[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAHmME9pYGETQUrfTX7CQrHA_Z+oVJU0kAYQpaynaAvD8Pq2-hA@mail.gmail.com>
Date: Thu, 20 Feb 2020 17:59:29 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: Dmitry Vyukov <dvyukov@...gle.com>
Cc: netdev <netdev@...r.kernel.org>,
syzbot <syzkaller@...glegroups.com>,
WireGuard mailing list <wireguard@...ts.zx2c4.com>
Subject: Re: syzkaller wireguard key situation [was: Re: [PATCH net-next v2]
net: WireGuard secure network tunnel]
On Thu, Feb 20, 2020 at 5:45 PM Dmitry Vyukov <dvyukov@...gle.com> wrote:
> If it's aimed only at, say, wireguard netlink interface, then it's not
> distracted by bugs in other parts. But as you add some ipv4/6 tcp/udp
> sockets, more netlink to change these net namespaces, namespaces
> related syscalls, packet injection, etc, in the end it covers quite a
> significant part of kernel. You know how fuzzing works, right. You
> really need to fix the current layer of bugs to get to the next one.
> And we accumulated 600+ open bugs. It still finds some new ones, but I
> guess these are really primitive ones (as compared to its full bug
> finding potential).
Yea, seems reasonable. I need to get a local syzkaller instance set up
for customization and then start patching the things that seem to be
standing in the way. Either way, so long as there isn't some
implementation issue or logical problem getting in the way of calling
that codepath, I'm satisfied in knowing that syzkaller will get there
eventually.
Powered by blists - more mailing lists