Skip to content
Permalink
Tree: a76bf83ffa
Commits on Nov 30, 2019
  1. sys/linux: fix /dev/watch_queue name

    dvyukov committed Nov 30, 2019
    It's /dev/watch_queue not /dev/fd_watch_queue.
    Don't know if it was renamed, or alwys wrong, but does not matter much,
    now it's /dev/watch_queue.
    
    Also attach v4l ioctls to /dev/swradio,radio,vbi,cec.
    It seems that _some_ of them are applicable to these devices as well.
Commits on Nov 29, 2019
  1. sys/linux: add open of /dev/dri/renderD128

    dvyukov committed Nov 29, 2019
    It's created by qemu but is not matched by the existing /dev/dri/renderD# pattern.
  2. dashboard/config: enable CIFS and OCFS2_FS

    dvyukov committed Nov 29, 2019
    We have some descriptions for them and enabled in debian.
  3. sys/linux: fix NFC_SOCKPROTO_RAW socket call

    dvyukov committed Nov 29, 2019
    It requires SOCK_SEQPACKET not SOCK_STREAM.
  4. pkg/report: improve report titles

    xairy committed Nov 29, 2019
  5. .gitattributes: hide generated files

    pchaigno authored and dvyukov committed Oct 14, 2019
    Hide the generated files by default in pull requests.
    
    Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
  6. sys/linux: use openat for /dev/cdrom

    dvyukov committed Nov 29, 2019
    No need to use syz_open_dev here, openat will do.
    Also add /dev/cdrom1 b/c qemu -machine q35 creates cdrom1 instead of cdrom.
  7. dashboard/config: update linux/kasan config

    dvyukov committed Nov 29, 2019
    1. Update to latest linux-next (next-20191129).
    2. Enable NVMEM/PMEM.
    3. Enable new crypto algs.
    4. Enable VMAP stacks (yay!).
  8. syz-hub: cap total number of programs sent to a manager

    dvyukov committed Nov 29, 2019
    If we have way too many programs to send (more than 100000),
    cap total number to 100000 and give up sending all.
    Otherwise new managers will never chew all this on a busy hub.
  9. sys/linux: use known tags for 9p virtio/xen

    dvyukov committed Nov 29, 2019
    Name virtio/xen sources "syz" so that it's possible to expose
    it from host and actually use.
  10. pkg/report: add few more UBSAN reports

    dvyukov committed Nov 28, 2019
    Update #1523
  11. sys/linux: update BPF constants

    pchaigno authored and dvyukov committed Nov 28, 2019
    Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
Commits on Nov 28, 2019
  1. pkg/report: update UBSAN report parsing

    dvyukov committed Nov 28, 2019
    Update #1523
  2. pkg/csource: detect common mistakes in the common executor header

    dvyukov committed Nov 28, 2019
  3. executor: Add debug message in case devlink namespace move fails

    jpirko authored and dvyukov committed Nov 26, 2019
    Signed-off-by: Jiri Pirko <jiri@mellanox.com>
  4. executor: Fix value of DEVLINK_ATTR_NETNS_FD

    jpirko authored and dvyukov committed Nov 26, 2019
    During kernel -net and -next-next trees merge, the value got moved.
    Fix it.
    
    Signed-off-by: Jiri Pirko <jiri@mellanox.com>
  5. sys/windows/sys.txt: use bool32 instead of int32[0:1]

    shiyu-s authored and dvyukov committed Nov 28, 2019
  6. dashboard/config: disable CONFIG_DEBUG_INFO_BTF

    dvyukov committed Nov 28, 2019
    CONFIG_DEBUG_INFO_BTF started breaking build,
    see details in add comments.
Commits on Nov 27, 2019
  1. syz-ci: allow enabling bisect cause and fix jobs separately

    dvyukov committed Nov 27, 2019
    Some backport-only kernels may only be interested in fix bisections.
    Allow enabling these separately.
  2. syz-ci: TODO

    dvyukov committed Nov 27, 2019
  3. dashboard/app: don't report bisections pointing to release commits

    dvyukov committed Nov 27, 2019
    They should have been detected by "same binary" logic.
    But the problem is that we may use different compilers
    for different commits and they switch exactly at release commits.
    So we can build the release with a differnet compiler than the
    rest of commits and then obviously it won't be "same binary".
    Detect release commits separately.
    
    Update #1271
  4. pkg/bisect: fix some off-by-ones

    dvyukov committed Nov 27, 2019
    3/4 added tests currently fail.
    The problem is that we don't collect results
    from initial bisection range detection.
    As the result we won't detect "same binary"
    for release and first commit in a release.
    
