commit | c693e273b3bfbd3d49bdee4d0f5a6c7347e2229a | [log] [tgz] |
---|---|---|
author | Dmitry Vyukov <dvyukov@google.com> | Tue Mar 12 11:37:45 2019 +0100 |
committer | Dmitry Vyukov <dvyukov@google.com> | Sun Mar 17 18:06:44 2019 +0100 |
tree | c80a292ac086313f02b170d7d3e7403b28c0ad10 | |
parent | 03df839448fecb6638255d58989211c36e5784b4 [diff] |
pkg/instance: use -fpermissive -w when building old syzkaller Since we can be building very old revisions for bisection here, make the build as permissive as possible. Newer compilers tend to produce more warnings also kernel headers may be broken, e.g.: ebtables.h:197:19: error: invalid conversion from ‘void*’ to ‘ebt_entry_target*’ Update #501
syzkaller
is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros
, FreeBSD
, Fuchsia
, gVisor
, Linux
, NetBSD
, OpenBSD
, Windows
.
Mailing list: syzkaller@googlegroups.com (join on web or by email).
Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.
Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.
This is not an official Google product.