[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <000000000000f5a6620596c1d43e@google.com>
Date: Thu, 07 Nov 2019 05:42:09 -0800
From: syzbot <syzbot+2e37f794f31be5667a88@...kaller.appspotmail.com>
To: allison@...utok.net, andy.shevchenko@...il.com,
davem@...emloft.net, douly.fnst@...fujitsu.com,
gregkh@...uxfoundation.org, hpa@...or.com, info@...ux.net,
jbenc@...hat.com, jgross@...e.com, kstewart@...uxfoundation.org,
linux-kernel@...r.kernel.org, mingo@...hat.com,
netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com,
tglx@...utronix.de, ville.syrjala@...ux.intel.com,
willemb@...gle.com, x86@...nel.org
Subject: Re: general protection fault in propagate_entity_cfs_rq
syzbot suspects this bug was fixed by commit:
commit bab2c80e5a6c855657482eac9e97f5f3eedb509a
Author: Willem de Bruijn <willemb@...gle.com>
Date: Wed Jul 11 16:00:44 2018 +0000
nsh: set mac len based on inner packet
bisection log: https://syzkaller.appspot.com/x/bisect.txt?x=170cc89c600000
start commit: 6fd06660 Merge branch 'bpf-arm-jit-improvements'
git tree: bpf-next
kernel config: https://syzkaller.appspot.com/x/.config?x=a501a01deaf0fe9
dashboard link: https://syzkaller.appspot.com/bug?extid=2e37f794f31be5667a88
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=1014db94400000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=11f81e78400000
If the result looks correct, please mark the bug fixed by replying with:
#syz fix: nsh: set mac len based on inner packet
For information about bisection process see: https://goo.gl/tpsmEJ#bisection
Powered by blists - more mailing lists