Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp10649689ybi; Thu, 25 Jul 2019 03:03:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqwF+63Z0+0pMA5CzIudfVQr4S+IrwUZMJMlrL8889XM8wXmaU5rCMFUKG2wTXHhPiMFVWXm X-Received: by 2002:a17:902:be03:: with SMTP id r3mr91183604pls.156.1564049013147; Thu, 25 Jul 2019 03:03:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564049013; cv=none; d=google.com; s=arc-20160816; b=Urn5Wt57twjEZ/dFn1PSufG2dReY/ZAunfPq9atFSOMY/4RqDZGY9cdPFq8ecnjs0r BPmN8PoxzteQBUiTSSfJBYeQm74hcXEMavbdB8kVU9O9PXhSrAVLOysGRun2fZV087LT mUZ3FnvSXtB1y0rHdigbAjapRfJZbFXL4vO1v4U8VKz3N33uUH1nb/tNrZwabXR+xIvM ik+1T6BoWGG5dfcroqC5/eSSjVJXfR3MRFHb+EaauD693OuVwWzl+RHE00QN+4biFAjs Tjwa+/WXctKolEvo77aJBYXa4sH0+UzZQ7XTh9zjOZH6OHwfrafhbKbHn7zX72764kYX zoIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:to:from:date:dkim-signature; bh=ixbHnSE22iswXoeJxrxNWwaT4zAqFr2nD+e++9dHTsQ=; b=u4Cq0yPQM+nlYoqsE4n1b5Xr3WWrgDRlrrcqLivborX+Tnf/wLZSpeGm7jjYcRvI69 OB1uQ6R/EXjEW93KFHz7bWCOr2IFPmLLbthCNTqdCeKQXL33vw9a11bRkKqTvYY3Hl+B GvSQDDyFMwkJg3GTkvYrVuF8krSMmPxUoOjJglRlZSSWR2dyzo88DisqLwGZYJcD9e51 K/3+EJeRlPHpq/VIBrRBWiiLMSPTz64kJVWO9qFwdUDYJTQJB2b1AMCEJUOUTepRYuMF B47S2Q8XobxlE+1bwcAQF6qEn0n6cf3ajlIhbGsHrNgxN/7U17P/HfWeHUU4xK+GjEfc vUEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n+AtQlS8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v10si17077849pgq.17.2019.07.25.03.03.12; Thu, 25 Jul 2019 03:03:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=n+AtQlS8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390051AbfGYEkf (ORCPT + 99 others); Thu, 25 Jul 2019 00:40:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:36092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389297AbfGYEkf (ORCPT ); Thu, 25 Jul 2019 00:40:35 -0400 Received: from sol.localdomain (c-24-5-143-220.hsd1.ca.comcast.net [24.5.143.220]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id CD337218DA; Thu, 25 Jul 2019 04:40:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1564029634; bh=wcwG4pMAinnKbG7g0QnFfuSmByspa9vQBYKTGDgSLfg=; h=Date:From:To:Subject:References:In-Reply-To:From; b=n+AtQlS8DgC2uB6+dqe/2ZEDwF3+o+vdoXUv6KtJTv0AHp/MSsnvsCcDfXcSgDSJ0 OZ1T+sQ4jg8/TT3FFRy3w1cHk2dwBj39FE36wLS5wiziIl7JgMc9dHmUmSikmOUe9r sCoBZxU4mgjtSWFIDDM8CtUgykz6sKZnNU0bMEBM= Date: Wed, 24 Jul 2019 21:40:32 -0700 From: Eric Biggers To: "Theodore Y. Ts'o" , David Miller , eric.dumazet@gmail.com, dvyukov@google.com, netdev@vger.kernel.org, fw@strlen.de, i.maximets@samsung.com, edumazet@google.com, dsahern@gmail.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com Subject: Re: Reminder: 99 open syzbot bugs in net subsystem Message-ID: <20190725044032.GB677@sol.localdomain> Mail-Followup-To: "Theodore Y. Ts'o" , David Miller , eric.dumazet@gmail.com, dvyukov@google.com, netdev@vger.kernel.org, fw@strlen.de, i.maximets@samsung.com, edumazet@google.com, dsahern@gmail.com, linux-kernel@vger.kernel.org, syzkaller-bugs@googlegroups.com References: <20190724163014.GC673@sol.localdomain> <20190724.111225.2257475150626507655.davem@davemloft.net> <20190724183710.GF213255@gmail.com> <20190724.130928.1854327585456756387.davem@davemloft.net> <20190725033913.GB13651@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190725033913.GB13651@mit.edu> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 24, 2019 at 11:39:13PM -0400, Theodore Y. Ts'o wrote: > On Wed, Jul 24, 2019 at 01:09:28PM -0700, David Miller wrote: > > From: Eric Biggers > > Date: Wed, 24 Jul 2019 11:37:12 -0700 > > > > > We can argue about what words to use to describe this situation, but > > > it doesn't change the situation itself. > > > > And we should argue about those words because it matters to humans and > > effects how they feel, and humans ultimately fix these bugs. > > > > So please stop with the hyperbole. > > Perhaps it would be better to call them, "syzbot reports". Not all > syzbot reports are bugs. In fact, Dmitry has steadfastly refused to > add features which any basic bug-tracking system would have, claiming > that syzbot should not be a bug-tracking system, and something like > bugzilla should be forcibly imposed on all kernel developers. So I > don't consider syzkaller reports as bugs --- they are just reports. > > In order for developers to want to engage with "syzbot reports", we > need to reduce developer toil which syzbot imposes on developers, such > that it is a net benefit, instead of it being just a source of > annoying e-mails, some of which are actionable, and some of which are > noise. > > In particular, asking developers to figure out which syzbot reports > should be closed, because developers found the problem independently, > and fixed it without hearing about from syzbot first, really isn't a > fair thing to ask. Especially if we can automate away the problem. > > If there is a reproducer, it should be possible to automatically > categorize the reproducer as a reliable reproducer or a flakey one. > If it is a reliable reproducer on version X, and it fails to be > reliably reproduce on version X+N, then it should be able to figure > out that it has been fixed, instead of requesting that a human confirm > it. If you really want a human to look at it, now that syzkaller has > a bisection feature, it should be possible to use the reliable > reproducer to do a negative bisection search to report a candidate > fix. This would significantly reproduce the developer toil imposed as > a tax on developers. And if Dmitry doesn't want to auto-close those > reports that appear to be fixed already, at the very least they should > be down-prioritized on Eric's reports, so people who don't want to > waste their time on "bureaucracy" can do so. > > Cheers, > > - Ted > > P.S. Another criteria I'd suggest down-prioritizing on is, "does it > require root privileges?" After all, since root has so many different > ways of crashing a system already, and if we're all super-busy, we > need to prioritize which reports should be addressed first. > I agree with all this. Fix bisection would be really useful. I think what we'd actually need to do to get decent results, though, is consider many different signals (days since last occurred, repro type, fix bisected, bug bisected, occurred in mainline or not, does the repro work as root, is it clearly a "bad" bug like use-after-free, etc.) and compute an appropriate timeout based on that. However, I'd like to emphasize that in my reminder emails, I've *already* considered many of these factors when sorting the bug reports, and in particular the bugs/reports that have been seen recently are strongly weighted towards being listed first, especially if they were seen in mainline. In this particular reminder email, for example, the first 18 bugs/reports have *all* been seen in the last 4 days. These first 18 bugs/reports are ready to be worked on and fixed now. It's unclear to me what is most impeding this. Is it part of the syzbot process? Bad reproducers? Too much noise? Or is it no funding? Not enough qualified people? No maintainers? Not enough reminders? Lack of CVEs and demonstrable exploits? What is most impeding these 18 bugs from being fixed? - Eric