aboutsummaryrefslogtreecommitdiffstats
path: root/executor
Commit message (Collapse)AuthorAgeFilesLines
...
* sys/linux: fix range in InfiniBand descriptionPaul Chaignon2019-10-251-5/+5
| | | | Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/linux: use alignment in integer rangesPaul Chaignon2019-10-251-5/+5
| | | | Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/freebsd: fix int should be constPaul Chaignon2019-10-251-2/+2
| | | | Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/linux: fix int should be const in InfiniBand descriptionPaul Chaignon2019-10-251-5/+5
|
* sys/linux: add ioctl_nsDmitry Vyukov2019-10-252-5/+25
|
* sys/linux: add support for basic devlink syscallsJiri Pirko2019-10-253-6/+31
| | | | | | Add support for basic set of devlink interface syscalls Signed-off-by: Jiri Pirko <jiri@mellanox.com>
* executor: create netdevsim deviceJiri Pirko2019-10-251-0/+10
| | | | | | Create testing netdevsim instance with 4 ports. Signed-off-by: Jiri Pirko <jiri@mellanox.com>
* sys/linux/socket_netlink_route_sched: update tca_policesHangbin Liu2019-10-241-5/+5
| | | | | | | | | Update #533 This patch update tca_polices by adding new polices TCA_POLICE_RATE64 and TCA_POLICE_PEAKRATE64 Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: add new tc actionsHangbin Liu2019-10-241-5/+5
| | | | | | | | Update #533 This patch add new tc actions: ct, ctinfo, xt, mpls Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: add tc flower filterHangbin Liu2019-10-241-5/+5
| | | | | | Update #533 Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: add some new classesHangbin Liu2019-10-241-5/+5
| | | | | | | | | | | | | Update #533 In this patch I added new classes: cake, cbs, fq_codel, mq, mqprio, multiq, netem, prio, red, sfb, sfq, skbprio, taprio, tbf, ingress, clsact. These classes has Qdisc_class_ops in kernel, but no netlink parameters. So we can testing them by just calling them directly. Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: add some new qdiscsHangbin Liu2019-10-241-5/+5
| | | | | | | | | | Update #533 In this patch I added new qdiscs cake, etf, pfifo_fast, plug, qfq, rr, skbprio, taprio, atm, drr, blackhole, clsact, ingress, mq. Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: fix tcm_info structureHangbin Liu2019-10-241-5/+5
| | | | | | | | | Update #533 Don't know why I didn't add tcm__pad in tcm_info structure at the begining. But let's fix it now. Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* sys/linux/socket_netlink_route_sched: add chain actionsHangbin Liu2019-10-242-5/+7
| | | | | | | | Update #533 Chain actions also use filter policies, so we can add them easily. Signed-off-by: Hangbin Liu <liuhangbin@gmail.com>
* syz-fuzzer, executor: Add support for blacklisting data race framesMarco Elver2019-10-222-1/+33
| | | | | This adds support to add frames that have already been in data races, to the KCSAN report blacklist.
* executor/usb: enable endpoints on SET_INTERFACEAndrey Konovalov2019-10-212-50/+187
| | | | | This commit changes syz_usb_control_io to enable the relevant endpoints for the interface being set via a SET_INTERFACE request.
* sys/linux: add some new flagsDmitry Vyukov2019-10-152-5/+13
| | | | Add a few new assorted things, some flags, etc.
* sys/linux: add exfat descriptionsDmitry Vyukov2019-10-152-5/+10
|
* sys/linux: add watch_queue descriptionsDmitry Vyukov2019-10-152-5/+25
|
* sys/linux/vusb.txt: describe UAC1 device classAndrey Konovalov2019-10-152-5/+15
|
* prog: mutate length of output buffersVeronica Radu2019-10-102-1/+3
| | | | Update #480
* sys/linux: improve i2c descriptions a bitDmitry Vyukov2019-10-081-5/+5
|
* Change KCSAN info file to debugfsMarco Elver2019-10-081-1/+1
|
* executor, host, csource: Add support to enable KCSANMarco Elver2019-10-043-0/+12
| | | | | | | | | By default, the current KCSAN .config does not enable KCSAN during boot, since we encounter races during boot which would prevent syzkaller from ever executing. This adds support to detect if KCSAN is available, and enables it on the fuzzer host.
* sys/linux: add new syscall descriptions for devio and usbmonVeronica Radu2019-10-012-15/+158
| | | | Update #533
* sys/linux/dev_binder.txt: also support real-world binder device namesEric Biggers2019-09-302-5/+20
| | | | | | It was reported that binder isn't covered when using syzkaller on a real Android device, since the binder device names are different. Update the descriptions to know about the real-world device names too.
* sys/linux: add new pidfd syscallsDmitry Vyukov2019-09-272-3/+12
|
* executor, csource: adjust syz_open_dev$hiddev timeoutAndrey Konovalov2019-09-241-0/+2
| | | | Looks like opening hiddev can take up to ~100 ms.
* executor: handle USB IN requests with wLength == 0Andrey Konovalov2019-09-191-3/+7
|
* executor: always provide DEVICE_QUALIFIER USB descriptorAndrey Konovalov2019-09-191-0/+16
|
* sys/linux: update BPF constantsPaul Chaignon2019-09-192-3/+6
| | | | Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/linux: re-generate Linux descriptions from next-20190918Eric Biggers2019-09-192-5/+30
|
* sys/linux: update BPF's anonymous structuresPaul Chaignon2019-09-181-5/+5
| | | | Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/linux: basic support for bpf-to-bpf function callsPaul Chaignon2019-09-171-5/+5
| | | | | | | | | The BPF template currently only defines helper calls. BPF function calls (bpf-to-bpf calls) are however supported in Linux since v4.16. This patch defines bpf-to-bpf calls in the template. Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* executor: fix out-of-bounds access to syscalls arrayAndrey Konovalov2019-09-171-20/+20
| | | | | Move accessing syscalls array to check for USB syscalls after we validate the call_num value (it can be e.g. instr_copyin/out).
* sys/linux: support for loopkup-free map value accessesPaul Chaignon2019-09-171-5/+5
| | | | | | | | | | | | A new BPF instruction that allows lookup-free map value accesses was added in Linux v5.2, with commit d8eca5b ("bpf: implement lookup-free direct value access for maps"). It enables direct access to map values without having to call a BPF helper. It is currently used to implement global variable support. This commit adds support for that new instruction. Signed-off-by: Paul Chaignon <paul.chaignon@orange.com>
* sys/freebsd/sys.txt: update sendfile descriptionMichael Tuexen2019-09-161-2/+2
| | | | | The signature of sendfile() on FreeBSD is different from the one used on Linux.
* sys/freebsd/vnet.txt: replace IPPROTO_SEP by IPPROTO_DCCP (#1401)Michael Tüxen2019-09-161-2/+2
| | | | r350749 updated the constant from IPPROTO_SEP to IPPROTO_DCCP to be consistent with the IANA registry.
* executor/fuchsia: close vmo handle in syz_mmap.Marco Vanotti2019-09-121-0/+7
| | | | | | | | | | | | This commit fixes a handle leak in syz_mmap. The bug was pointed out by mdempsky during a code review. The `syz_mmap` function creates a VMO and maps it to a VMAR in the address specified by the `syz_mmap` parameters. Once a VMO is mapped to a vmar, the handle to the vmo can be closed without problems. The new code makes sure that `zx_handle_close(vmo_handle)` gets called before the `syz_mmap` function returns.
* executor/fuchsia: don't crash on syz_mmap failure.Marco Vanotti2019-09-111-3/+7
| | | | | | | | | | | | | | | | | syz_mmap is a pseudo-syscall that can be used by syzkaller in fuzzing programs, however, it is also used to setup the environment for syz-executor. syz-executor already checks the return value[0] when it is used for setting up the environment, so it doesn't make sense for the function to crash (most probably, in a fuzzing program it will be called with arguments that would make it fail). The previous behavior was causing a bunch of "Lost connection to test machine" syzkaller crashes which were meaningless. An example of a program in which syz_mmap would crash would be any program in which the handle to the root vmar is closed before calling syz_mmap. [0]: https://github.com/google/syzkaller/blob/a60cb4cd840ce786236a00480e8bb1025e0c5fef/executor/executor_fuchsia.h#L15
* executor/usb: use UTF16 encoding for default stringAndrey Konovalov2019-09-061-6/+18
| | | | Also respond with lang ID when string #0 is requested.
* executor/usb: fix null-ptr-deref in syz_usb_control_ioAndrey Konovalov2019-09-061-2/+2
|
* executor/usb: improve debugging messagesAndrey Konovalov2019-09-061-9/+9
|
* sys/linux/usb: fix CDC mac address encodingAndrey Konovalov2019-09-061-5/+5
|
* sys/linux/usb: always provide device string idsAndrey Konovalov2019-09-061-5/+5
| | | | | This forces the kernel to make a USB string request and select a lang ID early during the enumaration stage.
* executor/usb: allow syz_usb_control_io args to be 0Andrey Konovalov2019-09-061-2/+7
|
* sys/linux/vusb.txt: properly describe interfaces for USB CDC NCMAndrey Konovalov2019-09-062-15/+15
| | | | Also rename cdc_ethernet to cdc_ecm.
* sys/linux, executor: basic support for multiple USB interfacesAndrey Konovalov2019-09-061-15/+26
|
* executor: fix sigsegv for default USB string responseAndrey Konovalov2019-09-051-1/+1
|
* sys/linux/vusb.txt: fix typo in descriptionsAndrey Konovalov2019-09-051-5/+5
|