Cover Letter Detail
Show a cover letter.
GET /api/covers/817697/?format=api
{ "id": 817697, "url": "http://patchwork.ozlabs.org/api/covers/817697/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/cover/20170922204915.7889-1-peterpenkov96@gmail.com/", "project": { "id": 7, "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api", "name": "Linux network development", "link_name": "netdev", "list_id": "netdev.vger.kernel.org", "list_email": "netdev@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170922204915.7889-1-peterpenkov96@gmail.com>", "list_archive_url": null, "date": "2017-09-22T20:49:13", "name": "[v3,net-next,0/2] Improve code coverage of syzkaller", "submitter": { "id": 72387, "url": "http://patchwork.ozlabs.org/api/people/72387/?format=api", "name": "Petar Penkov", "email": "peterpenkov96@gmail.com" }, "mbox": "http://patchwork.ozlabs.org/project/netdev/cover/20170922204915.7889-1-peterpenkov96@gmail.com/mbox/", "series": [ { "id": 4708, "url": "http://patchwork.ozlabs.org/api/series/4708/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=4708", "date": "2017-09-22T20:49:13", "name": "Improve code coverage of syzkaller", "version": 3, "mbox": "http://patchwork.ozlabs.org/series/4708/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/817697/comments/", "headers": { "Return-Path": "<netdev-owner@vger.kernel.org>", "X-Original-To": "patchwork-incoming@ozlabs.org", "Delivered-To": "patchwork-incoming@ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=gmail.com header.i=@gmail.com\n\theader.b=\"p3yWM4LG\"; dkim-atps=neutral" ], "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xzQZl2xkGz9sNr\n\tfor <patchwork-incoming@ozlabs.org>;\n\tSat, 23 Sep 2017 06:49:35 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1752078AbdIVUtc (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tFri, 22 Sep 2017 16:49:32 -0400", "from mail-pg0-f66.google.com ([74.125.83.66]:33447 \"EHLO\n\tmail-pg0-f66.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1751974AbdIVUtb (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Fri, 22 Sep 2017 16:49:31 -0400", "by mail-pg0-f66.google.com with SMTP id i130so1244853pgc.0\n\tfor <netdev@vger.kernel.org>; Fri, 22 Sep 2017 13:49:31 -0700 (PDT)", "from petey-VirtualBox ([128.12.253.5])\n\tby smtp.gmail.com with ESMTPSA id\n\ta25sm817957pfg.111.2017.09.22.13.49.29\n\t(version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tFri, 22 Sep 2017 13:49:30 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=gmail.com; s=20161025;\n\th=from:to:cc:subject:date:message-id;\n\tbh=5kqN8GDsOCO+Xtq4fyjU5/BgWWfN+5DODD5xcvWgMOs=;\n\tb=p3yWM4LGKhPM7LQ3O6/UTFjo01LDQrNyNNvLtc2uK6tULto8E2wd7lSDpMibPg9s6S\n\tW4ODjJGJI9hK4aSa7jivsRMnhkE7Pdtlf4zqFsEBjhNVl5pQ4AsozGNTFGjKXjFDNDN+\n\tO96+mOWE/reXFi+iF0ZXEHIbeDOUp8GCetP/TzQhJ6G4NQ0E4gUK7XDv0+1frtjfd5bS\n\ta37wJaVaW941u+jGdj+AOLt/v0Y1PAANaWFefGF1YS3TIj0OC4SAT746baw5bPVKPzc2\n\tUvlMFhwF23e/rsr3a4F0/I5L9RTTWrxmhLcrzHqkVO1F0od/AlxR2RttCZqcRO/d/zka\n\tC6aw==", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=5kqN8GDsOCO+Xtq4fyjU5/BgWWfN+5DODD5xcvWgMOs=;\n\tb=DR92teW3OulzKF+w9RI2kjcqG00nMs26sFp3gA3vUiduQLDrxM45Z9YHup9i+RPN7S\n\tgVffjeldAHc5YzvBgZOx922bNyQSEMbPIwSJ0/NtbSbi5iMJnDoSrqw+Rr4xtiuacBzv\n\tu4AaTFZOw0SCWZqzPumkMjE742vM0bxLcbNKMDXLCK50UbOTdQlXrcPoo8SusNSWGLIO\n\tilDzVnXdEf2KmkI+VfS/5SDUg4LRKl1/oN+O2T3p/LtR+P/WoUKNVTf5UKvqBe7t3q4Q\n\tLCcTkQEMKsN3bYBgO+jTHo6VV8p1jV9o3+lh5NzMq/w/zv3L8NcmLdBT+f9ugTOnpUwr\n\tOI2w==", "X-Gm-Message-State": "AHPjjUgO4wzQ+84/4r/RwGOl1hbjdCjMgq9a2S/e/gyNKpHvAQrPqeDm\n\tviYJsFCyXfoQnM6wQELPOFU=", "X-Google-Smtp-Source": "AOwi7QD6lvMNHptOWlXX/XILMbPwb9Cj7gaQnfMeESGoZLTWtp7jkm0dKhuP7WMfPp2kHkkKsSQfoA==", "X-Received": "by 10.98.194.148 with SMTP id w20mr310469pfk.299.1506113370937; \n\tFri, 22 Sep 2017 13:49:30 -0700 (PDT)", "From": "Petar Penkov <peterpenkov96@gmail.com>", "To": "netdev@vger.kernel.org", "Cc": "edumazet@google.com, maheshb@google.com, willemb@google.com,\n\tdavem@davemloft.net, ppenkov@stanford.edu,\n\tPetar Penkov <peterpenkov96@gmail.com>", "Subject": "[PATCH,v3,net-next 0/2] Improve code coverage of syzkaller ", "Date": "Fri, 22 Sep 2017 13:49:13 -0700", "Message-Id": "<20170922204915.7889-1-peterpenkov96@gmail.com>", "X-Mailer": "git-send-email 2.11.0", "Sender": "netdev-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netdev.vger.kernel.org>", "X-Mailing-List": "netdev@vger.kernel.org" }, "content": "This patch series is intended to improve code coverage of syzkaller on\nthe early receive path, specifically including flow dissector, GRO,\nand GRO with frags parts of the networking stack. Syzkaller exercises\nthe stack through the TUN driver and this is therefore where changes\nreside. Current coverage through netif_receive_skb() is limited as it\ndoes not touch on any of the aforementioned code paths. Furthermore,\nfor full coverage, it is necessary to have more flexibility over the\nlinear and non-linear data of the skbs.\n\nThe following patches address this by providing the user(syzkaller)\nwith the ability to send via napi_gro_receive() and napi_gro_frags().\nAdditionally, syzkaller can specify how many fragments there are and\nhow much data per fragment there is. This is done by exploiting the\nconvenient structure of iovecs. Finally, this patch series adds\nsupport for exercising the flow dissector during fuzzing.\n\nThe code path including napi_gro_receive() can be enabled via the\nIFF_NAPI flag. The remainder of the changes in this patch series give\nthe user significantly more control over packets entering the kernel.\nTo avoid potential security vulnerabilities, hide the ability to send\ncustom skbs and the flow dissector code paths behind a\ncapable(CAP_NET_ADMIN) check to require special user privileges.\n\nChanges since v2 based on feedback from Willem de Bruijn and Mahesh\nBandewar:\n\nPatch 1/ No changes.\nPatch 2/ Check if the preconditions for IFF_NAPI_FRAGS (IFF_NAPI and\n\t IFF_TAP) are met before opening/attaching rather than after.\n\t If they are not, change the behavior from discarding the\n\t flag to rejecting the command with EINVAL.\n\nPetar Penkov (2):\n tun: enable NAPI for TUN/TAP driver\n tun: enable napi_gro_frags() for TUN/TAP driver\n\n drivers/net/tun.c | 261 +++++++++++++++++++++++++++++++++++++++++---\n include/uapi/linux/if_tun.h | 2 +\n 2 files changed, 245 insertions(+), 18 deletions(-)" }