On Thu, Feb 20, 2020 at 5:45 PM Dmitry Vyukov <dvyu...@google.com> wrote: > If it's aimed only at, say, wireguard netlink interface, then it's not > distracted by bugs in other parts. But as you add some ipv4/6 tcp/udp > sockets, more netlink to change these net namespaces, namespaces > related syscalls, packet injection, etc, in the end it covers quite a > significant part of kernel. You know how fuzzing works, right. You > really need to fix the current layer of bugs to get to the next one. > And we accumulated 600+ open bugs. It still finds some new ones, but I > guess these are really primitive ones (as compared to its full bug > finding potential).
Yea, seems reasonable. I need to get a local syzkaller instance set up for customization and then start patching the things that seem to be standing in the way. Either way, so long as there isn't some implementation issue or logical problem getting in the way of calling that codepath, I'm satisfied in knowing that syzkaller will get there eventually. _______________________________________________ WireGuard mailing list WireGuard@lists.zx2c4.com https://lists.zx2c4.com/mailman/listinfo/wireguard