Dmitry Vyukov 559fbe2dbe syz-fuzzer: don't include disabled syscall name in panics
These checks still fire episodically [on gvisor instance only?].
I've done several attempts to debug this/extend checks.
But so far I have no glue and we are still seeing them.
They are rare enough to be directly debuggable and to be
something trivial. This may be some memory corruption
(kernel or our race), or some very episodic condition.
They are rare enough to be a problem, so don't include
syscall name so that they all go into a single bug bucket.
2020-06-16 16:10:59 +02:00
2020-06-14 12:06:43 +02:00
2020-06-16 15:36:50 +02:00
2020-06-15 09:56:18 +02:00
2020-06-14 09:01:52 +02:00
2020-06-14 11:48:08 +02:00
2020-03-13 13:16:53 +01:00
2020-06-16 12:43:23 +02:00
2020-05-18 11:34:42 +02:00
2020-05-21 17:36:56 +02:00

syzkaller - kernel fuzzer

CI Status fuzzit OSS-Fuzz Go Report Card Coverage Status GoDoc License

syzkaller ([siːzˈːlə]) is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

Disclaimer

This is not an official Google product.

Description
syzkaller is an unsupervised coverage-guided kernel fuzzer
Readme Pixar 180 MiB
Languages
Go 77.1%
C 11%
Roff 5.3%
C++ 2.2%
Shell 1.5%
Other 2.8%