[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <690caf0a.050a0220.3d0d33.0159.GAE@google.com>
Date: Thu, 06 Nov 2025 06:22:02 -0800
From: syzbot <syzbot+be97dd4da14ae88b6ba4@...kaller.appspotmail.com>
To: clf700383@...il.com, davem@...emloft.net, eadavis@...com,
edumazet@...gle.com, herbert@...dor.apana.org.au, horms@...nel.org,
kuba@...nel.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org,
pabeni@...hat.com, ssrane_b23@...vjti.ac.in, steffen.klassert@...unet.com,
syzkaller-bugs@...glegroups.com
Subject: Re: [syzbot] [net?] kernel BUG in set_ipsecrequest
Hello,
syzbot has tested the proposed patch and the reproducer did not trigger any issue:
Reported-by: syzbot+be97dd4da14ae88b6ba4@...kaller.appspotmail.com
Tested-by: syzbot+be97dd4da14ae88b6ba4@...kaller.appspotmail.com
Tested on:
commit: b54a8e13 Merge branch 'bpf-indirect-jumps'
git tree: bpf-next
console output: https://syzkaller.appspot.com/x/log.txt?x=10dae114580000
kernel config: https://syzkaller.appspot.com/x/.config?x=e46b8a1c645465a9
dashboard link: https://syzkaller.appspot.com/bug?extid=be97dd4da14ae88b6ba4
compiler: Debian clang version 20.1.8 (++20250708063551+0c9f909b7976-1~exp1~20250708183702.136), Debian LLD 20.1.8
patch: https://syzkaller.appspot.com/x/patch.diff?x=106ae114580000
Note: testing is done by a robot and is best-effort only.
Powered by blists - more mailing lists