From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D2862C4CEC4 for ; Thu, 19 Sep 2019 06:41:03 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id A7535218AF for ; Thu, 19 Sep 2019 06:41:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568875263; bh=Izj8g1OpIOC/JHFk9OYZwz8tlGxgcOe5N7K85YJTnWc=; h=Date:From:To:Subject:References:In-Reply-To:List-ID:From; b=bM9vQvnrHovAh11QSCI5cnYOyGy3BibewOaKAJvmusZNRSGqpG0ck9736zb3ue6bZ TNnj7ojHcxx3FavKftcusSqBEsNdpja2lJ5eT02WSrnfzb/o8RY/tEZnyHXnypDki7 OW+bpcvI2U/shoN6Vu1eBcK63DMyQWiD7yRPk5VQ= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388437AbfISGlD (ORCPT ); Thu, 19 Sep 2019 02:41:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:36682 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725320AbfISGlC (ORCPT ); Thu, 19 Sep 2019 02:41:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5BB5920640; Thu, 19 Sep 2019 06:41:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568875260; bh=Izj8g1OpIOC/JHFk9OYZwz8tlGxgcOe5N7K85YJTnWc=; h=Date:From:To:Subject:References:In-Reply-To:From; b=0dsEbR1ECbmXqqFJC2vjwWxbFVT1QDg60DfZemLMEzItG1/pE+KBq7dF0Q7LMMeai I0iaD82enmv4BsNp1Mik+XYId4jvo8GTsTsnfZKEX51NoDffq626W57kXrAGLdbh0A jByH8IKUOCwWlNvMhEfeGbDZpGBLy2XBHc3ypyX8= Date: Thu, 19 Sep 2019 08:40:58 +0200 From: Greg Kroah-Hartman To: linux-usb@vger.kernel.org, syzkaller-bugs@googlegroups.com, Andrey Konovalov , Alan Stern , Oliver Neukum Subject: Re: Reminder: 52 active syzbot reports in usb subsystem Message-ID: <20190919064058.GB2069956@kroah.com> References: <20190919052342.GC666@sol.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190919052342.GC666@sol.localdomain> User-Agent: Mutt/1.12.1 (2019-06-15) Sender: linux-usb-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-usb@vger.kernel.org On Wed, Sep 18, 2019 at 10:23:42PM -0700, Eric Biggers wrote: > [This email was generated by a script. Let me know if you have any suggestions > to make it better, or if you want it re-generated with the latest status.] > > Of the syzbot reports that have (re-)occurred in the last 7 days, I've manually > marked 52 of them as possibly being bugs in the usb subsystem. This category > mostly includes USB driver bugs, but it might include some core USB bugs too. > I've listed these bug reports below. > > If you believe a bug is no longer valid, please close it by sending a '#syz > fix', '#syz dup', or '#syz invalid' command in reply to the original thread, as > explained at https://goo.gl/tpsmEJ#status > > If you believe I misattributed a bug to the usb subsystem, please let me know > and (if possible) forward it to the correct place. > > Note: in total, I've actually assigned 90 open syzbot reports to this subsystem. > But to help focus people's efforts, I've only listed the 52 that have > (re-)occurred in the last week. Let me know if you want the full list. Thanks for doing all of this. There's a load of syzbot usb open bugs right now, hopefully the huge majority of them will "auto close" now that a lot of USB fixes are merged in Linus's tree. Then we can sift through the rest to see what we have missed and wait for the next round of fuzzing that will happen, as the codepaths we have fixed up can now go deeper :) thanks, greg k-h