syzkaller is an unsupervised coverage-guided kernel fuzzer
Go to file
Andrey Konovalov 55e0c07757
sys/linux: extract USB HID ids (#1294)
* sys/linux: extract USB HID ids

As it turns out the HID kernel subsystem registers only one USB driver that
checks that the interface of the connected device has HID class and then looks
up its own list of vendor/device ids to find a matching driver. This means
that we currently don't generate proper vendor/device ids for USB HID devices.

This patch updates the syz-usbgen tool to also extract USB HID vendor/device
ids from a running kernel and makes the generated descriptions for HID devices
to be patched using the extracted ids.

This patch also contains some minor improvements to USB descriptions
(better HID descriptions and more replies for some USB classes/drivers).

* sys/linux: run make generate
2019-07-22 19:25:54 +02:00
dashboard dashboard: fix usb config extraction script 2019-07-16 15:02:36 +02:00
docs docs: fix description of ptr type 2019-07-22 09:23:10 +02:00
executor sys/linux: extract USB HID ids (#1294) 2019-07-22 19:25:54 +02:00
Godeps vendor/github.com/google/go-cmp: update to HEAD 2019-03-17 18:06:44 +01:00
pkg executor: drop CAP_SYS_NICE 2019-07-22 11:59:00 +02:00
prog prog: fix updating triedPaths when minimizing resources 2019-07-16 15:20:33 +02:00
sys sys/linux: extract USB HID ids (#1294) 2019-07-22 19:25:54 +02:00
syz-ci syz-ci: fix variable shadowing 2019-05-12 11:42:33 +02:00
syz-fuzzer syz-fuzzer: setup host features during image testing 2019-05-21 12:22:58 +02:00
syz-hub syz-manager: factor out rpc serving part 2018-12-26 10:58:23 +01:00
syz-manager syz-manager: fix argument order in generateCoverHTML 2019-07-18 09:47:33 +02:00
tools sys/linux: extract USB HID ids (#1294) 2019-07-22 19:25:54 +02:00
vendor vendor/github.com/google/go-cmp: update to HEAD 2019-03-17 18:06:44 +01:00
vm qemu: support advanced hard drive configurations 2019-07-15 18:12:29 +03:00
.clang-format buildbot: add .travis.yml 2017-07-28 13:25:48 +02:00
.gitignore sys: check in generated files 2017-06-13 15:55:31 +02:00
.golangci.yml .golangci.yml: add codeanalysis build tag 2019-05-15 11:39:31 +02:00
.gometalinter.json tools/syz-trace2syz: add tool to convert strace output to programs 2018-12-06 16:25:37 +01:00
.travis.yml travis: use cache 2019-06-25 13:55:46 +02:00
AUTHORS sys/freebsd: Add support for fuzzing FreeBSD/i386 2019-05-29 14:28:59 +02:00
CODE_OF_CONDUCT.md Create CODE_OF_CONDUCT.md 2019-02-04 12:05:04 +01:00
CONTRIBUTORS pkg/host: improve openat check 2019-06-11 12:06:50 +02:00
fuzzbuzz.yaml fuzz.yaml: rename to fuzzbuzz.yaml 2019-07-19 10:45:19 +02:00
LICENSE initial commit 2015-10-12 10:16:57 +02:00
Makefile travis: use cache 2019-06-25 13:55:46 +02:00
README.md doc/linux: add one link for linux in the README.md (#1194) 2019-05-21 18:59:22 -07:00

syzkaller - kernel fuzzer

Build Status Go Report Card Coverage Status GoDoc License

syzkaller is an unsupervised coverage-guided kernel fuzzer.
Supported OSes: Akaros, FreeBSD, Fuchsia, gVisor, Linux, NetBSD, OpenBSD, Windows.

Mailing list: syzkaller@googlegroups.com (join on web or by email).

Found bugs: Akaros, Darwin/XNU, FreeBSD, Linux, NetBSD, OpenBSD, Windows.

Documentation

Initially, syzkaller was developed with Linux kernel fuzzing in mind, but now it's being extended to support other OS kernels as well. Most of the documentation at this moment is related to the Linux kernel. For other OS kernels check: Akaros, Darwin/XNU, FreeBSD, Fuchsia, NetBSD, OpenBSD, Windows, gVisor.

External Articles

Disclaimer

This is not an official Google product.