syzkaller is an unsupervised coverage-guided kernel fuzzer
Go to file
Zach Riggle 0eca949a6c RFC: android: Add support for untrusted_app sandboxing (#697)
executor: add support for android_untrusted_app sandbox

This adds a new sandbox type, 'android_untrusted_app', which restricts
syz-executor to the privileges which are available to third-party applications,
e.g. those installed from the Google Play store.

In particular, this uses the UID space reserved for applications (instead of
the 'setuid' sandbox, which uses the traditional 'nobody' user / 65534)
as well as a set of groups which the Android-specific kernels are aware of,
and finally ensures that the SELinux context is set appropriately.

Dependencies on libselinux are avoided by manually implementing the few
functions that are needed to change the context of the current process,
and arbitrary files.  The underlying mechanisms are relatively simple.

Fixes google/syzkaller#643

Test: make presubmit
Bug: http://b/112900774
2018-09-17 11:33:11 +02:00
dashboard dashboard/app: allow some cross-reporting dups 2018-09-11 11:39:41 +02:00
docs docs/openbsd: update instructions on kernel compilation 2018-09-17 10:49:33 +02:00
executor RFC: android: Add support for untrusted_app sandboxing (#697) 2018-09-17 11:33:11 +02:00
Godeps vendor: add github.com/ianlancetaylor/demangle 2018-06-28 09:59:11 +02:00
pkg RFC: android: Add support for untrusted_app sandboxing (#697) 2018-09-17 11:33:11 +02:00
prog sys/linux: add syz_execute_func 2018-08-30 21:45:04 -07:00
sys sys/targets: use native compiler for test OS 2018-09-17 10:53:29 +02:00
syz-ci syz-ci: make goroot optional 2018-09-17 10:51:17 +02:00
syz-fuzzer RFC: android: Add support for untrusted_app sandboxing (#697) 2018-09-17 11:33:11 +02:00
syz-hub syz-manager: make rpc communication finer grained 2018-06-26 13:59:47 +02:00
syz-manager syz-ci: de-hardcode kernel object file names 2018-09-11 15:43:55 +02:00
tools More packages and fewer daemons. 2018-09-17 09:44:01 +02:00
vendor vendor: add github.com/ianlancetaylor/demangle 2018-06-28 09:59:11 +02:00
vm vm/vmm: enable network 2018-09-17 10:51:00 +02:00
.clang-format buildbot: add .travis.yml 2017-07-28 13:25:48 +02:00
.gitignore sys: check in generated files 2017-06-13 15:55:31 +02:00
.gometalinter.json Add mandatory OpenBSD bits (#689) 2018-08-28 10:07:26 -07:00
.travis.yml .travis.yml: use clang-format 6.0.1 2018-07-27 13:48:44 +02:00
AUTHORS tools/create-openbsd-gce-ci.sh: image for build machine 2018-09-10 18:28:00 +02:00
CONTRIBUTORS Add Tobin to CONTRIBUTORS 2018-09-11 07:06:01 +02:00
LICENSE initial commit 2015-10-12 10:16:57 +02:00
Makefile sys/fuchsia: add Go script that generates fidl descriptions 2018-09-06 21:18:15 +02:00
README.md README.md: add go report card and license icons 2018-07-31 12:22:54 +02:00

syzkaller - kernel fuzzer

Build Status Go Report Card License

syzkaller is an unsupervised coverage-guided kernel fuzzer. Linux kernel fuzzing has the most support, akaros, freebsd, fuchsia, netbsd, windows and gvisor are supported to varying degrees.

The project mailing list is syzkaller@googlegroups.com. You can subscribe to it with a google account or by sending an email to syzkaller+subscribe@googlegroups.com.

List of found bugs.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, FreeBSD, Fuchsia, NetBSD, Windows, gVisor.

External Articles

Disclaimer

This is not an official Google product.