CARVIEW |
Select Language
HTTP/2 200
date: Sun, 27 Jul 2025 02:07:20 GMT
content-type: text/html; charset=utf-8
vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, X-Requested-With,Accept-Encoding, Accept, X-Requested-With
etag: W/"04f751de29400a80d57dad23acdbd698"
cache-control: max-age=0, private, must-revalidate
strict-transport-security: max-age=31536000; includeSubdomains; preload
x-frame-options: deny
x-content-type-options: nosniff
x-xss-protection: 0
referrer-policy: no-referrer-when-downgrade
content-security-policy: default-src 'none'; base-uri 'self'; child-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.com github-cloud.s3.amazonaws.com github-production-repository-file-5c1aeb.s3.amazonaws.com github-production-upload-manifest-file-7fdce7.s3.amazonaws.com github-production-user-asset-6210df.s3.amazonaws.com *.rel.tunnels.api.visualstudio.com wss://*.rel.tunnels.api.visualstudio.com objects-origin.githubusercontent.com copilot-proxy.githubusercontent.com proxy.individual.githubcopilot.com proxy.business.githubcopilot.com proxy.enterprise.githubcopilot.com *.actions.githubusercontent.com wss://*.actions.githubusercontent.com productionresultssa0.blob.core.windows.net/ productionresultssa1.blob.core.windows.net/ productionresultssa2.blob.core.windows.net/ productionresultssa3.blob.core.windows.net/ productionresultssa4.blob.core.windows.net/ productionresultssa5.blob.core.windows.net/ productionresultssa6.blob.core.windows.net/ productionresultssa7.blob.core.windows.net/ productionresultssa8.blob.core.windows.net/ productionresultssa9.blob.core.windows.net/ productionresultssa10.blob.core.windows.net/ productionresultssa11.blob.core.windows.net/ productionresultssa12.blob.core.windows.net/ productionresultssa13.blob.core.windows.net/ productionresultssa14.blob.core.windows.net/ productionresultssa15.blob.core.windows.net/ productionresultssa16.blob.core.windows.net/ productionresultssa17.blob.core.windows.net/ productionresultssa18.blob.core.windows.net/ productionresultssa19.blob.core.windows.net/ github-production-repository-image-32fea6.s3.amazonaws.com github-production-release-asset-2e65be.s3.amazonaws.com insights.github.com wss://alive.github.com api.githubcopilot.com api.individual.githubcopilot.com api.business.githubcopilot.com api.enterprise.githubcopilot.com; font-src github.githubassets.com; form-action 'self' github.com gist.github.com copilot-workspace.githubnext.com objects-origin.githubusercontent.com; frame-ancestors 'none'; frame-src viewscreen.githubusercontent.com notebooks.githubusercontent.com; img-src 'self' data: blob: github.githubassets.com media.githubusercontent.com camo.githubusercontent.com identicons.github.com avatars.githubusercontent.com private-avatars.githubusercontent.com github-cloud.s3.amazonaws.com objects.githubusercontent.com release-assets.githubusercontent.com secured-user-images.githubusercontent.com/ user-images.githubusercontent.com/ private-user-images.githubusercontent.com opengraph.githubassets.com copilotprodattachments.blob.core.windows.net/github-production-copilot-attachments/ github-production-user-asset-6210df.s3.amazonaws.com customer-stories-feed.github.com spotlights-feed.github.com objects-origin.githubusercontent.com *.githubusercontent.com; manifest-src 'self'; media-src github.com user-images.githubusercontent.com/ secured-user-images.githubusercontent.com/ private-user-images.githubusercontent.com github-production-user-asset-6210df.s3.amazonaws.com gist.github.com; script-src github.githubassets.com; style-src 'unsafe-inline' github.githubassets.com; upgrade-insecure-requests; worker-src github.githubassets.com github.com/assets-cdn/worker/ github.com/assets/ gist.github.com/assets-cdn/worker/
server: github.com
content-encoding: gzip
accept-ranges: bytes
set-cookie: _gh_sess=6hqFlApP3KiUSJct5GTAGAMtmeiVxAwKn9MSYm1FF5IcShPlRRQkSc5O7SeqOBUwN1lqB6I7wHaGK6K7k65sJFR6FUIf8f17aL29qgOF07HP8Xgr9wCLESSNs8rYl23c%2Bsn%2BRpLyE14ne1eFzDTAegmsfyd6gqGg5Ktigat38wDhkM%2BEokQVrAgpDgHXGOtBmrnuaLJR05%2Ffjldb0ShAnedo8SeUty8xxe5FghTu3trN7Zem%2FIm2JHoFyjgshrttYgUorZAz3pqUnHldr7BD9Q%3D%3D--svb2BMdAVnAlc4G%2F--YCxWyHE0ybaZncHWS%2B3ZlA%3D%3D; Path=/; HttpOnly; Secure; SameSite=Lax
set-cookie: _octo=GH1.1.114197308.1753582040; Path=/; Domain=github.com; Expires=Mon, 27 Jul 2026 02:07:20 GMT; Secure; SameSite=Lax
set-cookie: logged_in=no; Path=/; Domain=github.com; Expires=Mon, 27 Jul 2026 02:07:20 GMT; HttpOnly; Secure; SameSite=Lax
x-github-request-id: C450:37D5F1:9EE620:D30D30:688589D8
GitHub - rgbkrk/iknowthis: fuzz testing framework for Linux system calls
Skip to content
Navigation Menu
{{ message }}
-
Notifications
You must be signed in to change notification settings - Fork 6
fuzz testing framework for Linux system calls
License
rgbkrk/iknowthis
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
--------------------------------------- iknowthis Linux SystemCall Fuzzer ------------------------------------------------- iknowthis is a fuzz testing framework for Linux system calls. It is designed to make system calls in random order, with random parameters in order to spot subtle kernel bugs. In order to get good coverage, each system call is annotated with a prototype, and optionally a simple routine to manage any resources that may have been created (sockets, file descriptors, etc.). These resources are then handed to other system calls, in order to try and reach some pathological state of operation. Here is a trivial example of a fuzzer: // Check real user’s permissions for a file. SYSFUZZ(access, __NR_access, SYS_NONE, CLONE_DEFAULT, 0) { gchar *pathname; gint retcode; retcode = spawn_syscall_lwp(this, NULL, __NR_access, // int typelib_get_pathname(&pathname), // const char *pathname typelib_get_integer_mask(R_OK | W_OK | X_OK | F_OK)); // int mode g_free(pathname); return retcode; } Typelib is a set of routines to manage common kernel parameters. spawn_syscall_lwp() is a syscall invokation routine that tries to isolate our main process from any damage by executing it in a new lwp. If you're certain that a system call can never timeout or damage us, then you can use a faster alternative. I've used glib for common data structures, so copied their naming convention where appropriate. * Making a fuzzer * Using and improving typelib * Debugging I usually run iknowthis in a virtual machine, for easier debugging, you can try something like this: $ while true; do (sleep 1h ; sudo killall -9 iknowthis) & sudo ./iknowthis --dangerous; kill %1; done
About
fuzz testing framework for Linux system calls
Resources
License
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
You can’t perform that action at this time.