Skip to content
Permalink
Tree: 6ecc6d0f7a
Commits on Feb 12, 2019
  1. Add keyname and empty passphrase

    R3x authored and dvyukov committed Feb 12, 2019
  2. Remove instances of executor

    R3x authored and dvyukov committed Feb 5, 2019
  3. Minor changes to the documentation

    R3x authored and dvyukov committed Feb 5, 2019
Commits on Feb 11, 2019
  1. pkg/host: don't fail if CONFIG_FAIL_FUTEX is not enabled

    dvyukov committed Feb 11, 2019
    See #991 and added comments.
    
    Fixes #991
  2. all: reformat with Go 1.10

    dvyukov committed Feb 11, 2019
  3. sys/linux: add NDISC packet formats to vnet.txt

    dlrobertson authored and dvyukov committed Feb 11, 2019
    Add the basic NDISC (RFC 4861) packet formats to sys/linux/vnet.txt.
  4. docs/linux: correct image name and remove packages already installed …

    mudongliang authored and dvyukov committed Feb 11, 2019
    …in the script
  5. pkb/build: extractRootCause for NetBSD too

    blackgnezdo authored and dvyukov committed Feb 11, 2019
    * pkg/build: share extractRootCause with openbsd
    
    This should get kernel build errors reported in syz-ci console.
    
    * Add a test
    
    * lint
    
    * pkb/build: extractRootCause for NetBSD too
  6. pkg/build: share extractRootCause with openbsd

    blackgnezdo authored and dvyukov committed Feb 11, 2019
    * pkg/build: share extractRootCause with openbsd
    
    This should get kernel build errors reported in syz-ci console.
    
    * Add a test
    
    * lint
Commits on Feb 9, 2019
  1. tools/openbsd: use fully resolved gcc package name (#988)

    blackgnezdo committed Feb 9, 2019
  2. openbsd: remove shorten report logic (#986)

    mptre authored and blackgnezdo committed Feb 9, 2019
    A line length of 79 in the ddb output does not necessarily imply that the
    following line is a continuation of the current line. Since there's no way
    to distinguish between ordinary and continuation lines, it could end up
    corrupting the report by joining two lines that are disjoint[1].
    
    Instead, disable line wrapping in ddb. If we want some kind of wrapping in
    the future it's easier done by pkg/report.
    
    [1] https://syzkaller.appspot.com/bug?extid=03f7377a9848d7d008c9
  3. dashboard/config: enable WITNESS_LOCKTRACE on OpenBSD (#987)

    mptre authored and blackgnezdo committed Feb 9, 2019
    This option will print all lock acquisition paths once a lock violation
    is identified by witness[1].
    
    [1] https://marc.info/?l=openbsd-cvs&m=154955230813384&w=2
Commits on Feb 8, 2019
  1. sys/linux: prohibit opening /proc/self/exe

    dvyukov committed Feb 8, 2019
    Fuzzer manages to open it and do bad things with it.
    Prevent it from doing so.
  2. pkg/ipc: generate better temp name for executor

    dvyukov committed Feb 8, 2019
    Just appending the pid number can produce conflicting names
    if the name itself ends with digits (standard temp file naming convention).
    So append ".PID".
    Also remove beginning from too long names instead of ending.
    Temp files in tests has unique numbers at the end, we need to preserve them
    to avoid file name conflicts.
  3. pkg/runtest: run syz tests in non-repeat mode

    dvyukov committed Feb 8, 2019
    Turns out it can affect some tests,
    e.g. some things manifest only after executor restart
    (executor binary marked as non-executable by the test).
  4. sys/linux: prohibit EXT4_IOC_RESIZE_FS

    dvyukov committed Feb 7, 2019
    When we run with sandbox=none, test program can do EXT4_IOC_RESIZE_FS which
    shrinks rootfs basically to 0. This breaks the machine as all tests then fail with:
    
    failed to create temp dir: mkdir syzkaller-testdir077269498: no space left on device
    
    This is the most common source of "lost connection" crashes overall and
    they are not actually kernel bugs.
    
    Prohibit EXT4_IOC_RESIZE_FS for now.
    Alternatively we can mount tmpfs with sandbox=none.
    
    Update #971
Commits on Feb 7, 2019
  1. sys/linux: extend key descriptions

    dvyukov committed Jan 30, 2019
Commits on Feb 6, 2019
  1. sys/fuchsia: fix fidlgen issues

    mvanotti authored and dvyukov committed Feb 6, 2019
    * sys/fuchsia: fix fidlgen issues.
    
    This change modifies fidlgen removing fuchsia.mediacodec and renaming
    zircon-ethernet to fuchsia-hardware-ethernet.
    
    fuchsia.mediacodec has most of its functionality merged into
    fuchsia.media and it's not included in the default amd64 builds.
    
    zircon-ethernet has been renamed to fuchsia-hardware-ethernet
    recently:
    
    https://fuchsia-review.googlesource.com/c/zircon/+/237178
    
    * docs/fuchsia: Add troubleshooting sections
    
    This commit adds a troubleshooting section in the fuchsia syzkaller docs
    that mentions how to solve fidlgen issues when fidl interfaces are
    removed or renamed.
    
    * sys/fuchsia: remove stale autogenerated files.
    
    * sys/fucsia run make extract && make generate.
Commits on Feb 4, 2019
  1. Create CODE_OF_CONDUCT.md

    dvyukov committed Feb 4, 2019
Commits on Feb 2, 2019
  1. sys/openbsd: add missing wscons descriptions (#976)

    mptre authored and blackgnezdo committed Feb 2, 2019
Commits on Feb 1, 2019
  1. pkg/report: add simple version of netbsd crash parser

    dvyukov committed Feb 1, 2019
    Just something to start with. Plus some test cases.
  2. executor: add missing include

    dvyukov committed Feb 1, 2019
    thread_start now uses errno, so include <errno.h>
  3. docs: move netbsd.md into own dir

    dvyukov committed Feb 1, 2019
    The latest trend is to create a dir per OS as we now have too many of them.
    Create a dir netbsd and move the existing doc into it.
  4. dashboard/config: add lsm= cmdline arg for stacked modules

    dvyukov committed Feb 1, 2019
    It won't take effect right now as security= has precedence over lsm=.
    But it won't harm too and later we will only need to remove security=.
    Also it will work with this custom patch for syzbot:
    https://groups.google.com/d/msg/syzkaller/BSgVCTSShRQ/E6lFuiDpFwAJ
    
    Update #973
  5. docs/openbsd: update found_bugs.md

    mptre authored and dvyukov committed Feb 1, 2019
  6. Update found_bugs.md

    dvyukov committed Feb 1, 2019
  7. prog: fix checksum dependencies

    xairy committed Feb 1, 2019
    Make pseudo checksums depend (via csumUses) on the arg it requires for
    calculation. Otherwise we fail to assign addrs to those args during encoding
    for execution. Also add a test.
  8. sys/linux: rename dev descriptions files

    xairy committed Feb 1, 2019
    Prefix file names of descriptions of /dev/* files with dev_.
    And give some of them more appropriate names.
  9. dashboard/config: prepare for stacked security modules

    dvyukov committed Feb 1, 2019
    In linux-next security modules can be stacked.
    TOMOYO is compatible with other modules and SAFESETID
    module is added. But this is not yet in mainline.
    
    Enable TOMOYO and SAFESETID.
    There is no way to enable stacked modules in linux-next
    while preserving the current behavior in mainline.
    Once these changes reach mainline, we will need to replace
    security cmdline arguments with lsm as follows:
    
    lsm=yama,safesetid,integrity,selinux,tomoyo
    lsm=yama,safesetid,integrity,smack,tomoyo
    lsm=yama,safesetid,integrity,tomoyo,apparmor
  10. syz-manager: restore disabled syscall logging

    dvyukov committed Feb 1, 2019
    We reset disabled syscalls before checking them.
    As the result no diagnostics printed. Reset them after checking.
  11. docs/trusty: add instructions on running syzkaller

    dvyukov committed Feb 1, 2019
    Update #933
Commits on Jan 31, 2019
  1. executor, pkg/ipc: simplify retry handling

    dvyukov committed Jan 31, 2019
    Remove kRetryStatus, it's effectively the same as exiting with 0.
    Remove ipc.ExecutorFailure, nobody uses it.
    Simplify few other minor things around exit status handling.
  2. executor: remove ability to detect kernel bugs

    dvyukov committed Jan 31, 2019
    This ability was never used but we maintain a bunch of code for it.
    syzkaller also recently learned to spoof this error code
    with some ptrace magic (probably intercepted control flow again
    and exploited executor binary).
    Drop all of it.
Older
You can’t perform that action at this time.