syzkaller is an unsupervised coverage-guided kernel fuzzer
Go to file
Dmitry Vyukov 1905d7c090 prog: refactor ANY to not fabricate new types
Currently ANY implementation fabricates new types dynamically.
This is something we don't do anywhere else, generally types
come from compiler and all are static.
Dynamic types will conflict with use of Ref in Arg optimization.
Move ANY types creation into compiler.

Update #1580
2020-05-05 14:01:52 +02:00
.github/workflows .github/workflows: disable OSS-Fuzz action for now 2020-04-19 10:26:57 +02:00
dashboard dashboard/app: fix linter warnings 2020-04-29 16:32:33 +02:00
docs docs: update source download instructions 2020-05-02 14:12:25 +02:00
executor Makefile: generate descriptions on-the-fly 2020-04-30 17:18:29 +02:00
Godeps vendor: update vendored files 2020-01-29 16:01:06 +01:00
pkg prog: refactor ANY to not fabricate new types 2020-05-05 14:01:52 +02:00
prog prog: refactor ANY to not fabricate new types 2020-05-05 14:01:52 +02:00
sys prog: refactor ANY to not fabricate new types 2020-05-05 14:01:52 +02:00
syz-ci Makefile: generate descriptions on-the-fly 2020-04-30 17:18:29 +02:00
syz-fuzzer prog: support disabled attribute 2020-05-04 20:56:20 +02:00
syz-hub prog: control program length 2020-03-13 13:16:53 +01:00
syz-manager Revert "syz-manager: if running on GCE use GCE public IP address" 2020-04-19 22:06:23 +02:00
tools prog: support disabled attribute 2020-05-04 20:56:20 +02:00
vendor vendor: update vendored files 2020-01-29 16:01:06 +01:00
vm vm/.../openbsd: get back traces of the first two cpus. (#1705) 2020-04-29 11:09:59 -07:00
.clang-format buildbot: add .travis.yml 2017-07-28 13:25:48 +02:00
.gitignore Makefile: generate descriptions on-the-fly 2020-04-30 17:18:29 +02:00
.golangci.yml all: fix new golangci-lint warnings 2020-03-13 08:26:02 +01:00
.travis.yml tools/codecov.yml: add 2020-05-02 14:12:25 +02:00
AUTHORS sys/linux: add new FUTEX_WAIT_MULTIPLE operation 2020-02-17 06:27:23 +01:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2019-02-04 12:05:04 +01:00
CONTRIBUTORS sys: add more specific ipv6 options 2020-04-29 16:46:34 +02:00
fuzzbuzz.yaml fuzz.yaml: rename to fuzzbuzz.yaml 2019-07-19 10:45:19 +02:00
LICENSE initial commit 2015-10-12 10:16:57 +02:00
Makefile tools/codecov.yml: add 2020-05-02 14:12:25 +02:00
README.md README.md: point Travis link to /branches 2020-05-01 08:07:20 +02:00

syzkaller - kernel fuzzer

Build Status fuzzit Go Report Card Coverage Status GoDoc License

syzkaller ([siːzˈːlə]) is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

Disclaimer

This is not an official Google product.