Fuzzing the Linux kernel (x86) entry code (Oracle)
([Kernel] Aug 26, 2020 19:35 UTC (Wed) (corbet))
- Reference: 0000829634
- News link: https://lwn.net/Articles/829634
- Source link:
The Oracle blog is putting up a series by Vegard Nossum on fuzzing the kernel's entry code; [1]part 1 and [2]part 2 are available now. " While these fuzzers effectively test the system calls themselves (and the code reachable through system calls), one thing they don't test very well is what happens at the actual transition point between userspace and the kernel. There is more to this boundary than meets the eye; it is written in assembly code and there is a lot of architectural state (CPU state) that must be verified or sanitized before the kernel can safely start executing its C code. This blog post explores how one might go about writing a fuzzer targeting the Linux kernel entry code on x86. "
[1] https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-1-of-3
[2] https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-2-of-3
[1] https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-1-of-3
[2] https://blogs.oracle.com/linux/fuzzing-the-linux-kernel-x86-entry-code%2c-part-2-of-3