Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3896752pxu; Mon, 12 Oct 2020 04:22:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwKslw3J9vpaoSkZldnBQw+SafW4EQUYjk0ZW4e0K0yl4Rnsq/QHN8XJqUvJo57uPzqgRmM X-Received: by 2002:a50:d4dc:: with SMTP id e28mr14058185edj.137.1602501745479; Mon, 12 Oct 2020 04:22:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602501745; cv=none; d=google.com; s=arc-20160816; b=rcCk2Zpi90wCi3REPrjJ6na/jL8HWVZj611f5NeKXeueM4rrCvmLhW9HRw7Tkwic6i J1nR2jCZSFJ6UjaF/1pCJ4XZJFDhFYyFmJYvMfgCHlYTYgTIG70Xw3dz0qy6WbayJRoy 7kpsKW++UUHPn+cscTWDSYB367kV8+HYbrWQyTHjym0L48DKBXxDC8lByWvK0I4Iw4Tp z7fUCxAk21R7rdhTDSZxHJB1MilIQtcGS6quo5jA4E9LlhewqyGWlsg+JpsASeLUd/d/ tu+0ezfN0yJysJkNJdZtiI46Sgn6Npj+2SZ+owsyMOJeMqB6xVhUOAQhi+/LGZQ9Vzim 4+lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id; bh=9wS7hazhJPlgCOn/S69kL6EpvC5IQCNz59s3j/d1r60=; b=yt0g1raRwzH++tebrECS8XjS/2TNCKwBItQAxFW0yR2PKQLHxJRW+7wsUukcalgzfB AbzDcL8x0VCSa+Zna/Nx2e9hfSywZb1t9znm4KV+bZEFiivTioytsS7yLYeqP/N7yZwe WsSQd5bGoukV5Ae2iBM0FTLwJl0jKwduaAuV9mk4MLi1Rw6IkwlHgwTtOcQ+13dCff/V wzUJgtQ1TUkmAburKX0ycWr7FZ71r96GqTsA6t98NF3JJ0TpLCTnuzIJjJ61mSRErwIy MGUffUOMJX568Dd9HYCjQ8yXN3nTg+jPFitfc5TKnRowkifYnN3OJai2p4dGdiKHJInm TIVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e14si3174642eds.48.2020.10.12.04.22.00; Mon, 12 Oct 2020 04:22:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-wireless-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-wireless-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388029AbgJLLVY (ORCPT + 99 others); Mon, 12 Oct 2020 07:21:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37700 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387859AbgJLLVY (ORCPT ); Mon, 12 Oct 2020 07:21:24 -0400 Received: from sipsolutions.net (s3.sipsolutions.net [IPv6:2a01:4f8:191:4433::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 499A6C0613CE; Mon, 12 Oct 2020 04:21:24 -0700 (PDT) Received: by sipsolutions.net with esmtpsa (TLS1.3:ECDHE_SECP256R1__RSA_PSS_RSAE_SHA256__AES_256_GCM:256) (Exim 4.94) (envelope-from ) id 1kRvtA-0046Wq-DO; Mon, 12 Oct 2020 13:21:12 +0200 Message-ID: Subject: Re: [PATCH v2 0/3] [PATCH v2 0/3] [PATCH v2 0/3] net, mac80211, kernel: enable KCOV remote coverage collection for 802.11 frame handling From: Johannes Berg To: Aleksandr Nogikh Cc: davem@davemloft.net, kuba@kernel.org, akpm@linux-foundation.org, Eric Dumazet , Andrey Konovalov , Dmitry Vyukov , Marco Elver , linux-kernel@vger.kernel.org, netdev@vger.kernel.org, linux-wireless@vger.kernel.org, nogikh@google.com Date: Mon, 12 Oct 2020 13:21:11 +0200 In-Reply-To: (sfid-20201012_131900_623711_9BAE6766) References: <20201009170202.103512-1-a.nogikh@gmail.com> <5d71472dcef4d88786ea6e8f30f0816f8b920bb7.camel@sipsolutions.net> (sfid-20201012_131900_623711_9BAE6766) Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.36.5 (3.36.5-1.fc32) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-wireless@vger.kernel.org On Mon, 2020-10-12 at 14:18 +0300, Aleksandr Nogikh wrote: > > Currently we're injecting frames via mac80211_hwsim (by pretenting to > be wmediumd - > https://github.com/google/syzkaller/blob/4a77ae0bdc5cd75ebe88ce7c896aae6bbf457a29/executor/common_linux.h#L4922). Ah, ok, of course that works too :-) > Injecting via RAW sockets would definitely be a much cleaner way, but > to do that we need to keep a separate monitor interface. That's pretty > hard as the fuzzer is constantly trying to break things, and direct > injection via mac80211_hwsim seems to be a much more robust way - it > will work as long as the virtual device is alive. hwsim0 is > unfortunately not available as fuzzer processes are run in separate > network namespaces, while this one is created during mac80211_hwsim > initialization. Oh, OK. I guess we _could_ move that also to the new namespace or something, but if the wmediumd approach works then I think it's not worth it. > The current approach seems to work fine for management frames - I was > able to create seed programs that inject valid management frames and > these frames have the expected effect on the subsystem (e.g. injecting > AP responses during scan/authentication/authorization forces a station > to believe that it has successfully connected to an AP). Great! johannes