    Update #1271
  5. sys/linux: describe PTRACE_PEEKSIGINFO

    avagin authored and dvyukov committed Nov 26, 2019
    Signed-off-by: Andrei Vagin <avagin@gmail.com>
Commits on Nov 26, 2019
  1. prog: extend panic messages

    dvyukov committed Nov 26, 2019
    We see this panic firing sometimes. Print the actual arg.
  2. pkg/ipc: fix potential nil deref

    dvyukov committed Nov 26, 2019
    We've got the following crash:
    
    panic: runtime error: invalid memory address or nil pointer dereference
    [signal SIGSEGV: segmentation violation code=0x1 addr=0x18 pc=0x7d30ba]
    goroutine 75 [running]:
    github.com/google/syzkaller/pkg/ipc.(*command).exec(0xc000c68cb0, 0xc0001a4d20, 0xc00147a000, 0x1f28, 0x200000, 0x0, 0x0, 0xc00170a000, 0x1000000, 0x1000000, ...)
            /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:783 +0x7ca
    github.com/google/syzkaller/pkg/ipc.(*Env).Exec(0xc0002de240, 0xc0001a4d20, 0xc016c2f440, 0x11, 0xc00019c7e0, 0x40, 0x1, 0xc016b6f590, 0x30, 0xc01615cc40)
            /syzkaller/gopath/src/github.com/google/syzkaller/pkg/ipc/ipc.go:280 +0x104
    main.(*Proc).executeRaw(0xc0012a45c0, 0xc0001a4d20, 0xc016c2f440, 0x1, 0x0)
            /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:292 +0x1f3
    main.(*Proc).execute(0xc0012a45c0, 0xc0001a4d20, 0xc016c2f440, 0x0, 0x1, 0x1)
            /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:255 +0x6a
    main.(*Proc).loop(0xc0012a45c0)
            /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:101 +0x4df
    created by main.main
            /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:259 +0x1153
    
    err can be nil even if hang=true in case of a narrow race:
    we decided to kill the process, but it finished successfully meanwhile.
  3. sys/linux: add new arguments to struct clone_args for clone3()

    brauner authored and dvyukov committed Nov 26, 2019
    Linux v5.5 extends struct clone_args for clone3() by two additional
    parameters:
    
    @set_tid:      Pointer to an array of type *pid_t. The size
                   of the array is defined using @set_tid_size.
                   This array is used to select PIDs/TIDs for
                   newly created processes. The first element in
                   this defines the PID in the most nested PID
                   namespace. Each additional element in the array
                   defines the PID in the parent PID namespace of
                   the original PID namespace. If the array has
                   less entries than the number of currently
                   nested PID namespaces only the PIDs in the
                   corresponding namespaces are set.
    @set_tid_size: This defines the size of the array referenced
                   in @set_tid. This cannot be larger than the
                   kernel's limit of nested PID namespaces.
    
    Cc: Adrian Reber <areber@redhat.com>
    Signed-off-by: Christian Brauner <christian.brauner@ubuntu.com>
  4. sys/linux/fscrypt.txt: add FSCRYPT_POLICY_FLAG_IV_INO_LBLK_64

    ebiggers authored and dvyukov committed Nov 26, 2019
    This flag is new in 5.5.
    
    Also add a link to the fscrypt API documentation.
  5. Call initialize_devlink_ports only when a device has been created

    avagin authored and dvyukov committed Nov 26, 2019
    gVisor doesn't support netdevsim and NETLINK_GENERIC and
    without this fix, sys-executor always fails:
    
    E openat(AT_FDCWD, /sys/bus/netdevsim/new_device, ...)
    X openat(AT_FDCWD, /sys/bus/netdevsim/new_device, ...) = 0x0 errno=2
    E socket(AF_NETLINK, SOCK_RAW|0x0, NETLINK_GENERIC)
    X socket(AF_NETLINK, SOCK_RAW|0x0, NETLINK_GENERIC) = 0x0 errno=93
    E write(0x2 host:[3], "socket(AF_NETLINK) failed\n", 0x1a)
    X write(0x2 host:[3], ..., 0x1a) = 0x1a (2.767µs)
    E write(0x2 host:[3], " (errno 93)\n", 0xc)
    X write(0x2 host:[3], ..., 0xc) = 0xc (2.729µs)
    E exit_group(0x43)
    X exit_group(0x43) = 0x0 (900ns)
    
    Cc: Jiri Pirko <jiri@mellanox.com>
    Fixes: f350e2d ("executor: rename devlink port netdevices to defined names")
    Signed-off-by: Andrei Vagin <avagin@google.com>
Commits on Nov 25, 2019
  1. sys/linux/init_alg.go: add new algorithms

    ebiggers authored and dvyukov committed Nov 25, 2019
    Add new crypto algorithms from linux-next (future v5.5):
    
    - BLAKE2b and BLAKE2s
    - "-arm" implementations of ChaCha and XChaCha
    - "-arm" and "-neon" implementations of Poly1305
  2. sys/linux: update to current linux-next

    dvyukov committed Nov 25, 2019
    Regenerate consts on linux-next next-20191125.
    DEVLINK_ATTR_NETNS_* consts were chifted by 1.
    __BPF_FUNC_MAX_ID increased as usual.
    CRYPTO_ALG_TYPE_BLKCIPHER, CRYPTO_ALG_TYPE_ABLKCIPHER were removed,
    replace them with CRYPTO_ALG_TYPE_SKCIPHER.
  3. pkg/build: make linux implement binary signer

    dvyukov committed Nov 25, 2019
    We were almost there...
    
    Update #1271
Commits on Nov 22, 2019
  1. docs:update syscall_descriptions.md

    shiyu-s authored and dvyukov committed Nov 21, 2019
    Add detailed instructions to run syz-extract
  2. sys/linux: add a NEED comment

    dvyukov committed Nov 22, 2019
Older
You can’t perform that action at this time.