Skip to content
Permalink
Tree: b80fd3b5d4
Commits on Apr 16, 2018
  1. executor: support 32-bit kernels

    dvyukov committed Apr 16, 2018
    There is no autodetection yet, but at least bitness
    is encapsulated in cover_t type.
  2. vm/qemu: add image_device config parameter

    dvyukov committed Apr 16, 2018
    For some configurations device is "sd" instead of "hda".
  3. vm: make sshkey argument optional

    dvyukov committed Apr 16, 2018
    An image can well be setup without a key.
    Just password-less root login.
  4. vm/qemu: don't enable usb/sound by default

    dvyukov committed Apr 16, 2018
    Such options can be enabled in qemu_args if necessary.
  5. dashboard/app: fix error link in emails

    dvyukov committed Apr 16, 2018
    Fixes #559
Commits on Apr 13, 2018
  1. pkg/report: detect hangs in unregister_netdevice

    dvyukov committed Apr 13, 2018
    Add special report format for hangs in unregister_netdevice.
    And support new format of lockdep reports (otherwise they all
    are marked as corrupted).
  2. Update syzbot.md

    dvyukov committed Apr 13, 2018
  3. executor: add two slave interfaces for bridge,bond,team

    liuhangbin authored and dvyukov committed Apr 13, 2018
    Bridge device is used for forwarding. Bond/team device is used for
    load balance and fail over. So it would make more sense to add two
    slave interfaces for these devices.
    
    Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
  4. sys/linux/rdma_cm: remove RDMA_PS_SDP

    liuhangbin authored and dvyukov committed Apr 13, 2018
    RDMA_PS_SDP has been removed since commit 1b90d3002e3ee ("RDMA/CMA: remove
    RDMA_PS_SDP")
    
    Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
Commits on Apr 12, 2018
  1. pkg/repro: clean up temp files

    dvyukov committed Apr 12, 2018
  2. docs: add new syzbot compiler

    dvyukov committed Apr 12, 2018
Commits on Apr 11, 2018
  1. dashboard/app: fix anchors for namespaces

    dvyukov committed Apr 11, 2018
    The human readable caption is a bad value for anchor,
    also potentially changing over time.
    Restore the namespace name as anchor as it should be.
  2. sys/linux: add veth devices to devnames

    dvyukov committed Apr 11, 2018
    Also comment new veth code for future me.
  3. executor: add salve interface for bond0/team0

    liuhangbin authored and dvyukov committed Apr 11, 2018
    Add a veth pair with name bond/team_slave and set their master
    to bond0/team0.
    
    Remove veth from devtypes because the cmd `ip link add veth0 type veth`
    will actually failed with "RTNETLINK answers: File exists" and no veth
    interface created. When create veth device, kernel will create a
    pair of veth, so no need to create them one by one.
    
    Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
Commits on Apr 10, 2018
  1. sys/linux: add few new crypto algorithms

    dvyukov committed Apr 10, 2018
  2. dashboard/app: add Reported-by to bug page

    dvyukov committed Apr 10, 2018
    Fixes #549
  3. Update syzbot.md

    dvyukov committed Apr 10, 2018
Commits on Apr 9, 2018
  1. pkg/report: fix typo in test failure message

    dvyukov committed Apr 9, 2018
  2. pkg/report: improve corrupted report detection

    dvyukov committed Apr 9, 2018
    1. If we see should_failslab frames during report parsing,
       that's a corrupted report with intermixed frames from
       fault injection stack.
    2. If we matched report title and this report should contains
       a guilty stack frame, but we failed to extract any frame,
       consider it as corrupted.
    
    New tests added. Also one of the old tests is fixed.
  3. Update syzbot.md

    dvyukov committed Apr 9, 2018
Commits on Apr 8, 2018
  1. pkg/host: refactor code

    dvyukov committed Apr 8, 2018
    Fix warnings pointed out by gometalinter.
  2. tools/syz-execprog: reduce log level of some messages

    dvyukov committed Apr 8, 2018
    Too much output by default.
Commits on Apr 7, 2018
  1. pkg/report: strip "panic_on_warn set" more aggressively

    dvyukov committed Apr 7, 2018
    KMSAN reports can be short, but still include full stack.
    The added test is only 28 lines, so reduce the threshold from 40 to 25 lines.
  2. syz-manager: don't abort on disabled syscalls

    dvyukov committed Apr 7, 2018
    It turns out to be too difficult to specify a precise set
    of syscalls when, say, all setsockopt's for some sockets
    need to be enabled, but not enabled for other sockets.
    Just warn user about disabled syscalls, but don't abort.
  3. syz-manager/mgrconfig: restore old enable/disable_syscalls behavior

    dvyukov committed Apr 7, 2018
    The previous change in behavior break a bunch of existing configs
    ("bpf" does not match anything). Restore old behavior.
    To get only write syscall, one can do:
    enable_syscalls: "write",
    disable_syscalls: "write$*"
  4. tools: fix create-image.sh again

    dvyukov committed Apr 7, 2018
  5. tools: improve demo_setup.sh

    dvyukov committed Apr 7, 2018
    1. Account for the fact that go can be already in path.
    2. Unset GOROOT in case it is set already.
    3. export variables (not sure how it worked for me).
Commits on Apr 6, 2018
  1. pkg/ipc: disable coverage collection by default

    dvyukov committed Apr 6, 2018
    syz-manager always passes explicit value for the flag.
    syz-stress does not need coverage.
    The only real user is syz-execprog. syz-execprog already
    forces coverage with -coverfile is given. Coverage is harmful
    for external users trying to reproduce reported bugs.
    For the remaining cases of syzkaller developers running
    syz-execprog on KCOV-enabled kernel, the flag can be given
    manually if really needed.
    
    Fixes #554
  2. syz-manager: warn about disabled syscalls in enable_syscalls

    dvyukov committed Apr 6, 2018
    syz-manager used to silently transitively disable syscalls
    for which input resources can't be created.
    This caused lots of confusion, or worse, users did not notice
    that syzkaller does not actually test what they want.
    Fail loudly with a readable explanation when a syscall
    explicitly enabled in enable_syscalls is actually disabled.
    
    Note: this requires to slightly change enable/disable_syscalls
    matching logic. Previously "foo" would match "foo" and all "foo$BAR",
    now it matches only "foo". But "foo*" can be used to match all
    disciminations.
Older
You can’t perform that action at this time.