debian) 2.40
patch: https://syzkaller.appspot.com/x/patch.diff?x=14f654df980000
Note: testing is done by a robot and is best-effort only.
Powered by blists - more mailing lists