From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.9 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5BAACC2D0A8 for ; Sat, 26 Sep 2020 11:21:32 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id D237D238E6 for ; Sat, 26 Sep 2020 11:21:31 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=alien8.de header.i=@alien8.de header.b="jIE5dL9t" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728179AbgIZLVa (ORCPT ); Sat, 26 Sep 2020 07:21:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49504 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725208AbgIZLVa (ORCPT ); Sat, 26 Sep 2020 07:21:30 -0400 Received: from mail.skyhub.de (mail.skyhub.de [IPv6:2a01:4f8:190:11c2::b:1457]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E659DC0613CE for ; Sat, 26 Sep 2020 04:21:29 -0700 (PDT) Received: from zn.tnic (p200300ec2f1c2500ffe5133b4df85bce.dip0.t-ipconnect.de [IPv6:2003:ec:2f1c:2500:ffe5:133b:4df8:5bce]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 478D11EC02FE; Sat, 26 Sep 2020 13:21:28 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1601119288; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=K7HXH+8g7WOwBC/NUI8kN5arZwFz+vcbQIKxgw2L5Pg=; b=jIE5dL9tE4u/mQzlOxI6E5AzSzK/Hv+U4IrW4J8aWsvcz8tOEmB0opmv6Zth2D/hIPrWa8 UglH9mRCLJLHjS9cjbWIhaHMd+sxOqEHYz8s+RYBdc7t9kIcqQfl94On5emHnOvJvV6n9b GiPUEG8+dChtzK7qIYexpE7s3fAlFvw= Date: Sat, 26 Sep 2020 13:21:19 +0200 From: Borislav Petkov To: Dmitry Vyukov Cc: Nick Desaulniers , Josh Poimboeuf , syzbot , Arnaldo Carvalho de Melo , Alexander Shishkin , "H. Peter Anvin" , Jiri Olsa , LKML , Mark Rutland , Ingo Molnar , Namhyung Kim , Peter Zijlstra , syzkaller-bugs , Thomas Gleixner , the arch/x86 maintainers , clang-built-linux Subject: Re: general protection fault in perf_misc_flags Message-ID: <20200926112119.GA22089@zn.tnic> References: <20200919110831.GD7462@zn.tnic> <20200921221336.GN5901@zn.tnic> <20200923090336.GD28545@zn.tnic> <20200923103431.GF28545@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 23, 2020 at 05:20:06PM +0200, Dmitry Vyukov wrote: > It's a random fuzzing workload. You can get this workload by running > syzkaller locally: > https://github.com/google/syzkaller/blob/master/docs/linux/setup_ubuntu-host_qemu-vm_x86-64-kernel.md Yeah, the my.cfg example suggests that the syz-manager starts the guest and supplies the kernel, etc. Is there a possibility to run the workload in an already existing guest which I've booted prior? I'm asking because I have all the infra for testing kernels in guests already setup here and it would be easier for me to simply run the workload directly in the guest and then poke at it. Thx. -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette