lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20171026150445.s3rxcy4btlisdu5q@thunk.org> Date: Thu, 26 Oct 2017 11:04:45 -0400 From: Theodore Ts'o <tytso@....edu> To: Chen Feng <puck.chen@...ilicon.com> Cc: Greg KH <gregkh@...uxfoundation.org>, zhaoyukun@...wei.com, arnd@...db.de, linux-kernel@...r.kernel.org, suzhuangluan@...ilicon.com, dan.zhao@...ilicon.com Subject: Re: [PATCH RFC] random: fix syzkaller fuzzer test int overflow On Thu, Oct 26, 2017 at 04:25:15PM +0800, Chen Feng wrote: > > > On 2017/10/25 16:49, Theodore Ts'o wrote: > > Other people who have sent me fuzzer test reproducers are able to > > reproduce syzkaller logs into a simple C program. Can you explain to > > me what the heck: > > > >> r3 = syz_open_dev$urandom(&(0x7f000000a000)="2f6465762f7572616e646f6d00", 0x0, 0x0) > > > > means? > > Take a look at this: > > https://github.com/google/syzkaller/blob/master/sys/linux/random.txt Sorry, this *still* looks like gobbledygook. What ioctls are you executing, and with what arguments? *Please*, give me a C program I can compile. -Ted
Powered by blists - more mailing lists