Skip to content

Conversation

@FlorentRevest
Copy link
Collaborator

Currently, syz-kconf disables CONFIG_DEVMEM and CONFIG_DEVKMEM but on some setups, these nodes might be needed by various system daemons. To allow these daemons to work while fuzzing, we need to re-enable those CONFIGs.

On the other hand, we really don't want fuzzing to break the machine by accessing these nodes. Since their access is guarded by a capability, we can have syz-executor drop that capability as part of the shared "drop_caps()" logic. That capability has a slightly larger scope than /dev/mem and /dev/kmem but it seems to me that these are all equally risky low level operations which could break the system in all sorts of unexpected way and dropping the capability seems safer.

Currently, syz-kconf disables CONFIG_DEVMEM and CONFIG_DEVKMEM but on
some setups, these nodes might be needed by various system daemons. To
allow these daemons to work while fuzzing, we need to re-enable those
CONFIGs.

On the other hand, we really don't want fuzzing to break the machine by
accessing these nodes. Since their access is guarded by a capability, we
can have syz-executor drop that capability as part of the shared
"drop_caps()" logic. That capability has a slightly larger scope than
guarding /dev/mem and /dev/kmem but it seems to me that the rest is all
equally risky and could break the system in all sorts of unexpected way
so dropping the capability seems to be the right thing to do anyway.
@a-nogikh a-nogikh self-requested a review August 25, 2025 11:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants