From: Theodore Ts'o <tytso@mit.edu>
To: Dmitry Vyukov <dvyukov@google.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>,
Pavel Machek <pavel@ucw.cz>, Alexei Starovoitov <ast@kernel.org>,
LKML <linux-kernel@vger.kernel.org>,
netdev <netdev@vger.kernel.org>,
syzkaller-bugs@googlegroups.com
Subject: Re: dangers of bots on the mailing lists was Re: divide error in ___bpf_prog_run
Date: Wed, 17 Jan 2018 15:47:35 -0500 [thread overview]
Message-ID: <20180117204735.GC6948@thunk.org> (raw)
In-Reply-To: <CACT4Y+YOzrzdGFswy_zp=XOUSKKNebdOJcMHC=SYASRGj3b7FA@mail.gmail.com>
On Wed, Jan 17, 2018 at 12:09:18PM +0100, Dmitry Vyukov wrote:
> On Wed, Jan 17, 2018 at 10:49 AM, Daniel Borkmann <daniel@iogearbox.net> wrote:
> > Don't know if there's such a possibility, but it would be nice if we could
> > target fuzzing for specific subsystems in related subtrees directly (e.g.
> > for bpf in bpf and bpf-next trees as one example). Dmitry?
>
> Hi Daniel,
>
> It's doable.
> Let's start with one bpf tree. Will it be bpf or bpf-next? Which one
> contains more ongoing work? What's the exact git repo address/branch,
> so that I don't second guess?
As a suggestion, until the bpf subsystem is free from problems that
can be found by Syzkaller in Linus's upstream tree, maybe it's not
worth trying to test individual subsystem trees such as the bpf tree?
After all, there's no point trying to bisect our way checking to see
if the problem is with a newly added commit in a development tree, if
it turns out the problem was first introduced years ago in the 4.1 or
3.19 timeframe.
After all, finding these older problems is going to have much higher
value, since these are the sorts of potential security problems that
are worth backporting to real device kernels for Android/ChromeOS, and
for enterprise distro kernels. So from an "impact to the industry"
perspective, focusing on Linus's tree is going to be far more
productive. That's a win for the community, and it's a win for those
people on the Syzkaller team who might be going up for promo or
listing their achievements at performance review time. :-)
This will also give the Syzkaller team more time to make the
automation more intelligent in terms of being able to do the automatic
bisection to find the first guilty commit, labelling the report with
the specific subsystem tree that that it came from, etc., etc.
Cheers,
- Ted
P.S. Something that might be *really* interesting is for those cases
where Syzkaller can find a repro, to test that repro on various stable
4.4, 4.9, 3.18, et. al. LTS kernels. This will take less resources
than a full bisection, but it will add real value since knowledge that
it will trigger on a LTS kernel will help prioritize which reports
developers might be more interested in focusing upon, and it will give
them a head start in determining which fixes needed to be backported
to which stable kernels.
next prev parent reply other threads:[~2018-01-17 20:47 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-13 1:58 divide error in ___bpf_prog_run syzbot
2018-01-14 0:16 ` Daniel Borkmann
2018-01-14 16:03 ` David Miller
2018-01-17 9:32 ` dangers of bots on the mailing lists was " Pavel Machek
2018-01-17 9:35 ` syzbot
2018-01-17 9:35 ` syzbot
2018-01-17 9:45 ` dangers of bots on the mailing lists was " Dmitry Vyukov
2018-01-17 9:49 ` Pavel Machek
2018-01-17 10:11 ` Henrique de Moraes Holschuh
2018-01-18 10:57 ` Dmitry Vyukov
2018-01-18 13:41 ` Henrique de Moraes Holschuh
2018-01-17 9:48 ` Dmitry Vyukov
2018-01-17 9:52 ` Pavel Machek
2018-01-17 10:03 ` Florian Westphal
2018-01-17 9:49 ` Daniel Borkmann
2018-01-17 11:09 ` Dmitry Vyukov
2018-01-17 20:47 ` Theodore Ts'o [this message]
2018-01-18 0:21 ` Alexei Starovoitov
2018-01-18 1:09 ` Theodore Ts'o
2018-01-18 1:18 ` Joe Perches
2018-01-18 1:46 ` Eric Biggers
2018-01-18 2:35 ` Joe Perches
2018-01-18 13:01 ` Dmitry Vyukov
2018-01-18 13:06 ` Dmitry Vyukov
2018-01-18 14:05 ` Greg Kroah-Hartman
2018-01-22 13:31 ` Dmitry Vyukov
2018-01-18 14:10 ` Guenter Roeck
2018-01-22 8:08 ` Dmitry Vyukov
2018-01-18 13:10 ` Dmitry Vyukov
2018-01-18 14:46 ` Daniel Borkmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180117204735.GC6948@thunk.org \
--to=tytso@mit.edu \
--cc=ast@kernel.org \
--cc=daniel@iogearbox.net \
--cc=dvyukov@google.com \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pavel@ucw.cz \
--cc=syzkaller-bugs@googlegroups.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).