lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 02 Oct 2020 08:26:50 +0200 From: Johannes Berg <johannes@...solutions.net> To: syzbot <syzbot+5f9392825de654244975@...kaller.appspotmail.com>, a@...table.cc, b.a.t.m.a.n@...ts.open-mesh.org, davem@...emloft.net, david@...morbit.com, dchinner@...hat.com, hch@....de, kuba@...nel.org, linux-kernel@...r.kernel.org, linux-wireless@...r.kernel.org, mareklindner@...mailbox.ch, netdev@...r.kernel.org, sw@...onwunderlich.de, syzkaller-bugs@...glegroups.com Subject: Re: WARNING in cfg80211_connect On Thu, 2020-10-01 at 21:31 -0700, syzbot wrote: > syzbot has bisected this issue to: > > commit 16d4d43595b4780daac8fcea6d042689124cb094 > Author: Christoph Hellwig <hch@....de> > Date: Wed Jul 20 01:38:55 2016 +0000 > > xfs: split direct I/O and DAX path > LOL! Unlike in many other cases, here I don't even see why it went down that path. You'd think that Christoph's commit should have no effect whatsoever, but here we are with syzbot claiming a difference? I mean, often enough it says something is "caused" by a patch because that caused e.g. generic netlink family renumbering, or because it emitted some other ioctl() calls or whatnot that are invalid before and valid after some other (feature) patch (or vice versa sometimes), but you'd think that this patch would have _zero_ userspace observable effect? Which I guess means that the reproduction of this bug is random, perhaps timing related. johannes
Powered by blists - more mailing lists