Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3659837pxu; Sun, 11 Oct 2020 19:10:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1KhGsgiSOim5dO77vSocA1ui2GSv2BR91plcsobsi96wJlwmgWg2wLBbXZ7+rldXIWEu6 X-Received: by 2002:a17:906:4048:: with SMTP id y8mr25911100ejj.466.1602468611501; Sun, 11 Oct 2020 19:10:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602468611; cv=none; d=google.com; s=arc-20160816; b=lgkOUPQt4LZKVjchh+abuvsooED4bfnSjYOVpywTTtP52n2CbfVTdwp6O/pSJCwFj2 XLTrtxGpYL168Fq8IfrBKjY9HiPfJqD2SXRZKCY9cH1q3r4EdoSxlwu+5s5iomXFy4tV JqQ0da/8kwq70k0QD287TlaUtrEha570BLCSOuXbxvfaZrZO4nqo/rv25NyQtjpQpEG4 NqIgze1y8sB7m0b3ajQVtGfEukZ4Ly2ZAYIcjRh0tiVbze58s9kYHqHuqCaEYujIpn1G JUA1aV/n1sAnsXcs63cJOgor0oVQIAiix7K43eLeaAQ0bmSuIddaLo3RMcFpFgJp30UW T6mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=genOOU6roK2+K12uenifHucqJFDbbYvaMoQBg1kGL8Y=; b=MxSUAQk7Mvvq1gm2NatrwJ7LZqMJLUfVqjmA7zY7+zZvCxzWyvK6nI/T3ivz4lgY57 RMOy8EvtCq5G5LvvbVNdhYV+FTeGySo6yF0wQ4LeVcXsAMtReo+SsFz/xt5vUt3xscJH aecvv17G1M5BUqURDgkmsKpFdC2+nm7PUziovT5zdENnehiIx3KDmcRrc6+gkZFFqtB/ kdRGf+Kxs1aa6tQEJNPn6sVqRivtsZfpeo2PgWjLaRKber4peVL+Xdl+dcvrSRRsHfxH y0mP3Hg0V9YUdw8EnjAzf2euuenpo9yniiBRcjrrff3c7S42a6bZk8bJwxHKsazUVpla G/lg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g23si11254512edh.164.2020.10.11.19.09.25; Sun, 11 Oct 2020 19:10:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728622AbgJKSuT (ORCPT + 99 others); Sun, 11 Oct 2020 14:50:19 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54860 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727550AbgJKSuT (ORCPT ); Sun, 11 Oct 2020 14:50:19 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ECCCFC0613CE; Sun, 11 Oct 2020 11:50:18 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.94) (envelope-from ) id 1kRgPy-003enP-Cf; Sun, 11 Oct 2020 20:50:02 +0200 Message-ID: <5d71472dcef4d88786ea6e8f30f0816f8b920bb7.camel@sipsolutions.net> Subject: Re: [PATCH v2 0/3] [PATCH v2 0/3] [PATCH v2 0/3] net, mac80211, kernel: enable KCOV remote coverage collection for 802.11 frame handling From: Johannes Berg To: Aleksandr Nogikh , davem@davemloft.net, kuba@kernel.org, akpm@linux-foundation.org Cc: edumazet@google.com, andreyknvl@google.com, dvyukov@google.com, elver@google.com, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-wireless@vger.kernel.org, nogikh@google.com Date: Sun, 11 Oct 2020 20:50:00 +0200 In-Reply-To: <20201009170202.103512-1-a.nogikh@gmail.com> (sfid-20201009_190209_250951_9651A9CD) References: <20201009170202.103512-1-a.nogikh@gmail.com> (sfid-20201009_190209_250951_9651A9CD) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Fri, 2020-10-09 at 17:01 +0000, Aleksandr Nogikh wrote: > From: Aleksandr Nogikh > > This patch series enables remote KCOV coverage collection during > 802.11 frames processing. These changes make it possible to perform > coverage-guided fuzzing in search of remotely triggerable bugs. Btw, it occurred to me that I don't know at all - is this related to syzkaller? Or is there some other fuzzing you're working on? Can we get the bug reports from it if it's different? :) Also, unrelated to that (but I see Dmitry CC'ed), I started wondering if it'd be helpful to have an easier raw 802.11 inject path on top of say hwsim0; I noticed some syzbot reports where it created raw sockets, but that only gets you into the *data* plane of the wifi stack, not into the *management* plane. Theoretically you could add a monitor interface, but right now the wifi setup (according to the current docs on github) is using two IBSS interfaces. Perhaps an inject path on the mac80211-hwsim "hwsim0" interface would be something to consider? Or simply adding a third radio that's in "monitor" mode, so that a raw socket bound to *that* interface can inject with a radiotap header followed by an 802.11 frame, getting to arbitrary frame handling code, not just data frames. Any thoughts? johannes